lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <92c821fb-537a-40e6-98fc-616941b57778@panix.com>
Date: Mon, 13 Oct 2025 14:02:26 -0700
From: Kenneth Crudup <kenny@...ix.com>
To: Jameson Thies <jthies@...gle.com>, heikki.krogerus@...ux.intel.com,
 linux-usb@...r.kernel.org, linux-kernel@...r.kernel.org
Cc: dmitry.baryshkov@....qualcomm.com, bleung@...omium.org,
 gregkh@...uxfoundation.org, akuchynski@...omium.org,
 abhishekpandit@...omium.org, sebastian.reichel@...labora.com,
 linux-pm@...r.kernel.org, Kenneth C <kenny@...ix.com>
Subject: Re: [PATCH 0/6] UCSI Power Supply Updates and Bug Fixes


On 10/6/25 17:00, Jameson Thies wrote:

> This series includes the following minor changes to power supply
> handling by the UCSI driver.
...
> base-commit: e40b984b6c4ce3f80814f39f86f87b2a48f2e662

I wanted to let you know that on my Dell XPS-9320, this patchset ended 
up spamming (i.e., hundreds) my dmesg with the following:

power_supply ucsi-source-psy-USBC000:002: driver reporting unavailable 
enum value 7

... which I believe to be POWER_SUPPLY_USB_TYPE_PD_DRP .

In my case it was coming from the call to 
power_supply_show_enum_with_available() on/around line 380 in 
.../drivers/power/supply/power_supply_sysfs.c ; I'd tried adding 
POWER_SUPPLY_USB_TYPE_PD_DRP to con->psy_desc.usb_types in 
ucsi_register_port_psy() in
.../drivers/usb/typec/ucsi/psy.c thinking that may fix it with no success.

LMK if you need any further info,

-Kenny

-- 
Kenneth R. Crudup / Sr. SW Engineer, Scott County Consulting, Orange 
County CA


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ