lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0e708039-1a1d-92a8-28c5-ebb69cd1aad0@debian.org>
Date:   Mon, 6 Mar 2023 14:51:09 +0100
From:   Bastian Germann <bage@...ian.org>
To:     Kalle Valo <kvalo@...nel.org>
Cc:     toke@...e.dk, linux-wireless@...r.kernel.org,
        netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 1/1] wifi: ath9k: Remove Qwest/Actiontec 802AIN ID

Am 06.03.23 um 14:49 schrieb Kalle Valo:
> Bastian Germann <bage@...ian.org> writes:
> 
>> Am 06.03.23 um 14:07 schrieb Kalle Valo:
>>> Bastian Germann <bage@...ian.org> writes:
>>>
>>>> The USB device 1668:1200 is Qwest/Actiontec 802AIN which is also
>>>> correctly claimed to be supported by carl9170.
>>>>
>>>> Supposedly, the successor 802AIN2 which has an ath9k compatible chip

The "which" should be removed as well.

>>>> whose USB ID (unknown) could be inserted instead.
>>>>
>>>> Drop the ID from the wrong driver.
>>>>
>>>> Signed-off-by: Bastian Germann <bage@...ian.org>
>>>
>>> Thanks, I see this patch now.
>>>
>>> I guess there's a bug report somewhere, do you have a link?
>>
>> No, I happened to find this by chance while packaging the ath9k and
>> carl9170 firmware for Debian,
>> which have the ID represented in an XML format:
>> https://salsa.debian.org/debian/open-ath9k-htc-firmware/-/blob/master/debian/firmware-ath9k-htc.metainfo.xml
> 
> Do you mind if we add this (without the link) to the commit log? It's
> good to always document the background of the patch.

Please go ahead.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ