lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240911204015.6c5cd861@canb.auug.org.au>
Date: Wed, 11 Sep 2024 20:40:15 +1000
From: Stephen Rothwell <sfr@...b.auug.org.au>
To: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>,
 "H. Peter Anvin" <hpa@...or.com>, Peter Zijlstra <peterz@...radead.org>
Cc: Christian Loehle <christian.loehle@....com>, Linux Kernel Mailing List
 <linux-kernel@...r.kernel.org>, Linux Next Mailing List
 <linux-next@...r.kernel.org>
Subject: linux-next: build failure after merge of the tip tree

Hi all,

After merging the tip tree, today's linux-next build (arm64 defconfig)
failed like this:

drivers/cpufreq/cppc_cpufreq.c: In function 'cppc_freq_invariance_init':
drivers/cpufreq/cppc_cpufreq.c:227:35: error: 'NSER_PER_MSEC' undeclared (first use in this function); did you mean 'NSEC_PER_MSEC'?
  227 |                 .sched_runtime  = NSER_PER_MSEC,
      |                                   ^~~~~~~~~~~~~
      |                                   NSEC_PER_MSEC
drivers/cpufreq/cppc_cpufreq.c:227:35: note: each undeclared identifier is reported only once for each function it appears in
drivers/cpufreq/cppc_cpufreq.c:229:17: error: request for member 'sched_period' in something not a structure or union
  229 |                 .sched_period   = 10 * NSEC_PER_MSEC,
      |                 ^

Caused by commit

  b3a47ff09554 ("cpufreq/cppc: Use NSEC_PER_MSEC for deadline task")

I have reverted that commit for today.

-- 
Cheers,
Stephen Rothwell

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ