lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20191017221101.GB24810@lunn.ch>
Date:   Fri, 18 Oct 2019 00:11:01 +0200
From:   Andrew Lunn <andrew@...n.ch>
To:     Florian Fainelli <f.fainelli@...il.com>
Cc:     netdev@...r.kernel.org, "David S. Miller" <davem@...emloft.net>,
        open list <linux-kernel@...r.kernel.org>, hkallweit1@...il.com,
        bcm-kernel-feedback-list@...adcom.com, olteanv@...il.com,
        rmk+kernel@...linux.org.uk, cphealy@...il.com,
        Jose Abreu <joabreu@...opsys.com>
Subject: Re: [PATCH net-next v2 2/2] net: phy: Add ability to debug RGMII
 connections

> If all is well, we stop iterating over all possible RGMII combinations
> and offer the one that is deemed suitable which is what an user should
> be trying by configuring the platform appropriately.

Hi Florian

This is no longer true. You now iterate over all modes.

> +int phy_rgmii_debug_probe(struct phy_device *phydev)
> +{

> +	/* Now probe all modes */
> +	for (i = 0; i < ARRAY_SIZE(rgmii_modes); i++) {
> +		ret = phy_rgmii_probe_interface(priv, rgmii_modes[i]);
> +		if (ret == 0)
> +			netdev_info(ndev, "Determined \"%s\" to be correct\n",
> +				    phy_modes(rgmii_modes[i]));
> +	}

I see two different use cases for this code.

1) Find the right mode

2) Test if the PHY driver is doing the right thing with different
modes.

You are concentrating more on the first, but i think the second is
also important. I think we can give the novice user a few more
guidelines. We can count the number of modes which work. If that count
!= 1, we know we have a driver problem. We should ask the user to
report the problem, including details of the MAC and PHY driver.

       Andrew

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ