lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220714175857.933537-1-anthony.l.nguyen@intel.com>
Date:   Thu, 14 Jul 2022 10:58:54 -0700
From:   Tony Nguyen <anthony.l.nguyen@...el.com>
To:     davem@...emloft.net, kuba@...nel.org, pabeni@...hat.com,
        edumazet@...gle.com
Cc:     Tony Nguyen <anthony.l.nguyen@...el.com>, netdev@...r.kernel.org,
        sasha.neftin@...el.com
Subject: [PATCH net 0/3][pull request] Intel Wired LAN Driver Updates 2022-07-14

This series contains updates to e1000e and igc drivers.

Sasha re-enables GPT clock when exiting s0ix to prevent hardware unit
hang and reverts a workaround for this issue on e1000e.

Lennert Buytenhek restores checks for removed device while accessing
registers to prevent NULL pointer dereferences for igc.

The following are changes since commit cd72e61bad145a0968df85193dcf1261cb66c4c6:
  selftests/net: test nexthop without gw
and are available in the git repository at:
  git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue 1GbE

Lennert Buytenhek (1):
  igc: Reinstate IGC_REMOVED logic and implement it properly

Sasha Neftin (2):
  e1000e: Enable GPT clock before sending message to CSME
  Revert "e1000e: Fix possible HW unit hang after an s0ix exit"

 drivers/net/ethernet/intel/e1000e/hw.h      |  1 -
 drivers/net/ethernet/intel/e1000e/ich8lan.c |  4 ---
 drivers/net/ethernet/intel/e1000e/ich8lan.h |  1 -
 drivers/net/ethernet/intel/e1000e/netdev.c  | 30 +++------------------
 drivers/net/ethernet/intel/igc/igc_main.c   |  3 +++
 drivers/net/ethernet/intel/igc/igc_regs.h   |  5 +++-
 6 files changed, 11 insertions(+), 33 deletions(-)

-- 
2.35.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ