lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Z7gosm7PJMR0zCg4@eldamar.lan>
Date: Fri, 21 Feb 2025 08:18:10 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: Diederik de Haas <didi.debian@...ow.org>
Cc: Valentin Kleibel <valentin@...is.at>, Vinod Koul <vkoul@...nel.org>,
	Chukun Pan <amadeus@....edu.cn>, Heiko Stuebner <heiko@...ech.de>,
	Philipp Zabel <p.zabel@...gutronix.de>,
	Kishon Vijay Abraham I <kishon@...nel.org>,
	Jianfeng Liu <liujianfeng1994@...il.com>,
	linux-arm-kernel@...ts.infradead.org,
	linux-rockchip@...ts.infradead.org, linux-phy@...ts.infradead.org,
	linux-kernel@...r.kernel.org, Jonas Karlman <jonas@...boo.se>
Subject: Re: [PATCH v2 0/1] phy: rockchip: naneng-combphy: compatible reset
 with old DT

Hi,

On Tue, Feb 18, 2025 at 12:45:34PM +0100, Diederik de Haas wrote:
> On Tue Feb 11, 2025 at 2:03 PM CET, Valentin Kleibel wrote:
> >>> Chukun Pan (1):
> >>>    phy: rockchip: naneng-combphy: compatible reset with old DT
> >> 
> >> Applied, thanks!
> >> 
> >> [1/1] phy: rockchip: naneng-combphy: compatible reset with old DT
> >>        commit: bff68d44135ce6714107e2f72069a79476c8073d
> >
> > Thanks for your work!
> > We found your patch after NVMes stopped working on a rock 3A with newer 
> > kernels and successfully applied it to kernel 6.1.128 (currently in debian).
> 
> FTR: I've reported it in Debian here: https://bugs.debian.org/1098250
> 
> I confirmed it (also) broke on kernel 6.12.8-1.

FWIW, we have several users in Debian reporting the problem, so if it
can be applied to mainline and then flow down to one of the next round
of stable series down to 6.1.y that would be highly appreicated.

Diederik, if you were able to test the fix, you might contribute a
Tested-by (although as I undestsand its not strictly needed at this
point as commit should be on way to mainline and stable series)?

Regards,
Salvatore

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ