We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_set_tso_max_size() or _segs() at this point. Move those netif calls to ef100_probe_netdev(), and also replace netif_err within the design params code with pci_err.
Reserved 2025-04-16 | Published 2025-04-18 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/e56391011381d6d029da377a65ac314cb3d5def2
git.kernel.org/...c/8241ecec1cdc6699ae197d52d58e76bddd995fa5
Support options