lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Jun 2024 17:02:22 +0100
From: Mark Brown <broonie@...nel.org>
To: Marc Kleine-Budde <mkl@...gutronix.de>
Cc: Stefan Moring <stefan.moring@...hnolution.nl>,
	Adam Butcher <adam@...samine.co.uk>,
	Benjamin Bigler <benjamin@...ler.one>,
	Fabio Estevam <festevam@...il.com>, s.hauer@...gutronix.de,
	linux-kernel@...r.kernel.org, Stefan Bigler <linux@...ler.io>,
	linux-spi@...r.kernel.org,
	Thorsten Scherer <T.Scherer@...elmann.de>,
	Clark Wang <xiaoning.wang@....com>, linux-imx@....com,
	kernel@...gutronix.de, Sebastian Reichel <sre@...nel.org>,
	shawnguo@...nel.org, Carlos Song <carlos.song@....com>,
	linux-arm-kernel@...ts.infradead.org
Subject: Re: [PATCH] spi: Increase imx51 ecspi burst length based on transfer
 length

On Tue, Jun 18, 2024 at 05:59:36PM +0200, Marc Kleine-Budde wrote:

> This patch (15a6af94a277 ("spi: Increase imx51 ecspi burst length based
> on transfer length")) is wrong and the 4 fixes on top of it don't
> finally fix it. I can send a series of 5 reverts, or a manually revert
> the burst length calculation to the original value in one patch.

A single revert should be fine and is probably clearer.

Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ