diff options
author | Li Zhijian <lizhijian@cn.fujitsu.com> | 2021-10-25 06:26:57 +0300 |
---|---|---|
committer | Paul E. McKenney <paulmck@kernel.org> | 2021-12-01 04:29:50 +0300 |
commit | 9880eb878c315b241002d43d7ff89df23713a51b (patch) | |
tree | 7fff07967678053f4d34ebb63ff1bba9d85ccf37 /scripts/generate_rust_analyzer.py | |
parent | c30c876312f66b0422a1d632b8c45b6416deeec0 (diff) | |
download | linux-9880eb878c315b241002d43d7ff89df23713a51b.tar.xz |
refscale: Prevent buffer to pr_alert() being too long
0Day/LKP observed that the refscale results fail to complete when larger
values of nrun (such as 300) are specified. The problem is that printk()
can accept at most a 1024-byte buffer. This commit therefore prints
the buffer whenever its length exceeds 800 bytes.
CC: Philip Li <philip.li@intel.com>
Reported-by: kernel test robot <lkp@intel.com>
Signed-off-by: Li Zhijian <lizhijian@cn.fujitsu.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions