lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <002c1f96-b82f-6be7-2530-68c5ae1d962d@milecki.pl> Date: Tue, 4 Apr 2023 15:52:19 +0200 From: Rafał Miłecki <rafal@...ecki.pl> To: Ricardo Cañuelo <ricardo.canuelo@...labora.com>, Rafał Miłecki <zajec5@...il.com> Cc: "David S . Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, Arnd Bergmann <arnd@...db.de>, Florian Fainelli <f.fainelli@...il.com>, Jon Mason <jon.mason@...adcom.com>, netdev@...r.kernel.org, bcm-kernel-feedback-list@...adcom.com, Jon Mason <jdmason@...zu.us> Subject: Re: [PATCH net] bgmac: fix *initial* chip reset to support BCM5358 Hi, On 4.04.2023 15:46, Ricardo Cañuelo wrote: > On mar 07-02-2023 23:53:27, Rafał Miłecki wrote: >> While bringing hardware up we should perform a full reset including the >> switch bit (BGMAC_BCMA_IOCTL_SW_RESET aka SICF_SWRST). It's what >> specification says and what reference driver does. >> >> This seems to be critical for the BCM5358. Without this hardware doesn't >> get initialized properly and doesn't seem to transmit or receive any >> packets. >> >> Signed-off-by: Rafał Miłecki <rafal@...ecki.pl> > > KernelCI found this patch causes a regression in the > bootrr.deferred-probe-empty test [1] on sun8i-h3-libretech-all-h3-cc > [2], see the bisection report for more details [3] > > Does it make sense to you? It doesn't seem to make any sense. I guess that on your platform /sys/kernel/debug/devices_deferred is not empty anymore? Does your platform use Broadcom Ethernet controller at all? It seems like some false positive at first sight.
Powered by blists - more mailing lists