Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Bug Software Linux News

e1000e Bug Squashed — Linux Kernel Patch Released 111

ruphus13 writes "As mentioned earlier, there was a kernel bug in the alpha/beta version of the Linux kernel (up to 2.6.27 rc7), which was corrupting (and rendering useless) the EEPROM/NVM of adapters. Thankfully, a patch is now out that prevents writing to the EEPROM once the driver is loaded, and this follows a patch released by Intel earlier in the week. From the article: 'The Intel team is currently working on narrowing down the details of how and why these chipsets were affected. They also plan on releasing patches shortly to restore the EEPROM on any adapters that have been affected, via saved images using ethtool -e or from identical systems.' This is good news as we move towards a production release!"
This discussion has been archived. No new comments can be posted.

e1000e Bug Squashed — Linux Kernel Patch Released

Comments Filter:
  • News? (Score:3, Insightful)

    by quarrel ( 194077 ) on Friday October 03, 2008 @09:06PM (#25253193)

    I know this is News For Nerds and all that, but isn't this a tad specific?

    An alpha/beta of the most recent linux kernel patch had a bug fixed, and it hits the front page?

    Don't get me wrong, I'm glad they found it, but this is kinda the point of debug cycles.. If we start reporting every bug squashed in all the major open source projects out there this is going to go downhill fast.. (of course, it's possible some may think that the idle. is only a step above..)

    --Q

    • by WK2 ( 1072560 )

      (of course, it's possible some may think that the idle. is only a step above..)

      Or a step below...

    • Re:News? (Score:5, Insightful)

      by Atriqus ( 826899 ) on Friday October 03, 2008 @09:25PM (#25253293) Homepage
      It's newsworthy because it was a bug that actually bricked hardware.
      • What, really "bricked" or just needing a reflash?

        I mean, who in their right mind would call a PC without an operating system bricked? Just because you have to put a floppy in to install an MBR and command environment (a la the 3 DOS install disks from yesteryear) a bricked system?
        Compare that to running an operating system like DOS on an old Athlon that didn't have a big enough heatsink/fan, no ACPI or 'hlt' commands built in, and the processor overheating to the point of literally burning itself up.

        So
        • Re:News? (Score:5, Insightful)

          by sumdumass ( 711423 ) on Friday October 03, 2008 @10:45PM (#25253653) Journal

          Try Erasing the BIOS on the main board and you will be more accurate in your comparison.

          This bug actually flashed the firmware for the network controller and hosed access to it in some unexplained sort of way. That is something note worthy because of the rarity of it. If it was simply hosing something that was readily diagnosable and more common like a boot sector or something, then it would be different. It isn't often the software is associated with hardware damage either purposefully or accidentally.

          BTW, I know there are recovery methods for a hosed BIOS. That isn't the point. Simply installing an operating system shouldn't hose it nor should it hose hardware either. Imagine all the people who just thought their card was broken or something and went for a refund under warranty or the bad name Intel or Linux received for the "faulty shipment of devices" or the ability to break a device. This is something that would work in windows, load Linux in a dual boot mode, it would stop working in both windows and Linux without any errors or indication that the car was even capable of being seen by the mainboard.

          • that the car was even capable of being seen by the mainboard.

            Now where did you start with the car analogy?

          • by sjames ( 1099 )

            It was even more fun. Once the card was hosed, not only would it not work, but it required a bit of hacking to get it recognized enough to attempt a re-flash (assuming you had an image of the correct contents to flash in).

            The exact cause was mysterious as well since it didn't happen to everyone, nor was it predictable if or when it would happen.

        • I mean, who in their right mind would call a PC without an operating system bricked?

          Entirely too many people. Of course, "right mind" is subjective...

        • by sjames ( 1099 )

          What, really "bricked" or just needing a reflash?

          Bricked but theoretically recoverable with some further work.

          The cards should be fixable by reflashing, but when you can't enumerate the card on the bus, that's a bit of a challenge.

        • by LarsG ( 31008 )

          What, really "bricked" or just needing a reflash?

          Kinda depends on the definition. Some of the technorati won't consider something bricked until it is literally physically broken and beyond repair. Some include situations that requires hardware intervention (e.g., desoldering and swapping a SMT-mounted ROM), or specialized tools with limited availability (e.g., special reflash equipment only available to the manufacturer of the device) to fix it.

          From what I can gather from a quick skim of lkml, it is a bit uncertain as to how bricked these cards are - that

    • Re:News? (Score:5, Informative)

      by SL Baur ( 19540 ) <steve@xemacs.org> on Friday October 03, 2008 @09:29PM (#25253317) Homepage Journal

      An alpha/beta of the most recent linux kernel patch had a bug fixed, and it hits the front page?

      They have not fixed the bug that caused the e1000e ethernet cards to get bricked. This is at least a two part bug. The EEPROM should not have been writable and Something Is Happening to cause bad writes to happen. What that "Something" is, no one knows yet, though it appears they are getting close.

      Linus is an absolute, total anal retentive with regards to fixing bugs by understanding and fixing the root cause[1], not just papering over it. This papers over it for the moment, because the bug hasn't been isolated yet, but it allows more people to participate because the side effects were really nasty - this was a true bricking of the ethernet card.

      This stage isn't newsworthy for Slashdot.[2] It must be a slow news day.

      [1] This is a Good Thing.

      [2] Nor will the real bug fix when it comes. A bug is found, a bug is fixed. Life, goes on.

    • Re:News? (Score:5, Interesting)

      by Spy der Mann ( 805235 ) <spydermann DOT slashdot AT gmail DOT com> on Friday October 03, 2008 @09:57PM (#25253455) Homepage Journal

      I know this is News For Nerds and all that, but isn't this a tad specific?

      That's what sections are for. See the little Tux Icon over there? We all care about Linux. Besides, it's a VERY IMPORTANT BUG. A showstopper, so to speak. And keep in mind that a lot of people in here are kernel freaks. They want to test-drive the latest versions of the kernel. And one of the reasons why people keep coming here (and not to digg) is precisely for this kind of news.

      Thanks, ruphus13.

      • Thanks Spy - I, for one, was looking forward to testing this out, and, luckily hadn't gotten down to getting the latest bits when I read about the bug. Now I can proceed to find the next ones!
      • by Mhtsos ( 586325 )
        What I found newsworthy is that I can expect the latest windows worm / trojan / virus to brick a whole bunch of network cards (at work, don't throw stones) as it's now more clearly documented that it can be done. I think it was mentioned in a previous article that the real bug is that bricking through software is possible at all.
        • by LarsG ( 31008 )

          If Windows worm writers want to do hardware bricking evil, there isn't exactly a lack of potential targets already out there. It is not impossible to write a program to trash firmware on many video cards, HDs, DVD drives and the like. But you do tend to have to try to be evil in these cases, not just get an
          address wrong.

          The difference in this particular situation is that the e1000e fw got trashed by accident as opposed to by a program specifically written to do so.

          Most windows malware these days are not wri

    • Re: (Score:1, Troll)

      by Whiteox ( 919863 )

      It's been a slow news week. Maybe the economic crunch is having an effect on geek news...

    • Quite a few people run dev kernels -- especially those running new hardware that requires the absolute latest support. This is a little more serious than most bugs.
  • by kcbanner ( 929309 ) on Friday October 03, 2008 @09:08PM (#25253213) Homepage Journal
    Hwwaa? Oh yes...the kernel does't corrupt your EEPROM anymore!
  • by Anonymous Coward on Friday October 03, 2008 @09:14PM (#25253241)

    Linus isn't very happy with Intel here:
    http://lkml.org/lkml/2008/9/29/368

    On Mon, 29 Sep 2008, Arjan van de Ven wrote:
    >
    > we have a patch to save/restore now, in final testing stages
    > (obviously we want to be really careful with this)

    Btw, the _real_ bug is clearly in the hardware design that allows you to
    brick those things without apparently even having a lock bit.

    I'm hoping Intel doesn't treat this as just a software bug. Some hw
    designer should be thinking hard about which orifice they put their head
    up in.

    It used to be that you could fry some monitors by feeding them
    out-of-range signals. The _monitors_ got fixed.

                    Linus

    • by techno-vampire ( 666512 ) on Friday October 03, 2008 @10:46PM (#25253659) Homepage
      He's got good reason. It should be impossible for the system to write to the EEPROM without special measures being taken, possibly a jumper that has to be removed to allow it. And, if possible, the card won't work right (in some way that doesn't prevent boot) until the jumper's put back to normal. That way, if you really have to re-flash it, you can, but it's not going to happen by accident.

      I remember having a motherboard with a jumper that had to be specially set to update the BIOS. The smart way was to power down, open the case and pull the jumper so that you could flash the EEPROM. Then, of course, once that was done, reverse the procedure for safety. I always regarded anybody who left the jumper off for the rare convenience as fools who deserved anything that might happen.

      • Re: (Score:3, Informative)

        by mczak ( 575986 )
        Jumpers are not really used a lot these days. They cost extra, and are clumsy to handle (need to open case). You are right it would be really good if there were some precautions taken so no accidental writes happen (for instance need some special command sequence hard to trigger accidentally), but often those eeprom chips just have a simple serial interface, and reading and writing works almost exactly the same. A couple of years ago you could easily overwrite the eeprom of hauppauge tv cards (though there
      • by Xugumad ( 39311 )

        Given the cost of EEPROM space, I think the better answer is to double the size. One half is readable, one writable, at any point in time. To update, you write, turn off, flip the jumper across to the other side (or, heck, just use a physical switch) and you're done. Bricking isn't absolutely impossible (you could write a damaged image to one half which wipes the other when it boots), but essentially infeasible.

      • Re: (Score:3, Informative)

        by Agripa ( 139780 )

        It is not uncommon to require a set of magic numbers to be written before writing to protected memory. The magic numbers and/or access pattern is designed so that no simple or likely hardware failure will allow unprotected access. Small discrete or integrated EEPROMs often have this functionality built in.

    • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Saturday October 04, 2008 @01:49AM (#25254441) Journal

      Linus has a very good analogy here -- in fact, I love the fact that on the rare occasions I have to set modelines myself, I can pretty much put whatever I want, knowing that if it doesn't work, I can just ctrl+alt+backspace and try again.

      But the conclusion does bother me: We're basically saying that all software is buggy, or that we're incapable of preventing this kind of thing from happening (in software). This is true of most modern OS designs -- monolithic kernels do make it possible for pretty much any driver to accidentally ruin any other driver's day.

      The proposed workaround, then, is to prevent that memory from being written -- and to prevent this in hardware, for no other reason than to avoid having to write it into every kernel that might potentially allow buggy code to run in Ring 0.

      I don't like either solution. Hardware shouldn't be brickable from software, or at least, not so easily. But software shouldn't need hardware to coddle it, either -- why is the SSD in this laptop emulating a hard disk?

      • by PRMan ( 959735 ) on Saturday October 04, 2008 @06:26AM (#25255195)

        Yes, because as long as the hardware can be bricked by software, it remains an exploit that can be used by malicious software writers.

        Speaking of the fried monitors, back in the day a college I worked at got a virus that fried 2 monitors before I got smart and put a Hercules monochrome card in it and cleaned it up.

        So, yes, while it can (and should) be worked around in Linux, it should also be fixed in hardware, if possible.

        • as long as the hardware can be bricked by software, it remains an exploit that can be used by malicious software writers.

          Except, where do you draw the line?

          Software control of fans means a virus could spin them all down, and run some complex calculations (PI) to spin the CPU up.

          Software control of hard drives means you can spin them up and down all day, and wear them out an order of magnitude faster.

          Software control of a printer means you can print page after page of black ink, using up an ink cartridge.

          Software control of a Roomba means you can deliberately crash it into walls, or possibly down the stairs.

          I have enough coddl

          • While it might be safer, I really don't want to be in a situation where my hardware is telling me I can't do something, because I might screw it up.

            Then why does almost every computer with a decent SDTV output have a lockout chip designed to prevent homemade programs from running? Examples include DVRs, video game consoles, and the like.

            • I don't know. My Powerbook didn't -- it had svideo out, and an adapter cable to turn it into RCA.

              Now I've got a Dell notebook, which has an HDMI port. Again, nothing to prevent me from showing whatever I want on it.

              But think about the context here -- I don't think hardware restricting me is a good thing. I don't think DVRs or game consoles should prevent people from hacking on them.

              • by tepples ( 727027 )

                Now I've got a Dell notebook, which has an HDMI port.

                Which isn't very helpful if you don't have $600 to spend on an HDTV.

                I don't think hardware restricting me is a good thing. I don't think DVRs or game consoles should prevent people from hacking on them.

                You don't think they should, yet all do. Why does this continue to be the case? Are the console makers afraid of the indie game dev scene?

                • Which isn't very helpful if you don't have $600 to spend on an HDTV.

                  I got a Dell monitor -- 24 inch, 1080p -- for $300 or so. It has all kinds of ports, including HDMI.

                  It also has DVI, but I prefer the HDMI, mostly because there's no thumbscrews. Picture quality would be exactly the same, though.

                  You don't think they should, yet all do. Why does this continue to be the case?

                  I don't really know, but I sincerely doubt that they all come to me for advice.

                  Are the console makers afraid of the indie game dev scene?

                  That and piracy.

                  See, right now, the platform is so absurdly restricted that the barrier to piracy is prohibitively high. On Windows, you just need to know how to use BitTorrent and Daemontools -- on a con

      • by tepples ( 727027 )

        why is the SSD in this laptop emulating a hard disk?

        It's not. ATA's wire protocol uses a hardware abstraction over block storage devices, as does USB Mass Storage Class. The hard disk is emulating an ideal block device, and the SSD is also emulating an ideal block device.

        • by mpe ( 36238 )
          ATA's wire protocol uses a hardware abstraction over block storage devices, as does USB Mass Storage Class. The hard disk is emulating an ideal block device, and the SSD is also emulating an ideal block device.

          This has been the case for a long time. Even with parallel IDE the drive geometry reported by the controller was typically a complete fiction. Another common feature is the ability for the drive controller to transparently remap failed blocks. Which means that by the time the host actually starts se
      • \

        But the conclusion does bother me: We're basically saying that all software is buggy,

        No. What we're saying is that we build layered systems, and that every layer is expected to protect its integrity from the higher layers.

        The hardware protects itself from software (no brain-damaged hardware interfaces), the kernel protects itself from userspace (priviledged vs. unpriviledged mode), system userspace protects itself from user userspace (root vs. non-root), userspace protects itself from interpreted network code (sandboxing).

    • by Baki ( 72515 )

      At least for consumer hardware we have come to expect that it cannot be damaged by buggy software, but in general it is not true that hardware should always protect itself against bad software. Just consider much of embedded software, e.g. the flight software for aeroplanes. Wrong software will result in "hardware damage", the same for most robots etc.

      I am quite sure that even a microprocessor driven washing machine nowadays could damage itself if the (embedded) software were buggy.

      • by mpe ( 36238 )
        At least for consumer hardware we have come to expect that it cannot be damaged by buggy software, but in general it is not true that hardware should always protect itself against bad software. Just consider much of embedded software, e.g. the flight software for aeroplanes.

        Hence you'd never upgrade the firmware on all the redundant computers on an airliner at the same time. Typically with there being a minimum time (both by the calender and flying) between such upgrades.
    • by pslam ( 97660 )

      The strange thing is that I've written drivers for many EEPROMs, and they all have a few hoops you have to jump through to enable writing. It's not something you can just accidentally do.

      Usually it's something like 'Read address 0xaaaa then 0xdddd then write some magic byte then the address then write 128 bytes'.

      Perhaps Intel thought they didn't need all that magic?

  • Great! (Score:3, Funny)

    by silent_artichoke ( 973182 ) <(mike) (at) (mikeandebony.com)> on Friday October 03, 2008 @09:27PM (#25253301) Homepage
    I'm gonna download it now! Oh, wait... crap.
  • by AaronW ( 33736 ) on Friday October 03, 2008 @09:29PM (#25253315) Homepage
    About a year ago we built up some new machines to run Linux and found that multiple e1000 cards would cause the Ethernet connectivity to drop and become useless. We ended up replacing them with much cheaper Realtek cards and all the problems disappeared. I haven't trusted Intel since. It's as if there were some buggy interrupt interaction with the on-board Intel Ethernet in the 915 chipset.
    • by Anonymous Coward

      I've never had a problem with their cards. They're about the only NIC that i've never needed to mess with to get Linux to see. NICs built into the motherboard NB/SB are the biggest problem usually. The PCI-X cards work in PCI slots and in the tests I've done they're usually able to push 30-40% more data through the network than other NICs.

      • by sumdumass ( 711423 ) on Friday October 03, 2008 @11:07PM (#25253727) Journal

        3com used to be that way too. I'm not exactly sure what it was but the 3c905's rocked and would run data quite a bit faster then any other card at the time. I know they had a full blown data processors on the cards but I assume the others would to. I used to go to computer shows just to pick them up for $10-$20 used because they had the same effects on data performance as you would see with rendering going from a S3 trident video adapter to a Gforce video card. I because seriously convinced when at a lan party with an AMD Athlon 800 system running windows 98se with 256 memory and we had to pull a 100 meg file from a file server to get the updates in sync to a game to play. I started pulling the file last because of helping others find it, I was on the tail end of the 3rd tire of uplinked switches and I had the file installed while others were still transering it. The funny part is that people with their brand new Windows XP 1.4 and 1.8 gig plus systems were still slower and the only thing I can attribute to it is the NIC.

        Intel caught up with 3com in this aspect and despite my older fascinations with 3com, I'm actually an Intel fan in this one respect now.

        • by kesuki ( 321456 )

          processors and sub systems have gotten a lot faster since then.

          i know, cheap ethernet interfaces are slower than the fastest cards out there, but your experience, from many years back when a 800 mhz cpu was fast, are a bit dated. a 100 MB file shouldn't take long enough to download from a file server even with a cheap nic unless there is a performance issue with the file server in question. 100 megabytes shouldn't take more than a few seconds to transfer across a lan.

          in theory a 100 mbit lan should take 8

          • Of course the 800 mhz system was when I First noticed that there was a difference back in 2000/2001 and things have come along faster now.

            But to reach the maximum speeds, you have to make sure you have newer equipment capable of hitting the faster speeds and that the lines are in good near perfect order to realize the maximum speeds. You also have TCP overhead that inflates the transmision size of the 100 meg file and other factors to consider like multiple users accessing the same interfaces, the amount of

    • I had the same thing pop up on a supermicro (ICH-7, IIRC... dual Xeon 5xxx's) at work. Recompiling the modules and reinstalling them seemed to fix the problem. Like most hardware problems, it seems to be just the wrong combination of drivers, hardware, software and luck.

      I think a yum update is what triggered it, but I'm not sure; it just popped up out of nowhere and acted in such a way that I couldn't ever corner the thing. Recompiling the modules was one of those things that I did while I was thinking

    • It's funny you say that. A few years ago, I asked on a mailing list for the most Linux-friendly gigabit ethernet card, and almost everyone said e1000. I've been happy with mine ever since. My distro was a bit too old for the card, but I was able to download the drivers from intel.com and install them without any problems.
    • by Fweeky ( 41046 )

      Quite a few problems like that seem to be MSI-X related, did you try disabling them?

  • by AcidPenguin9873 ( 911493 ) on Friday October 03, 2008 @09:31PM (#25253331)

    Yes, they released a patch so that the NVM can't be overwritten after the e1000e driver is loaded. But from what I can tell, they still don't know what is/was responsible for the overwriting.

    FWIW, I'm almost positive that modern CPUs have debug traps for this exact sort of thing...you can trap arbitrary I/O writes via SMM or something...obviously I'm not in the debug loop, but I don't see why this has been so hard to figure out...

    • It makes me wonder if they have the tools available to do their job. When I did this type of work we had analyzers and ICE machines which makes it easy if you know how to use them. Are the kernel designers getting enough support to buy the needed hardware? Sometimes these things go beyond the software and can happen because of a physical condition that is untrappable in SMM, like a DMA over the top of refresh cycle fault.
      • Actually I think the guys working on this are Intel engineers so probably they have everything they need.

        • by Anpheus ( 908711 )

          The problem is that rather than do it the easy way with that alphabet soup of acronyms listed up there, they broke out their handy electron microscope to examine it.*

          * Yes, I'm jealous.

    • by SL Baur ( 19540 )

      obviously I'm not in the debug loop, but I don't see why this has been so hard to figure out...

      Because it bricked the card. No way to have it fixed other than to get a replacement as there was no way reload the firmware.

      People were scared to test.

      • Re: (Score:3, Interesting)

        by Almahtar ( 991773 )
        Which makes me hope all attempts to write to the EEPROM are being logged in the new driver, with stacktraces.

        Otherwise what's the point of testing them? Sure they won't brick your card, but you can't get very useful feedback.
    • by jhol13 ( 1087781 )

      I think it more interesting question is "how can someone overwrite".

      With that I mean "isn't there any tests around", not that Linux should (magically) become a microkernel (not that I would mind).

      • From what I've read, the bug causing the overwrite is in somewhere other than the network card's driver. That something is overwriting random memory and it happens to hit the memory region mapped for writing the card's firmware.

      • by jimicus ( 737525 )

        I think it more interesting question is "how can someone overwrite".

        Very easy, if the card is designed to have field-updateable firmware. You just need to send it the right (or in this case wrong) command.

        Ideally the manufacturer would make it so that you have to go through all sorts of hoops before you've done anything permanent, but this isn't the first time [theregister.co.uk] something like this has happened.

        • by jhol13 ( 1087781 )

          You missed my next sentence.

          What I am complaining is the lack of proper testing in Linux. If there were proper tests for the module which does the overwriting, the problem would have never occured at all.

          • by jimicus ( 737525 )

            What I am complaining is the lack of proper testing in Linux. If there were proper tests for the module which does the overwriting, the problem would have never occured at all.

            Are you trolling or do you honestly not understand the implications of it being an alpha release?

            In other words "This release is for testing purposes; by all means report a bug if it breaks but don't be too surprised if the breakage is catastrophic. If you use this on something important, you are nuts and should seek help". In traditional, closed-source development, alpha releases are produced, they may or may not break things. Now, for software living entirely in userland you probably won't cause hardwa

            • by jhol13 ( 1087781 )

              The problem is that whole Linux is alpha release, all the time.

              This is proved by the fact that there really is no proper testing done. As said, this would have been found before alpha "release".

              You know extremely well that your embedded systems would be completely useless to the users had them no proper tests.

              Yes, I know that there are huge number of devices sold every day which have not been tested as well as they should, or the company has decided to sell despite of the known bugs.

              Linux does the latter on

    • by SuperQ ( 431 ) * on Saturday October 04, 2008 @01:58AM (#25254475) Homepage

      So the thing is, there is more than just a simple "eeprom write interface" on these chips.

      Most of the time the the eeprom attached to the nic is a cheap small serial eeprom part, usually just a few kb.. maybe 32 or 64kb. It contains mostly things like a bit of boot strapping, a few "permanent" settings like the MAC address, and the PXE rom.

      And that's where the problems come in. This serial interface is usually an afterthought, and if there is noise on that bus, bits can flip. Or if something bad happens in the NIC code, you could accidentally write when you meant to read.

      Usually this is recoverable, but I haven't looked into this specific corruption situation. I've had to deal with this kind of thing before. It's not fun.

      Flashing NIC eeproms isn't something a normal end-user does all the time. 99% of the time it's written at the factory, stuffed on the board, and forgotten about.

    • From what I can tell, the bug is only being seen on bleeding edge combinations of software in bleeding edge distros. They're thinking it's a combination of the driver and a new release of X (one allows for the conditions, the other glitches after that), but there's very little 'tried-and-true' stuff in a bleeding edge distro.
  • From RTFA the cause of the problem has not been identified yet, however the problem is prevented from being able to present itself going forward by maliciously writing/erasing non volatile memory. Since the problem was caught at alpha/beta stages the stable releases were unaffected. BTW, My boss tried to RTFA over my shoulder and shot cheese out of his ears (he is the non techie type). Its threads like these that absolutely cement /.'s place as the worlds dominant UBER NERD site.
    • by BPPG ( 1181851 )

      Its threads like these that absolutely cement /.'s place as the worlds dominant UBER NERD site.

      ummm... good?

    • by jimicus ( 737525 )

      My boss tried to RTFA over my shoulder and shot cheese out of his ears

      Can he do that on demand?

  • Where do I get the fix...and how do I install it? Am using kernel 2.6.26 on openSuse 11?

No spitting on the Bus! Thank you, The Mgt.

Working...