lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2026011156-progeny-ecard-4fc1@gregkh>
Date: Sun, 11 Jan 2026 14:04:16 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: 2023060904@....edu.cn
Cc: linux-staging@...ts.linux.dev, linux-kernel@...r.kernel.org,
	guagua210311@...com
Subject: Re: [PATCH v5 1/3] rtl8723bs: io: Add independent
 rtw_check_continual_io_error function

On Sun, Jan 11, 2026 at 11:21:34AM +0800, 2023060904@....edu.cn wrote:
> From: Changjun Zheng <2023060904@....edu.cn>
> 
> Add a new function to check if the error count exceeds the MAX_CONTINUAL_IO_ERR
> threshold. This function follows the single responsibility principle and
> prepares for the subsequent removal of the global continual_io_error variable.
> 
> Signed-off-by: Changjun Zheng <2023060904@....edu.cn>
> ---

This patch is corrupted and can not be applied:
	checking file drivers/staging/rtl8723bs/core/rtw_io.c
	patch: **** malformed patch at line 228: }

So something went wrong.

Also, make sure that each commit builds properly, I think this one will
break the build, right?

And finally, please use git send-email to send all of these out
together, your 0/3 email does not show up as properly threaded here.
See the result on lore.kernel.org as proof of that:
	https://lore.kernel.org/all/12B32ED3FD2801A5+20260111032136.7078-1-2023060904@ycu.edu.cn/

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ