lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4290af18-cd89-4d87-95d5-d24674fa2d60@hartkopp.net>
Date: Mon, 19 Jan 2026 09:22:46 +0100
From: Oliver Hartkopp <socketcan@...tkopp.net>
To: Francesco Dolcini <francesco@...cini.it>,
 Marc Kleine-Budde <mkl@...gutronix.de>, Vincent Mailhol <mailhol@...nel.org>
Cc: linux-can@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: 6.19.0-rc6 CAN regression

If you can't apply the fix or you want to stay on the 6.19-rc6 upstream 
kernel, it is also possible to make a workaround with the "ip" tool you 
use for the bitrate configuration.

The issued does not show up, when the ctrlmode is changed(!), e.g. when 
you enable triple-sampling, one-shot or cc-len8-dlc mode:

Instead of

# ip link set can0 type can bitrate 500000

try

# ip link set can0 type can bitrate 500000 cc-len8-dlc on

But the fix will be in the mainline repo soon.

Best regards,
Oliver


On 19.01.26 08:52, Oliver Hartkopp wrote:
> Hello Francesco,
> 
> On 19.01.26 08:17, Francesco Dolcini wrote:
>> Hello,
>> there is some issue with CAN on the latest linux 6.19 RC,
>> canfdtest fails with `send failed: Invalid argument` fails on various
>> SoC (NXP i.MX8MP, i.MX8QM, i.MX6 ... and TI AM62 and maybe more).
>>
>> Is this known and already being addressed? I have seen some recent PR
>> and patches, but I am not sure they are fixing this issue.
> 
> Yes, this is already fixed here:
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can.git/log/? 
> h=testing
> 
> in this patch:
> "can: dev: alloc_candev_mqs(): add missing default CAN capabilities"
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can.git/ 
> commit/?h=testing&id=375629c92fd842bc2a229bb34c4453f62e097169
> 
> The PR is waiting for upstream:
> https://lore.kernel.org/linux-can/20260116200323.366877-1- 
> mkl@...gutronix.de/
> 
> When you apply the above patch, it should just work again.
> 
> Best regards,
> Oliver


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ