Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3629193imu; Mon, 7 Jan 2019 06:48:41 -0800 (PST) X-Google-Smtp-Source: ALg8bN6kX6uk+JIJWTHDpr4oS2Xirq1afSM4KijlF6J30dJqsjNnWsjxbI9T/zCoPyVIedG1QGSw X-Received: by 2002:a17:902:8bc6:: with SMTP id r6mr61093620plo.67.1546872521332; Mon, 07 Jan 2019 06:48:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546872521; cv=none; d=google.com; s=arc-20160816; b=Mcvnz8OZ0eVYmdqX7LMSrEStTLzvgCTo/3Cjxht/fbsK3/t3W5BEKGSTSRUXvUPZUx T9GDy4FQ0btECx6JawTcxebeUGdN5lfV/gTKPcPO0GG0vF/LGHG+aRAOoJSB1xqbcj4E ap+Q15f/foGoflfdONlIJ64wnGT9ctupaMt3Toac4syT60Q9i8K/GisrLqs3WOZY3Ysa j8xPSUpSG0xynHYORHD4mfING1uCmmeNkVGeDaV050u8PmV2tKzzfo0Dyydr7yo1fU63 igaX8ZBNnqHAp0QMPIJGP6uJ4u9XXOOFE/H1YH+ICQjjWSB2WwwscTvE/hnNnlYWANS4 h/mQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=gVJIKVFd8bnVqG2fJ3GvuXHGiTLvpW1FlzThaz3hV24=; b=SweVdSUAWVzn4eU4y7H/slio3dEOo9Qzz1GeeuIPWgaWrGhoH0qxXEnd4QTT6FWGaI UeZUqTN/Qh7FG/wFjKY9QeD3vBSbpGbUPCjOF4wBEwkZuV4Hl2fGjg+tqE1PF6WvnKug AGtw8DHNqx04fDLB2lb/j7i0D1XbJ/4/fNz7lwg28bioZZN58yvzgazBWmXG7w8Fr8Kr MIuBl8ErSjia3F3g9b4Z7g0Jf0hpj/imWmx0+CDnT/wBoy3NpHNbqpavwjnLa+DITUfu OKS9BHX664rKj+PQ6aalBbt0ehzqzOfI5wP9FJ+R+5qsCahFOvYMH+MfDWvhN4EXjH+U MP+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Gao98PNP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d36si42436352pla.216.2019.01.07.06.48.26; Mon, 07 Jan 2019 06:48:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Gao98PNP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729025AbfAGOrF (ORCPT + 99 others); Mon, 7 Jan 2019 09:47:05 -0500 Received: from mail.kernel.org ([198.145.29.99]:35088 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727242AbfAGOrF (ORCPT ); Mon, 7 Jan 2019 09:47:05 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C9A172087F; Mon, 7 Jan 2019 14:47:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546872424; bh=0zKTMrDJLn5GVGX1e0XN0FJrVfPPrMherqtiAL+2bGQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Gao98PNPwN44ZM4wwT0oyLW9ziavKP9yhtlJPDtJxtaDNjIc14Mh1jV+Tx1ffwSqL t+GEvTNtHg7QWofCZIht3u1ujYxSrwCS6h0br1D9hJ88ArVIBpAna7Bvc8rBYY4fQn rv1/zyJ9thjn1eNVl+75ztnf6yw58LDjtzQVagwE= Date: Mon, 7 Jan 2019 15:47:01 +0100 From: Greg Kroah-Hartman To: Daniel =?iso-8859-1?Q?D=EDaz?= Cc: open list , torvalds@linux-foundation.org, Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 4.14 000/101] 4.14.92-stable review Message-ID: <20190107144701.GA27006@kroah.com> References: <20190107105330.372621917@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.11.1 (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 07, 2019 at 08:39:12AM -0600, Daniel D?az wrote: > Hello! > > On Mon, 7 Jan 2019 at 06:59, Greg Kroah-Hartman > wrote: > > This is the start of the stable review cycle for the 4.14.92 release. > > There are 101 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > We see these build errors with 4.14: > | /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/extent-tree.c: > In function 'btrfs_drop_snapshot': > | /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/extent-tree.c:9186:8: > error: too few arguments to function 'btrfs_run_delayed_items' > | err = btrfs_run_delayed_items(trans); > | ^~~~~~~~~~~~~~~~~~~~~~~ > | In file included from > /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/btrfs_inode.h:26:0, > | from > /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/transaction.h:23, > | from > /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/tree-log.h:23, > | from > /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/extent-tree.c:30: > | /srv/oe/build/tmp-lkft-glibc/work-shared/juno/kernel-source/fs/btrfs/delayed-inode.h:114:5: > note: declared here > | int btrfs_run_delayed_items(struct btrfs_trans_handle *trans, > | ^~~~~~~~~~~~~~~~~~~~~~~ Ugh, why does my build system not show this, but my laptop does... Let me go drop the broken patches, thanks fo rletting me know. greg k-h