lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <s35lzbqfogeaoog4yhqki2b6hkpuepkhd6w5ln7w3e2y5h6uzy@5qdy4tpi4evb>
Date: Thu, 19 Sep 2024 17:04:01 +0300
From: Serge Semin <fancer.lancer@...il.com>
To: Andy Shevchenko <andriy.shevchenko@...ux.intel.com>, 
	Ferry Toth <ftoth@...londelft.nl>, Ferry Toth <fntoth@...il.com>
Cc: Ferry Toth <ftoth@...londelft.nl>, Viresh Kumar <vireshk@...nel.org>, 
	Vinod Koul <vkoul@...nel.org>, Ilpo Järvinen <ilpo.jarvinen@...ux.intel.com>, 
	Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Jiri Slaby <jirislaby@...nel.org>, dmaengine@...r.kernel.org, 
	linux-serial@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH RESEND v4 1/6] dmaengine: dw: Add peripheral bus width
 verification

Hi Andy, Ferry

On Mon, Sep 16, 2024 at 03:46:44PM +0300, Andy Shevchenko wrote:
> On Mon, Sep 16, 2024 at 02:57:56PM +0300, Andy Shevchenko wrote:
> > On Mon, Sep 16, 2024 at 02:45:41PM +0300, Andy Shevchenko wrote:
> 
> ...
> 
> > Okay that was the theory, now I made a hack patch, i.e. supply 0 in acpi.c in
> > the filter function and everything starts to work. So, my theory is correct.
> 
> FWIW, I have reapplied the whole series and it seems fine, so the only regression
> is that I described in the previous replies.

Just submitted a fix of the issue based on the Andy' and my problem
investigation. You've been Cc'ed. Please test the patch out on your
hardware:
https://lore.kernel.org/dmaengine/20240919135854.16124-1-fancer.lancer@gmail.com

Hope it works.

-Serge(y)

> 
> -- 
> With Best Regards,
> Andy Shevchenko
> 
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ