lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20141208204735.GA21599@amd>
Date:	Mon, 8 Dec 2014 21:47:35 +0100
From:	Pavel Machek <pavel@....cz>
To:	pali.rohar@...il.com, sre@...ian.org, sre@...g0.de,
	kernel list <linux-kernel@...r.kernel.org>,
	linux-arm-kernel <linux-arm-kernel@...ts.infradead.org>,
	linux-omap@...r.kernel.org, tony@...mide.com, khilman@...nel.org,
	aaro.koskinen@....fi, freemangordon@....bg
Cc:	balbi@...com, Greg KH <greg@...ah.com>, marcel@...tmann.org
Subject: nokia_h4p on 3.16+

Hi!

It seems commit:

commit bd5dc09f557547399cd44d0a1224df7ff64e4a6b
Author: Felipe Balbi <balbi@...com>
Date:   Wed Apr 23 09:58:28 2014 -0500

    serial: fix UART_IIR_ID

    UART IRQ Identification bitfield is 3
        bits long (bits 3:1) but current mask only
	    masks 2 bits. Fix it.

Signed-off-by: Felipe Balbi <balbi@...com>
Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>

breaks bluetooth driver on n900. (drivers/staging/nokia_h4p).

Pali, you may want to revert the patch.

That is good news, because reverting it on 3.18-rcX brings h4p back,
too (and as machine boots on nfsroot, debugging should be possible.)

Best regards,
									Pavel
-- 
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ