lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1332580422.2797.11.camel@jtkirshe-mobl>
Date:	Sat, 24 Mar 2012 02:13:42 -0700
From:	Jeff Kirsher <jeffrey.t.kirsher@...el.com>
To:	Richard Alpe <richard.alpe@...csson.com>
Cc:	jesse.brandeburg@...el.com, bruce.w.allan@...el.com,
	carolyn.wyborny@...el.com, donald.c.skidmore@...el.com,
	gregory.v.rose@...el.com, peter.p.waskiewicz.jr@...el.com,
	alexander.h.duyck@...el.com, john.ronciak@...el.com,
	e1000-devel@...ts.sourceforge.net, netdev@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] e1000e: clear REQ and GNT in EECD (82571 && 82572)

On Fri, 2012-03-23 at 13:55 +0100, Richard Alpe wrote:
> Clear the REQ and GNT bit in the eeprom control register (EECD).
> This is required if the eeprom is to be accessed with auto read
> EERD register.
> 
> After a cold reset this doesn't matter but if PBIST MAC test was
> executed before booting, the register was left in a dirty state
> (the 2 bits where set), which caused the read operation to time out
> and returning 0.
> 
> Reference (page 312):
> http://download.intel.com/design/network/manuals/316080.pdf
> 
> Reported-by: Aleksandar Igic <aleksandar.igic@...tech.com.au>
> Signed-off-by: Richard Alpe <richard.alpe@...csson.com>
> ---
>  drivers/net/ethernet/intel/e1000e/82571.c |   11 +++++++++++
>  1 files changed, 11 insertions(+), 0 deletions(-) 

Thank you, I will add the patch to my queue.

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ