lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <9ded85ef-46f1-4682-aabd-531401b511e5@molgen.mpg.de>
Date: Fri, 21 Feb 2025 21:40:25 +0100
From: Paul Menzel <pmenzel@...gen.mpg.de>
To: Bartosz Golaszewski <bartosz.golaszewski@...aro.org>,
 Linus Walleij <linus.walleij@...aro.org>
Cc: linux-gpio@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
 linux-pci@...r.kernel.org, regressions@...ts.linux.dev
Subject: Linux logs new warning `gpio gpiochip0: gpiochip_add_data_with_key:
 get_direction failed: -22`

Dear Bartosz,


On the Intel Kaby Lake Dell XPS 13 9360, Linux 6.14-rc3+ with your 
commit 9d846b1aebbe (gpiolib: check the return value of 
gpio_chip::get_direction()) prints 52 new warnings:

     $ dmesg
     […]
     [    0.000000] DMI: Dell Inc. XPS 13 9360/0596KF, BIOS 2.21.0 
06/02/2022
     […]
     [    5.148927] pci 0000:00:1d.0: PCI bridge to [bus 3c]
     [    5.150955] gpio gpiochip0: gpiochip_add_data_with_key: 
get_direction failed: -22
     [50 times the same]
     [    5.151639] gpio gpiochip0: gpiochip_add_data_with_key: 
get_direction failed: -22
     [    5.151768] ACPI: PCI: Interrupt link LNKA configured for IRQ 11
     […]
     $ lspci -nn -k -s 1d.0
     00:1d.0 PCI bridge [0604]: Intel Corporation Sunrise Point-LP PCI 
Express Root Port #9 [8086:9d18] (rev f1)
     	Subsystem: Dell Device [1028:075b]
     	Kernel driver in use: pcieport

Judging from the commit messages, this is expected. But what should a 
user seeing this do now?

Also, it probably should not be applied to the stable series, as people 
might monitor warnings and new warnings in stable series might be 
unexpected.


Kind regards,

Paul


[1]: 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d846b1aebbe488f245f1aa463802ff9c34cc078

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ