lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <273f132d1c07b0f84c05712086e68c9abb889ab5.camel@microchip.com> Date: Tue, 4 Apr 2023 15:15:38 +0000 From: <Arun.Ramadoss@...rochip.com> To: <olteanv@...il.com>, <andrew@...n.ch>, <f.fainelli@...il.com>, <kuba@...nel.org>, <edumazet@...gle.com>, <pabeni@...hat.com>, <o.rempel@...gutronix.de>, <Woojung.Huh@...rochip.com>, <davem@...emloft.net> CC: <linux-kernel@...r.kernel.org>, <netdev@...r.kernel.org>, <UNGLinuxDriver@...rochip.com>, <kernel@...gutronix.de> Subject: Re: [PATCH net-next v1 7/7] net: dsa: microchip: Utilize error values in ksz8_w_sta_mac_table() Hi Oleksij, On Tue, 2023-04-04 at 12:18 +0200, Oleksij Rempel wrote: > EXTERNAL EMAIL: Do not click links or open attachments unless you > know the content is safe > > To handle potential read/write operation failures, update > ksz8_w_sta_mac_table() to make use of the return values provided by > read/write functions. > > Signed-off-by: Oleksij Rempel <o.rempel@...gutronix.de> Acked-by: Arun Ramadoss <arun.ramadoss@...rochip.com>
Powered by blists - more mailing lists