lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5b2fa0d9-7d11-4091-8894-1b1ff575343a@kernel.org>
Date: Tue, 21 Jan 2025 09:42:48 +0100
From: Jiri Slaby <jirislaby@...nel.org>
To: Andre Werner <andre.werner@...tec-electronic.com>,
 gregkh@...uxfoundation.org, hvilleneuve@...onoff.com, andy@...nel.org
Cc: linux-kernel@...r.kernel.org, linux-serial@...r.kernel.org,
 lech.perczak@...lingroup.com, Maarten.Brock@...ls.nl
Subject: Re: [PATCH v4] serial: sc16is7xx: Fix IRQ number check behavior

On 21. 01. 25, 8:18, Andre Werner wrote:
> The logical meaning of the previous version is wrong due to a typo.
> 
> If the IRQ equals 0, no interrupt pin is available and polling mode
> shall be used.
> 
> Additionally, this fix adds a check for IRQ < 0 to increase robustness,
> because documentation still says that negative IRQ values cannot be
> absolutely ruled-out.
> 
> Fixes: 104c1b9dde9d859dd01bd2d ("serial: sc16is7xx: Add polling mode if no IRQ pin is available")
> 
> Signed-off-by: Andre Werner <andre.werner@...tec-electronic.com>

Reviewed-by: Jiri Slaby <jirislaby@...nel.org>

-- 
js
suse labs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ