hey STH folks!
I've been trying to get a Mellanox CX3-Pro working on my Mac with the ATTO drivers (FastFrame NQ42 firmware). It appears that ATTO decided to stash the MAC address for the card in the NVRAM as a means of preventing people from simply cross-flashing the firmware and using their drivers though, as the card refuses to come up in OSX and, upon inspection, the driver/card shows a MAC address of 00:00:00:00:00:00. This has *nothing* to do with the actual MAC address of the card though as dropping the card back in a regular Linux host allows it to operate fully normally (MAC address isn't missing, etc).
The ATTO NVRAM allows you to modify the NVRAM and dump/restore the NVRAM to a file but doesn't allow set/change of MAC address. This is where my reverse engineering-fu kinda falls short. It sure seems like someone who could figure out the format of the NVRAM and how the checksum is calculated could figure out where to put the MAC address in a saved NVRAM file, fix the checksum, and re-load the NVRAM to the card. I'm unfortunately not that someone. I got as far as trying to blindly experiment but really I've reached the end of my abilities here.
Is anyone with reverse engineering talent interested in helping out here (maybe the ever talented Mr @fohdeesha??)? It'd be great if those of us who don't have stupid money but still want to play with fast networks could figure out how to get this stupid card working under osx!
I've been trying to get a Mellanox CX3-Pro working on my Mac with the ATTO drivers (FastFrame NQ42 firmware). It appears that ATTO decided to stash the MAC address for the card in the NVRAM as a means of preventing people from simply cross-flashing the firmware and using their drivers though, as the card refuses to come up in OSX and, upon inspection, the driver/card shows a MAC address of 00:00:00:00:00:00. This has *nothing* to do with the actual MAC address of the card though as dropping the card back in a regular Linux host allows it to operate fully normally (MAC address isn't missing, etc).
The ATTO NVRAM allows you to modify the NVRAM and dump/restore the NVRAM to a file but doesn't allow set/change of MAC address. This is where my reverse engineering-fu kinda falls short. It sure seems like someone who could figure out the format of the NVRAM and how the checksum is calculated could figure out where to put the MAC address in a saved NVRAM file, fix the checksum, and re-load the NVRAM to the card. I'm unfortunately not that someone. I got as far as trying to blindly experiment but really I've reached the end of my abilities here.
Is anyone with reverse engineering talent interested in helping out here (maybe the ever talented Mr @fohdeesha??)? It'd be great if those of us who don't have stupid money but still want to play with fast networks could figure out how to get this stupid card working under osx!