[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
<TYUPR06MB6217AEF9DD73C9424C7C1D07D28C2@TYUPR06MB6217.apcprd06.prod.outlook.com>
Date: Mon, 19 Aug 2024 08:26:41 +0000
From: 胡连勤 <hulianqin@...o.com>
To: "gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>
CC: Michael Nazzareno Trimarchi <michael@...rulasolutions.com>,
"quic_prashk@...cinc.com" <quic_prashk@...cinc.com>,
"quic_jjohnson@...cinc.com" <quic_jjohnson@...cinc.com>,
"linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
opensource.kernel <opensource.kernel@...o.com>, "akpm@...ux-foundation.org"
<akpm@...ux-foundation.org>
Subject:
答复: 答复: [PATCH v1] usb: gadget: u_serial: check Null pointer in EP callback
Hello linux community expert:
>>I think this has been reported previously, and different patches have been proposed, have you searched the archives?
> I haven't seen the patch given below before, I will read it carefully.
> I searched for Linux mainline commits before submitting, but I only compared them according to the crash stack information and did not notice the following commit.
I checked the stack trace again. The problem we encountered seems different from the problem reported in the link below, and they are not caused by the same reason.
>>Specifically, take a look at:
>>https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flore.
>>kernel.org%2Fr%2F20240116141801.396398-1-khtsai%40google.com&data=05%7C
>>02%7Chulianqin%40vivo.com%7Ca4b06e9db7bb43ab1bfc08dcbe01a836%7C923e42dc
>>48d54cbeb5821a797a6412ed%7C0%7C0%7C638594161566475032%7CUnknown%7CTWFpb
>>GZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%
>>3D%7C0%7C%7C%7C&sdata=pdb%2B1b1qB1q2%2BZN096D9jxNytfN7%2Fo50DPt6pq5m1RU
>>%3D&reserved=0
Thanks
Powered by blists - more mailing lists