lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 Dec 2023 07:35:36 +0800
From: kernel test robot <lkp@...el.com>
To: Andrew Morton <akpm@...ux-foundation.org>
Cc: Linux Memory Management List <linux-mm@...ck.org>,
 alsa-devel@...a-project.org, netdev@...r.kernel.org,
 patches@...nsource.cirrus.com
Subject: [linux-next:pending-fixes] BUILD REGRESSION
 c6eb02b33bd24f8f4a60947b539db4871ef914cd

tree/branch: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git pending-fixes
branch HEAD: c6eb02b33bd24f8f4a60947b539db4871ef914cd  Merge branch 'for-linux-next-fixes' of git://anongit.freedesktop.org/drm/drm-misc

Error/Warning reports:

https://lore.kernel.org/oe-kbuild-all/202312211413.1NkzZWqi-lkp@intel.com

Error/Warning: (recently discovered and may have been fixed)

sound/pci/hda/cs35l41_hda_property.c:238: undefined reference to `spi_setup'

Unverified Error/Warning (likely false positive, please contact us if interested):

net/core/stream.c:82:13-14: WARNING opportunity for min()

Error/Warning ids grouped by kconfigs:

gcc_recent_errors
`-- i386-randconfig-051-20231010
    `-- sound-pci-hda-cs35l41_hda_property.c:undefined-reference-to-spi_setup
clang_recent_errors
`-- x86_64-randconfig-102-20231221
    `-- net-core-stream.c:WARNING-opportunity-for-min()

elapsed time: 1457m

configs tested: 2
configs skipped: 0

tested configs:
x86_64                            allnoconfig   gcc  
x86_64                              defconfig   gcc  

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ