lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAM1KZS=YFuPJJQvsS28dtnZQycjWE6kptf3h2kFGn1D42kJaVg@mail.gmail.com>
Date: Sun, 7 Jan 2024 14:51:12 +0100
From: Ezra Buehler <ezra@...yb.ch>
To: Andrew Lunn <andrew@...n.ch>
Cc: "Russell King (Oracle)" <linux@...linux.org.uk>, Heiner Kallweit <hkallweit1@...il.com>, 
	Tristram Ha <Tristram.Ha@...rochip.com>, Michael Walle <michael@...le.cc>, 
	Jesse Brandeburg <jesse.brandeburg@...el.com>, netdev@...r.kernel.org
Subject: Re: [PATCH net] net: mdio: Prevent Clause 45 scan on SMSC PHYs

On Sat, Jan 6, 2024 at 4:20 PM Andrew Lunn <andrew@...n.ch> wrote:
> Could you hack a copy of readx_poll_timeout() and real_poll_timeout()
> into the driver, and extend it to count how many times it goes around
> the loop. Is the usleep_range() actually sleeping for 10ms because you
> don't have any high resolution clocks, and a 100Hz tick? If so, you
> might want to swap to 1000Hz tick, or NO_HZ, or enable a high
> resolution clock, so that usleep_range() can actually sleep for short
> times.

You are spot on, simply selecting the 1000Hz tick fixes the issue for me.
So, no need to change the code I guess.

Thank you very much for the help and sorry for wasting your time.

Cheers,
Ezra.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ