lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1iLYuC-0000t8-A3@rmk-PC.armlinux.org.uk>
Date:   Fri, 18 Oct 2019 21:31:24 +0100
From:   Russell King <rmk@...linux.org.uk>
To:     netdev@...r.kernel.org
Cc:     linville@...driver.com, andrew@...n.ch, f.fainelli@...il.com
Subject: [PATCH 3/3] ethtool: add 0x16 and 0x1c extended compliance codes

From: Russell King <rmk+kernel@...linux.org.uk>

0x16 and 0x1c are 10G Base-T extended compliance codes.  Add these
to our decoding.

Signed-off-by: Russell King <rmk+kernel@...linux.org.uk>
---
 sfpid.c | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/sfpid.c b/sfpid.c
index 3c50c456f93d..ded3be7337d8 100644
--- a/sfpid.c
+++ b/sfpid.c
@@ -185,10 +185,14 @@ static void sff8079_show_transceiver(const __u8 *id)
 		printf("%s Extended: 25G Base-CR CA-S\n", pfx);
 	if (id[36] == 0xd)
 		printf("%s Extended: 25G Base-CR CA-N\n", pfx);
+	if (id[36] == 0x16)
+		printf("%s Extended: 10Gbase-T with SFI electrical interface\n", pfx);
 	if (id[36] == 0x18)
 		printf("%s Extended: 100G AOC or 25GAUI C2M AOC with worst BER of 10^(-12)\n", pfx);
 	if (id[36] == 0x19)
 		printf("%s Extended: 100G ACC or 25GAUI C2M ACC with worst BER of 10^(-12)\n", pfx);
+	if (id[36] == 0x1c)
+		printf("%s Extended: 10Gbase-T Short Reach\n", pfx);
 }
 
 static void sff8079_show_encoding(const __u8 *id)
-- 
2.7.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ