lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <cc342555d3b343d59a7824a7e20d0907@realtek.com>
Date:   Tue, 2 Jun 2020 07:13:26 +0000
From:   吳昊澄 Ricky <ricky_wu@...ltek.com>
To:     Philip Schwartz <philquadra@...il.com>,
        Randy Dunlap <rdunlap@...radead.org>
CC:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "Greg Kroah-Hartman" <gregkh@...uxfoundation.org>,
        Ulf Hansson <ulf.hansson@...aro.org>,
        linux-mmc <linux-mmc@...r.kernel.org>
Subject: RE: Bug in your kernel since version 5.2

Hi Philip,

We can't reproduce this problem on general platform on our side, it works well on our platforms that we have, 
but we don’t have NUC7PJYH platform to check this.

This patch (bede03a579b3b4a036003c4862cc1baa4ddc351f) should not affect rts5229, we didn’t do anything on rts5229

Ricky    

> -----Original Message-----
> From: Philip Schwartz [mailto:philquadra@...il.com]
> Sent: Tuesday, June 02, 2020 8:52 AM
> To: Randy Dunlap
> Cc: linux-kernel@...r.kernel.org; 吳昊澄 Ricky; Greg Kroah-Hartman; Ulf
> Hansson; linux-mmc
> Subject: Re: Bug in your kernel since version 5.2
> 
> Thanks, I'll check it out.
> 
> On Mon, Jun 1, 2020 at 7:35 PM Randy Dunlap <rdunlap@...radead.org> wrote:
> >
> > [adding Cc:s and comments]
> >
> >
> > On 6/1/20 3:52 PM, Philip Schwartz wrote:
> > > This is my sixth attempt to send a bug report.
> > >
> > > The first time you didn't like my email address.
> > > The second time you didn't like that I copied the whole url.
> > > The third time you didn't like that the part of the url that I copied
> > > looked a bit like a url.
> > > The fourth time you complained that "The message contains HTML
> > > subpart,therefore we consider it SPAM"
> >
> > Yes.
> >
> > > The fifth time you didn't like ?????????.
> > >
> > > Kernel dot org Bugzilla       I D equals  204003
> > >
> > >
> > > I look forward to your email rejection message.
> >
> >
> > Please see https://bugzilla.kernel.org/show_bug.cgi?id=204003
> >
> > Several people are having problems with Intel NUCs and/or
> > the RTS5229 PCI Express Card Reader/driver, beginning with
> > 5.1-rc1.
> >
> > Here is one bugzilla comment:
> > Did a git bisect and found the culprit.
> >
> > bede03a579b3b4a036003c4862cc1baa4ddc351f is the first bad commit
> > commit bede03a579b3b4a036003c4862cc1baa4ddc351f
> > Author: RickyWu <ricky_wu@...ltek.com>
> > Date:   Tue Feb 19 20:49:58 2019 +0800
> >
> >     misc: rtsx: Enable OCP for rts522a rts524a rts525a rts5260
> >
> >     this enables and adds OCP function for Realtek A series cardreader chips
> >     and fixes some OCP flow in rts5260.c
> >
> >     Signed-off-by: RickyWu <ricky_wu@...ltek.com>
> >     Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
> >
> > :040000 040000 65bfdc473b7b85cb423ff528309fc92d73eae5b4
> 1292d8564f678027d0e5c77550e37d696b134b28 M      drivers
> >
> > Just revert that and you'll be golden.
> >
> > rts522a,rts524a,rts525a,rts5260
> > So somehow OCP got enabled for rts5229 unless a means rts522x. I guess they
> need to make sure its not enabled for 5229.
> > {end of bugzilla comment}
> >
> >
> >
> > --
> > ~Randy
> >
> 
> ------Please consider the environment before printing this e-mail.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ