lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Sat, 06 Apr 2019 18:22:10 -0700 (PDT)
From:   David Miller <davem@...emloft.net>
To:     mario.limonciello@...l.com
Cc:     linux-usb@...r.kernel.org, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org, hayeswang@...ltek.com,
        sjg@...gle.com, campello@...gle.com, Ryan.Hong@...l.com,
        Crag.Wang@...l.com
Subject: Re: [PATCH v2 0/2] Support runtime changes of vendor mac passthu
 policy

From: Mario Limonciello <mario.limonciello@...l.com>
Date: Thu,  4 Apr 2019 13:46:51 -0500

> On some platforms ACPI method `\\_SB.AMAC` is dynamic and changes to it can
> influence changing the behavior of MAC pass through and what MAC address is used.
> 
> When running USB reset, re-read the MAC address to use to support tools that
> change the policy.
> 
> This is quite similar to using `SIOCSIFHWADDR` except that the actual MAC to use
> comes from ASL rather than from userspace.
> 
> Changes from v1:
>  * Remove an extra unneeded `ether_addr_copy` call
>  * Use `dev_set_mac_address` to ensure all notifiers are called
>  * Shuffle functions to allow code re-use.

Series applied to net-next.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ