lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2025070810-nintendo-congenial-95d4@gregkh>
Date: Tue, 8 Jul 2025 09:33:18 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: Jie Deng <dengjie03@...inos.cn>
Cc: stern@...land.harvard.edu, linux-kernel@...r.kernel.org,
	linux-usb@...r.kernel.org, usb-storage@...ts.one-eyed-alien.net
Subject: Re: [PATCH v2] usb: storage: Ignore UAS driver for SanDisk Extreme
 Pro 55AF storage device

On Tue, Jul 08, 2025 at 01:55:47PM +0800, Jie Deng wrote:
> 2. Regarding your question, before submitting the patch,
> I conducted the following tests:
> 1) linux + x86: The SanDisk Extreme Pro 55AF device can be recognized
> normally when using the uas driver. USB controller model (VendorID:
> 1D94, DeviceID: 145F,Chengdu Haiguang IC Design Co., Ltd.USB 3.0 Host
> controller)

So it all works, great!

> 2) linux + arm64: The SanDisk Extreme Pro 55AF device will report an error
> when
> using the uas driver and the driver cannot be loaded. USB Controller model
> (Vendor ID: 1912, Device ID: 0014,uPD720201 USB 3.0 Host Controller).

Ok, that sounds like an arm64 issue we should resolve.  Why can the
driver not be loaded at all?  What happens?

> 3) linux + arm64: Add the parameter "USB-storage.quirks =0781:55af:u" in
> grub.
> The SanDisk Extreme Pro 55AF device runs the usb storage driver without any
> error
> and can be recognized normally.

Let's track down and fix the arm64 issue here please, and not paper over
it by saying that this whole device will not work well on all arches.

thakns,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ