lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 18 Oct 2019 21:31:24 +0100 From: Russell King <rmk@...linux.org.uk> To: netdev@...r.kernel.org Cc: linville@...driver.com, andrew@...n.ch, f.fainelli@...il.com Subject: [PATCH 3/3] ethtool: add 0x16 and 0x1c extended compliance codes From: Russell King <rmk+kernel@...linux.org.uk> 0x16 and 0x1c are 10G Base-T extended compliance codes. Add these to our decoding. Signed-off-by: Russell King <rmk+kernel@...linux.org.uk> --- sfpid.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/sfpid.c b/sfpid.c index 3c50c456f93d..ded3be7337d8 100644 --- a/sfpid.c +++ b/sfpid.c @@ -185,10 +185,14 @@ static void sff8079_show_transceiver(const __u8 *id) printf("%s Extended: 25G Base-CR CA-S\n", pfx); if (id[36] == 0xd) printf("%s Extended: 25G Base-CR CA-N\n", pfx); + if (id[36] == 0x16) + printf("%s Extended: 10Gbase-T with SFI electrical interface\n", pfx); if (id[36] == 0x18) printf("%s Extended: 100G AOC or 25GAUI C2M AOC with worst BER of 10^(-12)\n", pfx); if (id[36] == 0x19) printf("%s Extended: 100G ACC or 25GAUI C2M ACC with worst BER of 10^(-12)\n", pfx); + if (id[36] == 0x1c) + printf("%s Extended: 10Gbase-T Short Reach\n", pfx); } static void sff8079_show_encoding(const __u8 *id) -- 2.7.4
Powered by blists - more mailing lists