diff options
author | Stijn Tintel <stijn@linux-ipv6.be> | 2024-04-26 19:40:17 +0300 |
---|---|---|
committer | Stijn Tintel <stijn@linux-ipv6.be> | 2024-04-26 19:56:19 +0300 |
commit | 2c0cec1eb02fe90b25ae5c87c35ab14f9f2219db (patch) | |
tree | 57921d3bce7f5e43b024f2e810f9da2132f35d11 /target/linux/generic/hack-6.1 | |
parent | f4346438577d8f6d830dff5167e4a78a670e7179 (diff) |
kernel: move mv88e6xxx fix to generic backports
The backports introduced in commit d40756563c46 ("kernel: backport
phylink changes from mainline Linux") broke the mv88e6xxx DSA driver.
A backport to fix this was added to the kirkwood target, but as it is
used in multiple targets, and there's a kmod package for it, the fix
should be in generic backports.
This fixes the switch on the WatchGuard Firebox M300 when running the
6.1 testing kernel.
There is no need to backport the fix for the 6.6 kernel, as it was
included in 6.6.5.
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
Diffstat (limited to 'target/linux/generic/hack-6.1')
-rw-r--r-- | target/linux/generic/hack-6.1/711-net-dsa-mv88e6xxx-disable-ATU-violation.patch | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/target/linux/generic/hack-6.1/711-net-dsa-mv88e6xxx-disable-ATU-violation.patch b/target/linux/generic/hack-6.1/711-net-dsa-mv88e6xxx-disable-ATU-violation.patch index f09ad117b0..54f654ccab 100644 --- a/target/linux/generic/hack-6.1/711-net-dsa-mv88e6xxx-disable-ATU-violation.patch +++ b/target/linux/generic/hack-6.1/711-net-dsa-mv88e6xxx-disable-ATU-violation.patch @@ -9,7 +9,7 @@ Subject: [PATCH] net/dsa/mv88e6xxx: disable ATU violation --- a/drivers/net/dsa/mv88e6xxx/chip.c +++ b/drivers/net/dsa/mv88e6xxx/chip.c -@@ -3488,6 +3488,9 @@ static int mv88e6xxx_setup_port(struct m +@@ -3500,6 +3500,9 @@ static int mv88e6xxx_setup_port(struct m else reg = 1 << port; |