aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/ath79/patches-5.10/0062-MIPS-pci-ar724x-add-QCA9550-reset-sequence.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2022-06-21 15:21:44 -0300
committerHauke Mehrtens <hauke@hauke-m.de>2022-06-27 22:34:07 +0200
commitf91b0d7a92c5927db9eb6610628d931e3104cd41 (patch)
tree0605edd4d11dc47bb6b1548fe832335ae15346f7 /target/linux/ath79/patches-5.10/0062-MIPS-pci-ar724x-add-QCA9550-reset-sequence.patch
parent2b392383e62ce37b2be13e1cf4dc6c328e32d2ee (diff)
downloadupstream-f91b0d7a92c5927db9eb6610628d931e3104cd41.tar.gz
upstream-f91b0d7a92c5927db9eb6610628d931e3104cd41.tar.bz2
upstream-f91b0d7a92c5927db9eb6610628d931e3104cd41.zip
wolfssl: disable AES-NI by default for x86_64
WolfSSL is crashing with an illegal opcode in some x86_64 CPUs that have AES instructions but lack other extensions that are used by WolfSSL when AES-NI is enabled. Disable the option by default for now until the issue is properly fixed. People can enable them in a custom build if they are sure it will work for them. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com> (cherry picked from commit 0bd536723303ccd178e289690d073740c928bb34)
Diffstat (limited to 'target/linux/ath79/patches-5.10/0062-MIPS-pci-ar724x-add-QCA9550-reset-sequence.patch')
0 files changed, 0 insertions, 0 deletions