lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <cb12d8d3-229c-4ef9-b585-778772b34ac7@molgen.mpg.de>
Date: Fri, 14 Mar 2025 13:25:52 +0100
From: Paul Menzel <pmenzel@...gen.mpg.de>
To: Bartosz Golaszewski <brgl@...ev.pl>
Cc: Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
 Bartosz Golaszewski <bartosz.golaszewski@...aro.org>,
 Linus Walleij <linus.walleij@...aro.org>, linux-gpio@...r.kernel.org,
 LKML <linux-kernel@...r.kernel.org>, linux-pci@...r.kernel.org,
 regressions@...ts.linux.dev
Subject: Re: Linux logs new warning `gpio gpiochip0:
 gpiochip_add_data_with_key: get_direction failed: -22`

Dear Bartosz,


Am 14.03.25 um 13:19 schrieb Bartosz Golaszewski:
> On Fri, Mar 14, 2025 at 12:54 PM Paul Menzel <pmenzel@...gen.mpg.de> wrote:
>>>>>
>>>>> Brief looking at the error descriptions and the practical use the best (and
>>>>> unique enough) choice may be EBADSLT.
>>>>
>>>> In any case, I proposed to revert to the previous behavior in
>>>> gpiochip_add_data() in my follow-up series so the issue should soon go
>>>> away.
>>>
>>> Yes, I noted. The above is a material to discuss. We can make that semantics
>>> documented and strict and then one may filter out those errors if/when
>>> required.
>>
>> I am still seeing this with 6.14.0-rc6-00022-gb7f94fcf5546. Do you know,
>> if the reverts are going to be in the final 6.14 release?
> 
> linux-next should probably be a better point of reference. I'm about
> to send out my PR to Linus so it'll be in 6.14-rc7 alright.

Awesome. Thank you!


Kind regards,

Paul

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ