lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <fff4ac08-cab8-4b56-a4de-29de735d0942@heusel.eu>
Date: Wed, 16 Apr 2025 16:22:22 +0200
From: Christian Heusel <christian@...sel.eu>
To: ubomir Rintel <lkundrak@...sk>, Jakub Kicinski <kuba@...nel.org>
Cc: michal.pecio@...il.com, Andrew Lunn <andrew+netdev@...n.ch>, 
	"David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, 
	Paolo Abeni <pabeni@...hat.com>, linux-usb@...r.kernel.org, netdev@...r.kernel.org, 
	linux-kernel@...r.kernel.org, regressions@...ts.linux.dev
Subject: Re: [REGRESSION][BISECTED] USB tethering broken after 67d1a8956d2d

On 25/04/16 04:15PM, Christian Heusel wrote:
> Hello everyone,
> 
> I have recently noticed multiple issues popping up in the Arch Linux
> Support fora and in the Gentoo bugtracker (see links below) where people
> could not use USB tethering anymore after upgrading to 6.14.2.
> 
> MichaƂ Pecio on the Kernel Bugzilla eyeballed the issue within the
> mainline kernel tree to the following commit (that was backported to
> stable):
> 
>     67d1a8956d2d ("rndis_host: Flag RNDIS modems as WWAN devices")
> 
> The error is still present in the latest mainline release 6.15-rc2 and
> reverting the culprit on top of mainline fixes the issue.
> 
> Also the issue (as stated above) is already reported on the Kernel
> Bugzilla but it seems like none of the actual developers has spotted it
> yet, hence I'm amplifying it to the mailing lists.
> 
> I have attached a dmesg output from a good boot (6.15-rc2 with the patch
> reverted) and one from where the failure occurs (regular 6.15-rc2). I'm
> happy to test any debug patches or provide more information if needed.

... of course I forgot the attachment :p
Now added!

View attachment "dmesg-6.15-rc2-1.1-GOOD.log" of type "text/plain" (101250 bytes)

View attachment "dmesg-6.15-rc2-1-BAD.log" of type "text/plain" (102789 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ