Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754060AbYJBKAj (ORCPT ); Thu, 2 Oct 2008 06:00:39 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753179AbYJBKA1 (ORCPT ); Thu, 2 Oct 2008 06:00:27 -0400 Received: from twin.jikos.cz ([213.151.79.26]:51291 "EHLO twin.jikos.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752662AbYJBKA0 (ORCPT ); Thu, 2 Oct 2008 06:00:26 -0400 Date: Thu, 2 Oct 2008 11:59:53 +0200 (CEST) From: Jiri Kosina X-X-Sender: jikos@twin.jikos.cz To: Jesse Brandeburg cc: torvalds@linux-foundation.org, jeff@garzik.org, davem@davemloft.net, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, arjan@linux.intel.com, Bruce Allan , arjan@linux.intel.com Subject: Re: [PATCH] e1000e: write protect ICHx NVM to prevent malicious write/erase In-Reply-To: <20081002001835.5951.82533.stgit@jbrandeb-bw.jf.intel.com> Message-ID: References: <20081002001830.5951.3123.stgit@jbrandeb-bw.jf.intel.com> <20081002001835.5951.82533.stgit@jbrandeb-bw.jf.intel.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1297 Lines: 36 On Wed, 1 Oct 2008, Jesse Brandeburg wrote: > Set the hardware to ignore all write/erase cycles to the GbE region in > the ICHx NVM. This feature can be disabled by the WriteProtectNVM > module parameter (enabled by default) only after a hardware reset, but > the machine must be power cycled before trying to enable writes. Hi, thanks. We have been running our tests with complete pileup of 12 patches from Intel, and the bug didn't trigger so far (and it triggers now pretty reliably with the unpatched kernel in the setup Karsten has established in our testing environment). So the patches really seem, as far as our current testing goes, to at least workaround the problem. I will now try to isolate which of the patches really fixes the problem, so that we could understand better what is going on and who is causing the corruption. Do you think it would be possible to adapt this particular patch so that it spits out watnin/stacktrace when write and/or erase cycle is attempted but denied? Thanks, -- Jiri Kosina SUSE Labs -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/