lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d8c1681a-da7b-43c3-8ea1-6f6ba6a3677d@gmail.com>
Date:   Sat, 25 Nov 2023 20:19:04 +0200
From:   Bitterblue Smith <rtl8821cerfe2@...il.com>
To:     Zenm Chen <zenmchen@...il.com>
Cc:     Jes.Sorensen@...il.com, kvalo@...nel.org,
        linux-kernel@...r.kernel.org, linux-wireless@...r.kernel.org,
        pkshih@...ltek.com
Subject: Re: [PATCH v2] wifi: rtl8xxxu: fix LED control code of RTL8192FU

On 14/09/2023 06:40, Zenm Chen wrote:
> Ping-Ke Shih <pkshih@...ltek.com> wrote:
>>
>> I suppose this would not be a brute force if you can use register definitions
>> I provided by v1. 
>>
> 
> Thanks for the help, now I know how to make use of these definations.

Hello!

Currently the status of your patch is "Changes Requested":
https://patchwork.kernel.org/project/linux-wireless/patch/20230912112709.22456-1-zenmchen@gmail.com/

Perhaps your patch will be accepted if you remove that comment:
"The value 0x0303 is obtained by brute force."

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ