lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Sat, 06 Apr 2019 18:22:10 -0700 (PDT)
From:   David Miller <>
Subject: Re: [PATCH v2 0/2] Support runtime changes of vendor mac passthu

From: Mario Limonciello <>
Date: Thu,  4 Apr 2019 13:46:51 -0500

> On some platforms ACPI method `\\_SB.AMAC` is dynamic and changes to it can
> influence changing the behavior of MAC pass through and what MAC address is used.
> When running USB reset, re-read the MAC address to use to support tools that
> change the policy.
> This is quite similar to using `SIOCSIFHWADDR` except that the actual MAC to use
> comes from ASL rather than from userspace.
> Changes from v1:
>  * Remove an extra unneeded `ether_addr_copy` call
>  * Use `dev_set_mac_address` to ensure all notifiers are called
>  * Shuffle functions to allow code re-use.

Series applied to net-next.

Powered by blists - more mailing lists