lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 02 Oct 2019 00:08:39 +0800 From: Icenowy Zheng <icenowy@...c.io> To: linux-arm-kernel@...ts.infradead.org, David Miller <davem@...emloft.net> CC: mark.rutland@....com, andrew@...n.ch, f.fainelli@...il.com, devicetree@...r.kernel.org, netdev@...r.kernel.org, linux-sunxi@...glegroups.com, linux-kernel@...r.kernel.org, mripard@...nel.org, wens@...e.org, robh+dt@...nel.org, hkallweit1@...il.com Subject: Re: [PATCH 0/3] Pine64+ specific hacks for RTL8211E Ethernet PHY 于 2019年10月2日 GMT+08:00 上午12:06:51, David Miller <davem@...emloft.net> 写到: >From: Icenowy Zheng <icenowy@...c.io> >Date: Tue, 1 Oct 2019 16:29:09 +0800 > >> There're some Pine64+ boards known to have broken RTL8211E chips, and >> a hack is given by Pine64+, which is said to be from Realtek. >> >> This patchset adds the hack. >> >> The hack is taken from U-Boot, and it contains magic numbers without >> any document. > >Please contact Realtek and try to get an explanation about this. Sorry, but Realtek never shows any idea to add more infomation about this. These hacks had existed and worked for years. > >I understand that eventually we may not get a proper explanation >but I really want you to put forth real effort to nail down whats >going on here before I even consider these patches seriously. > >Thank you. > >_______________________________________________ >linux-arm-kernel mailing list >linux-arm-kernel@...ts.infradead.org >http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Powered by blists - more mailing lists