lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <00af66ce474c19ead83b9a507661a0f5993b5ad3.camel@realtek.com>
Date:   Sat, 18 Mar 2023 14:05:19 +0000
From:   Ping-Ke Shih <pkshih@...ltek.com>
To:     "tiwai@...e.de" <tiwai@...e.de>
CC:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "linux-firmware@...nel.org" <linux-firmware@...nel.org>,
        "jwboyer@...nel.org" <jwboyer@...nel.org>
Subject: Re: [FIRMWARE] Regression on rtw89/rtw8852b_fw.bin by the latest update

On Sat, 2023-03-18 at 08:43 +0100, Takashi Iwai wrote:
> 
> Hi,
> 
> we've received a regression report on openSUSE Tumbleweed about the
> Realtek WiFi, and the culprit was spotted to be the latest firmware
> update of rtw89/rtw8852b_fw.bin.  The former working linux-firmware
> tree was at the commit 5c11a3742947, while broken at 5bc279fb161d.
> 
> The details are found in:
>   https://bugzilla.opensuse.org/show_bug.cgi?id=1209449
> 
> Could you check the problem?
> (Or feel free to join to the bugzilla entry above.)
> 
> 

I have sent a pull-request [1] to revert the firmware and Cc you.

[1] 
https://lore.kernel.org/linux-firmware/889f3db6ca4008047595f4392388acc1f165e03c.camel@realtek.com/T/#u

Ping-Ke

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ