lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 24 Feb 2021 18:25:51 +0100
From:   Sedat Dilek <sedat.dilek@...il.com>
To:     Mathias Nyman <mathias.nyman@...el.com>
Cc:     linux-usb@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [xhci] usb 4-1: reset SuperSpeed Gen 1 USB device number 2 using xhci_hcd

On Wed, Feb 24, 2021 at 2:44 PM Sedat Dilek <sedat.dilek@...il.com> wrote:
>
> Hi Mathias,
>
> I am here on Linux-v5.11-10201-gc03c21ba6f4e.
>
> I see a lot xhci-resets in my dmesg-log:
>
> root# LC_ALL=C dmesg -T | grep 'usb 4-1: reset SuperSpeed Gen 1 USB
> device number 2 using xhci_hcd' | wc -l
> 75
>
> This is what I have:
>
> root# lsusb -s 004:001
> Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
>
> root# lsusb -s 004:002
> Bus 004 Device 002: ID 174c:55aa ASMedia Technology Inc. ASM1051E SATA
> 6Gb/s bridge, ASM1053E SATA 6Gb/s bridge, ASM1153 SATA 3Gb/s bridge,
> ASM1153E SATA 6Gb/s bridge
>
> My external USB 3.0 HDD contains the partition with my Debian-system
> and is attached to the above xhci bus/device.
>
> Can you enlighten what this means?
> Is this a known issue?
> Is there a fix around?
>
> BTW, in which Git tree is the xhci development happening?
> Can you point me to it?
>
> I am attaching my linux-config and full dmesg-log.
>
> Also I have attached outputs of:
>
> $ sudo lsusb -vvv -d 1d6b:0003
> $ sudo lsusb -vvv -d 174c:55aa
>
> If you need further information, please let me know.
>
> Thanks.
>

Looks like that xhci-reset happens here every 10min.

- Sedat -

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ