lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20160720.210539.1359336662914040693.davem@davemloft.net> Date: Wed, 20 Jul 2016 21:05:39 -0700 (PDT) From: David Miller <davem@...emloft.net> To: gwshan@...ux.vnet.ibm.com Cc: netdev@...r.kernel.org, benh@...nel.crashing.org, David.Laight@...LAB.COM Subject: Re: [PATCH net-next v2] net/faraday: Disallow using reversed MAC address from hardware From: Gavin Shan <gwshan@...ux.vnet.ibm.com> Date: Thu, 21 Jul 2016 11:42:54 +1000 > The initial MAC address is retrieved from hardware if it's not > provided by device-tree. The reserved MAC address from hardware > will be used if non-reserved MAC address is invalid. It will > cause mismatched MAC address seen by hardware and software. > > This disallows using the reserved hardware MAC address to avoid > the mismatched MAC address seen by hardware and software. > > Fixes: 113ce107afe9 ("net/faraday: Read MAC address from chip") > Suggested-by: David Laight <David.Laight@...LAB.COM> > Suggested-by: Benjamin Herrenschmidt <benh@...nel.crashing.org> > Signed-off-by: Gavin Shan <gwshan@...ux.vnet.ibm.com> > --- > v2: Add "net-next" in the subject Makes sense, applied, thanks.
Powered by blists - more mailing lists