lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <874k15n2jt.fsf@jogness.linutronix.de>
Date:   Tue, 31 May 2022 17:35:26 +0206
From:   John Ogness <john.ogness@...utronix.de>
To:     kernel test robot <oliver.sang@...el.com>
Cc:     Petr Mladek <pmladek@...e.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        lkp@...el.com
Subject: Re: [printk]  8e27473211: hwsim.ap_ft_pmf_bip_cmac_128.fail

Hi Oliver,

I am having great difficulties trying to reproduce this test. It seems I
need to setup real hardware with multiple access points. Can you point
me to some detailed documentation about preparing this test? Thanks.

John Ogness

On 2022-05-31, kernel test robot <oliver.sang@...el.com> wrote:
> (please be noted we reported
> "[printk]  8e27473211: hwsim.ap_ft_pmf_bip_gmac_256.fail"
> on
> https://lore.kernel.org/all/20220430143056.GA27004@xsang-OptiPlex-9020/
> when this commit is on linux-next/master
> now we noticed there are other hwsim tests failures while
> ap_ft_pmf_bip_gmac_256 problem is still existing, after this commit is on
> mainline now.
> FYI)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ