lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <168544561937.20232.12382191599328367087.git-patchwork-notify@kernel.org> Date: Tue, 30 May 2023 11:20:19 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Heiner Kallweit <hkallweit1@...il.com> Cc: kuba@...nel.org, davem@...emloft.net, nic_swsd@...ltek.com, edumazet@...gle.com, pabeni@...hat.com, netdev@...r.kernel.org Subject: Re: [PATCH net-next] r8169: check for PCI read error in probe Hello: This patch was applied to netdev/net-next.git (main) by Paolo Abeni <pabeni@...hat.com>: On Sun, 28 May 2023 19:35:12 +0200 you wrote: > Check whether first PCI read returns 0xffffffff. Currently, if this is > the case, the user sees the following misleading message: > unknown chip XID fcf, contact r8169 maintainers (see MAINTAINERS file) > > Signed-off-by: Heiner Kallweit <hkallweit1@...il.com> > --- > drivers/net/ethernet/realtek/r8169_main.c | 9 ++++++++- > 1 file changed, 8 insertions(+), 1 deletion(-) Here is the summary with links: - [net-next] r8169: check for PCI read error in probe https://git.kernel.org/netdev/net-next/c/bc590b475492 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists