lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 24 Feb 2022 18:43:14 +0100 From: Andrew Lunn <andrew@...n.ch> To: Jakub Kicinski <kuba@...nel.org> Cc: Mauri Sandberg <maukka@....kapsi.fi>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, Sebastian Hesselbarth <sebastian.hesselbarth@...il.com>, "David S. Miller" <davem@...emloft.net> Subject: Re: [PATCH v2] net: mv643xx_eth: process retval from of_get_mac_address On Thu, Feb 24, 2022 at 08:57:54AM -0800, Jakub Kicinski wrote: > On Wed, 23 Feb 2022 16:23:37 +0200 Mauri Sandberg wrote: > > Obtaining a MAC address may be deferred in cases when the MAC is stored > > in an NVMEM block, for example, and it may not be ready upon the first > > retrieval attempt and return EPROBE_DEFER. > > > > It is also possible that a port that does not rely on NVMEM has been > > already created when getting the defer request. Thus, also the resources > > allocated previously must be freed when doing a roll-back. > > > > Signed-off-by: Mauri Sandberg <maukka@....kapsi.fi> > > Cc: Andrew Lunn <andrew@...n.ch> > > While we wait for Andrew's ack, is this the correct fixes tag? > > Fixes: 76723bca2802 ("net: mv643xx_eth: add DT parsing support") Yes, that looks correct. The history around here is convoluted, and anybody trying to backport that far is going to need a few different versions. Reviewed-by: Andrew Lunn <andrew@...n.ch> Andrew
Powered by blists - more mailing lists