lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080827201111.GA29569@electric-eye.fr.zoreil.com>
Date:	Wed, 27 Aug 2008 22:11:11 +0200
From:	Francois Romieu <romieu@...zoreil.com>
To:	Pascal Terjan <pterjan@...driva.com>
Cc:	Marcus Sundberg <marcus@...ate.com>,
	linux-kernel <linux-kernel@...r.kernel.org>, stable@...nel.org
Subject: Re: r8169 regression in 2.6.26.3 vs 2.6.26.2

Pascal Terjan <pterjan@...driva.com> :
> Le mercredi 27 ao?t 2008 ? 12:38 +0200, Marcus Sundberg a ?crit :
> > Pascal Terjan wrote:
> > > Since updating to 2.6.26.3, networking no longer works on Acer Aspire
> > > One.
> > > 
> > > PCI config is now always filled with ones.
> > > 
> > > Reverting "r8169: avoid thrashing PCI conf space above
> > > RTL_GIGA_MAC_VER_06" makes it work again.
> > > 
> > > The device is 10ec:8136
[...]
> > How does the kernel identify your chipset upon driver load?
> > (grep for XID)
> 
> eth0: RTL8169 at 0xe04ee000, 00:1e:68:a0:07:b5, XID 24a00000 IRQ 17

As far as I can read rtl8169_get_mac_version, this XID should not match
any known device with 2.6.26.3 and thus fallback to RTL_GIGA_MAC_VER_01
(assuming that rtl8169_init_phy runs after rtl8169_get_mac_version, what
it appears to do so far).

Yes / no / -ECOFFEE ?

On a different topic, I would suggest to try patches #0001 ... #0006
at http://userweb.kernel.org/~romieu/r8169/2.6.27-rc3/20080818/ with
your chipset.

-- 
Ueimor
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ