lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 14 Sep 2007 15:33:15 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	mchan@...adcom.com
Cc:	andy@...yhouse.net, netdev@...r.kernel.org, ananth@...adcom.com,
	nsankar@...adcom.com
Subject: Re: [TG3]: Workaround MSI bug on 5714/5780.

From: "Michael Chan" <mchan@...adcom.com>
Date: Fri, 07 Sep 2007 19:26:21 -0700

> [PCI]: Add MSI quirk for ServerWorks HT1000 PCIX bridge.
> 
> This is the fix for the following problem:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=227657
> 
> The bnx2 device 5706 complains about MSI not working behind a
> ServerWorks HT1000 PCIX bridge. An earlier commit to fix the problem:
> 
> e3008dedff4bdc96a5f67224cd3d8d12237082a0:
> 
> "PCI: disable MSI by default on systems with Serverworks HT1000 chips"
> 
> was not entirely correct, and has been reverted.
> 
> MSI does not work on the PCIX bus because the BIOS did not set the
> HT_MSI_FLAGS_ENABLE bit in the HyperTransport MSI capability on the
> bridge.  We use the existing quirk_msi_ht_cap() to detect the problem
> and disable MSI in all buses behind it.
> 
> Signed-off-by: Michael Chan <mchan@...adcom.com>
> Cc: Anantha Subramanyam <ananth@...adcom.com>
> Cc: Naren Sankar <nsankar@...adcom.com>

Michael, I've queued this and my revert patch into a tree which
I will push to the PCI maintainer for 2.6.24

Thanks.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ