From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E87A638656D for ; Mon, 23 Mar 2026 09:29:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774258174; cv=none; b=Lq8omzlFjyNLQFzsli3HPbfZYwKutVl2sxjlNfiSqpousXWG6BMU6DZHtrFwUbfQBJ0ize1pyZ5+qvnEbrNQ5W2HfCCTqmWX/v7OWBSHFtFpXVFlxl+t+6OcAyXyuyCuMqCgsLpZq9wYgthrCdTpkkoOnd7qRjD2Qd8O9nN69ow= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774258174; c=relaxed/simple; bh=f74ATWNNn+axKP/voR3C5P4uQqjt6xMaqiv8LFrSIpc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Jz4oxpQ08XHTmQNwUrkqFqavWkNTXLlMtC0KsdYo1MoEhpkYItPCgeXwW9ey1Wlutu+2QosTKt+GtALvAPfnGzpLMyHiP3S7Bgl6zuwsT4IfsOcFiFXc4YKNKqtiUskcUwUBYvVS/xclL9yFVrCAVp8nAlQv9uzRSUyZ49Ei3Ss= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=WzFLVFFm; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="WzFLVFFm" Received: by smtp.kernel.org (Postfix) with ESMTPSA id D7AA1C2BC9E; Mon, 23 Mar 2026 09:29:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1774258173; bh=f74ATWNNn+axKP/voR3C5P4uQqjt6xMaqiv8LFrSIpc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=WzFLVFFmy2j3bEzZxty27lkFHuOeDrTAOpFK2KR0fRbrnVLHuQeuC/b2JUkVy8Wph gK/GdTbb3k8yL6baATH/j6PxcCddnbIeOGL50hk4jtowNBUka5jM5uARmHfTqaj1/Y viuPjKl8XacLWD1+3LDnkY3Yt6ZWu8JVoVwXnYXk= Date: Mon, 23 Mar 2026 10:29:11 +0100 From: Greg KH To: "Zhang, Liyin (CN)" Cc: stable@vger.kernel.org Subject: Re: Backport request for two spi-nor otcal dtr odd length/address reads and writes patches to 6.12.y. Message-ID: <2026032300-dictation-upper-71a6@gregkh> References: <55ce141a-09fa-404a-9932-1e1d4b0ad034@windriver.com> Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <55ce141a-09fa-404a-9932-1e1d4b0ad034@windriver.com> On Mon, Mar 23, 2026 at 03:53:09PM +0800, Zhang, Liyin (CN) wrote: > Hi stable team, > > Please consider applying the following mainlined patches to the 6.12.y > stable tree: > >   commit f156b23df6a84efb2f6686156be94d4988568954 >   "mtd: spi-nor: core: avoid odd length/address reads on 8D-8D-8D mode" > >   commit 17926cd770ec837ed27d9856cf07f2da8dda4131 >   "mtd: spi-nor: core: avoid odd length/address writes in 8D-8D-8D mode" > > Both patches are already present in mainline, 6.19, and 6.18. > > Both patches fix the same class of bug: Octal DTR (8D-8D-8D) mode requires > both the start address and transfer length to be even. > And we actually encounter the same issues on different hardwares which > supporting octal dtr in multiple earlier releases. > > Now these two patches can be cleanly applied to 6.12 branch. > Would you please help backport them to 6.12 first? Now queued up, thanks. greg k-h