lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Tue, 14 Nov 2017 11:49:50 -0800
From:   Doug Anderson <dianders@...omium.org>
To:     Alyssa Rosenzweig <alyssa@...enzweig.io>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        Felipe Balbi <balbi@...nel.org>
Subject: Re: [PATCH v2] usb: dwc2: host: Don't retry NAKed transactions right away

Hi,

On Sat, Nov 11, 2017 at 9:08 PM, Alyssa Rosenzweig <alyssa@...enzweig.io> wrote:
> This patch also fixes issues with certain USB wi-fi dongles
> (in particular, those based on the AR9271). The support is still not
> flawless -- it appears that there remain issues with autosuspend -- but
> this patch definitely improves the situation. Thanks :)

Thanks for your report!  Hearing things like this makes me happy I
spent the time to debug this problem.  :)  Since you CCed LKML I'd
assume you're OK with adding this tag to the commit:

Tested-by: Alyssa Rosenzweig <alyssa@...enzweig.io>

It would have been better if you had actually done a Reply to the
original patch to get everyone CCed.  If you weren't subscribed to the
lists originally, sometimes you can get enough headers for a
reply-to-all by downloading the "mbox" from patchwork.kernel.org,
opening the mbox with mutt, and bouncing it to yourself.  In any case,
I've at least added Felipe to this email so he's aware of your
testing.  It's my current understanding that Felipe is planning to add
this patch to a tree of his whenever he deems it to be the right time,
possibly after the current merge window.  ;)

-Doug

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ