lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYuZd_ur56H8fwDSvUywopvn_b7ogprGkjEatQ7EPTLwYQ@mail.gmail.com>
Date: Tue, 7 May 2024 12:50:51 +0530
From: Naresh Kamboju <naresh.kamboju@...aro.org>
To: open list <linux-kernel@...r.kernel.org>, linux-clk <linux-clk@...r.kernel.org>, 
	Linux ARM <linux-arm-kernel@...ts.infradead.org>, lkft-triage@...ts.linaro.org
Cc: Russell King - ARM Linux <linux@...linux.org.uk>, Arnd Bergmann <arnd@...db.de>, 
	Anders Roxell <anders.roxell@...aro.org>, Dan Carpenter <dan.carpenter@...aro.org>, 
	Michael Turquette <mturquette@...libre.com>
Subject: re: clkdev: report over-sized strings when creating clkdev entries

The WinLink E850-96 board boot failed with Linux next-20240506 but there
is no kernel crash log on the serial [1].

Anders bisection results pointing to this commit,
# first bad commit:
  [4d11c62ca8d77cb1f79054844b598e0f4e92dabe]
  clkdev: report over-sized strings when creating clkdev entrie

After reverting the above patch the boot test passed [2].

Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>

Links:
[1] - https://lkft.validation.linaro.org/scheduler/job/7546260
[2] - https://lkft.validation.linaro.org/scheduler/job/7548064

Failed information:
    - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20240506/testrun/23814147/suite/boot/test/gcc-13-lkftconfig/details/
    - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20240506/testrun/23815165/suite/boot/test/gcc-13-lkftconfig/history/

--
Linaro LKFT
https://lkft.linaro.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ