Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id BC260C636CC for ; Tue, 31 Jan 2023 23:40:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230009AbjAaXkQ (ORCPT ); Tue, 31 Jan 2023 18:40:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37270 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229900AbjAaXkO (ORCPT ); Tue, 31 Jan 2023 18:40:14 -0500 Received: from mail-vs1-xe33.google.com (mail-vs1-xe33.google.com [IPv6:2607:f8b0:4864:20::e33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0AD8D22DF3 for ; Tue, 31 Jan 2023 15:40:12 -0800 (PST) Received: by mail-vs1-xe33.google.com with SMTP id s24so10470153vsi.12 for ; Tue, 31 Jan 2023 15:40:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=cc:to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=yNWJjiHZ40BzwBFNd25x6TMl8GnedoNNCYGCd1mQAeg=; b=Nhou7RN5fM5f5cI/iVGIMo21MZVVTKgkyIJL5ORf8vkscx4DIfYfx71Gf+Fu9zwbhI jKvjlDNed0CaPq2PJhGvQzp7IjTBlAqw1vBWFiqixPH1NoHRTldioPZEGhWzJQyaUvOM QT5DWZTE7nGsM0k6tTPQ0S8mB289q3k5fM4brPNxyCrIy+Usx+m/cH3bFdWUmlouuURb USBnNE8XbO5WB5vrnN97xTXbfmeVijTWmnIxELq/aWzoqP6QZzimfRKRCMNzCw9OrGn4 vcvlAo/7Stbrg8A9eE6oB56vVwKhqzKfQb/NnSDK0PIwV0M/8hEHOKkxCBnSWmX5ge/t 7BTA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=yNWJjiHZ40BzwBFNd25x6TMl8GnedoNNCYGCd1mQAeg=; b=fGEt9+NpsbZAeylCRpgBzNpO0w9DRnUaRduNq4AxAcWDn5i9QRcxVShqKQbPudzeF+ Om2BlikLwXI5Y8p6iLp/NkepJd/Eujz7Ss5WLQ6wxKY4Lhn1R7/eOqP6QfLAqRmKxQcA UjqaApq6ui3Si13akIYfIBFq2NQHG0NSJCmAExSkqiHCisk75iC8S5sbnm9UlAXaezje 2hrtzdYB0jMMU3xuxv4ZR0ObkLU4ovWKiIc81wE5Mysbx2H6X2Lg9YYELV/4KfvqkcA1 i5r5IsWtSHAXUC/fAo0d4Lb1HLA9KuAHAODCBzCMKtqA1yzIlg1T3Ylf4iNMaHwODH22 N4Nw== X-Gm-Message-State: AO0yUKWCiUmkFWWuv8o5vcpAjxGvPrzNRxog0+yZ0fA6jrRO5+aSn7/V ViUilPTPse3VljrAGo46oxrmeXpAdjvhHWVsGhSZAA== X-Google-Smtp-Source: AK7set+LGZpVBUq8jBYUp23fV64plVr7SG2DY47NRbmas+5wk9V9BIThjG1yn8uBo52H/ysiEC+SN+XZvlxAE8uICa8= X-Received: by 2002:a67:e19a:0:b0:3f7:528b:d25f with SMTP id e26-20020a67e19a000000b003f7528bd25fmr138820vsl.9.1675208410993; Tue, 31 Jan 2023 15:40:10 -0800 (PST) MIME-Version: 1.0 From: Naresh Kamboju Date: Wed, 1 Feb 2023 05:10:00 +0530 Message-ID: Subject: Re: ACPICA: Replace fake flexible arrays with flexible array members To: Kees Cook Cc: open list , devel@acpica.org, "Gustavo A. R. Silva" , Len Brown , linux-acpi@vger.kernel.org, linux-hardening@vger.kernel.org, "Rafael J. Wysocki" , robert.moore@intel.com, lkft-triage@lists.linaro.org, Linux-Next Mailing List , Arnd Bergmann , Anders Roxell Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The qemu-i386 boot failed on Linux next- 20230131 started from next-20230125. Please refer to boot logs [1], [2] & [3]. The bisection pointed to the following commit, # first bad commit: [5f7e8394a70761036e416c7529c937f309e4680f] ACPICA: Replace fake flexible arrays with flexible array members Reported-by: Linux Kernel Functional Testing Reverting the above patch fixes the qemu-i386 boot problem. [1] https://tuxapi.tuxsuite.com/v1/groups/linaro/projects/lkft/tests/2L4mi3ZZDct0vwmV2tIVY5AtNr0/logs?format=html [2] https://tuxapi.tuxsuite.com/v1/groups/linaro/projects/lkft/tests/2L4mi3ZZDct0vwmV2tIVY5AtNr0/logs?format=txt [3] https://tuxapi.tuxsuite.com/v1/groups/linaro/projects/lkft/tests/2L4mi32cqUyZvCIhJlV5nR8CuQk Bisection log: http://ix.io/4mIP -- Linaro LKFT https://lkft.linaro.org