lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <54F08B74.4000409@cogentembedded.com> Date: Fri, 27 Feb 2015 18:21:24 +0300 From: Sergei Shtylyov <sergei.shtylyov@...entembedded.com> To: Ben Hutchings <ben.hutchings@...ethink.co.uk>, netdev@...r.kernel.org CC: linux-kernel@...ts.codethink.co.uk, Nobuhiro Iwamatsu <nobuhiro.iwamatsu.yj@...esas.com>, Mitsuhiro Kimura <mitsuhiro.kimura.kc@...esas.com>, Yoshihiro Kaneko <ykaneko0929@...il.com>, Yoshihiro Shimoda <yoshihiro.shimoda.uh@...esas.com> Subject: Re: [PATCH net-next 2/5] sh_eth: WARN on access to a register not implemented in a particular chip Hello. On 2/26/2015 11:34 PM, Ben Hutchings wrote: > Currently we may silently read/write a register at offset 0. Change > this to WARN and then ignore the write or read-back all-ones. I think reading non-existing registers would yield all 0s, not all 1s. That's not x86. :-) > Signed-off-by: Ben Hutchings <ben.hutchings@...ethink.co.uk> Other than that, seems a great idea. Acked-by: Sergei Shtylyov <sergei.shtylyov@...entembedded.com> WBR, Sergei -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists