lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 26 Feb 2008 17:47:57 -0500
From:	"John W. Linville" <linville@...driver.com>
To:	Alexey Zaytsev <alexey.zaytsev@...il.com>
Cc:	Michael Buesch <mb@...sch.de>, Ingo Molnar <mingo@...e.hu>,
	Alexey Zaytsev <zaytsev.a@...tei.ru>, Greg KH <greg@...ah.com>,
	linux-kernel@...r.kernel.org
Subject: Re: bcm43xx regression in 2.6.24 (with patch)

On Wed, Feb 27, 2008 at 01:12:32AM +0300, Alexey Zaytsev wrote:
> On Wed, Feb 27, 2008 at 1:04 AM, Michael Buesch <mb@...sch.de> wrote:

> >  Besides that the bcm43xx driver is not broken. That's the whole reason
> >  this damn thread started at all. So it can't be broken.
> >
> Can't agree here. The bcm43xx driver used to work with 2.6.23 without requiring
> any module magic.

At the risk of prolonging things... :-(

Isn't the fundamental problem here that the ssb driver claims the same
PCI IDs as the bcm43xx driver?  He have hit this same issue a number
of times: 8139too vs.  8139cp, eepro vs. e100, sk98lin vs. skge,
and I'm sure there are more.  I admit that this situation is a bit
more confusing, since the user is less likely to predict a conflict
between bcm43xx and the ssb driver.  This is especially true since
the user isn't even selecting ssb directly, but is instead selecting
the apparently unrelated b44.

Still, the bcm43xx driver is not fundamentally damaged.  This is
fundamentally a "two drivers claiming the same PCI ID" issue, not a
"you broke my driver" one.

John
-- 
John W. Linville
linville@...driver.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ