lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 10 Oct 2022 14:53:35 +0300
From:   Vladimir Oltean <>
To:     Sasha Levin <>
        Marcus Carlberg <>,
        Jakub Kicinski <>,,,,,,,
Subject: Re: [PATCH AUTOSEL 5.19 15/73] net: dsa: mv88e6xxx: Allow external
 SMI if serial

On Sun, Oct 09, 2022 at 06:13:53PM -0400, Sasha Levin wrote:
> From: Marcus Carlberg <>
> [ Upstream commit 8532c60efcc5b7b382006129b77aee2c19c43f15 ]
> p0_mode set to one of the supported serial mode should not prevent
> configuring the external SMI interface in
> mv88e6xxx_g2_scratch_gpio_set_smi. The current masking of the p0_mode
> only checks the first 2 bits. This results in switches supporting
> serial mode cannot setup external SMI on certain serial modes
> (Ex: 1000BASE-X and SGMII).
> Extend the mask of the p0_mode to include the reduced modes and
> serial modes as allowed modes for the external SMI interface.
> Signed-off-by: Marcus Carlberg <>
> Link:
> Signed-off-by: Jakub Kicinski <>
> Signed-off-by: Sasha Levin <>
> ---

Not needed for stable kernels, please drop, thanks.

Powered by blists - more mailing lists