Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp931244imu; Wed, 9 Jan 2019 08:42:08 -0800 (PST) X-Google-Smtp-Source: ALg8bN59nNviVmtZWYtQ3Zhfa94PHMF/Ce3NXJXBpHM0kwIa5gaQdfVsyB0NFBM6sgoNatbpg+Lu X-Received: by 2002:a17:902:2ec1:: with SMTP id r59mr6790291plb.254.1547052128451; Wed, 09 Jan 2019 08:42:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547052128; cv=none; d=google.com; s=arc-20160816; b=QdBBs2cRVbQ/oal1TrTp2MgyClxRmQY+MI0IyS5jgrVn2spZZ5f6kjeiKESksO8hE7 KQ98+apFpVlVzdQ2TcaFlpGdSuK8supqpuxaNE/dO+WcY+LW0YQmGZSVlGOCnTYZ49ck w8+U/YEMtV8UFLp2P7Ub/SuTHy8xX7FbQtTKXg9Aa4GQoRJ7ZTwmTYp2uI8nZlYtjEgd 2ZItZqndFQ6w3bh5HDz0x0APIp8V6x6jz42KL8BS2QWMWcFa3w/g/gatNzld34Cvl9Aq Tdg9X0SZAWYFD3eQ7Oo0hGWzbdrvN955B+xZxspCt3h3K7fBPvgsiQcIkqgmNZPxDwk7 cXOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=g8I9zZGfxAN8gpks+OLWMo263nsMOAIaotopBzxeY/o=; b=jtnSDpPdOelGpnPeIZhrDR/F1/+dE4TyHIHhuTY2WsOsxq5L2ZC0qU9/1IroQzlRNZ K6knZ0CFLnTnvtH008IzPS4tUOwEt06E0wfP18dnuATLtJ7b/x9xRYOZopDBhWBbmgUT 2YCDTTSH9MEWexqFNUaqLHTLnSivg1dhjC5IG4vWMKCK4a+CSOrHdpg1QaxbpQDnMOHY KDEuYLK10+upc3KywWNIDuhitkCaMIn/Y/erz3Kh5SlfKxOvrQIrJky/PguzCia/5vqX b/9fbT2jYGQ7Jq65symrjxClCgo3Xi5DIU9Iz4t+ck4EwO8hoWVkYBsGb0789e9XxST4 m4oA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=SAZSHEeX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n32si4190742pgm.439.2019.01.09.08.41.52; Wed, 09 Jan 2019 08:42:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=SAZSHEeX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732415AbfAIPrL (ORCPT + 99 others); Wed, 9 Jan 2019 10:47:11 -0500 Received: from mail-pf1-f194.google.com ([209.85.210.194]:42808 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731981AbfAIPrL (ORCPT ); Wed, 9 Jan 2019 10:47:11 -0500 Received: by mail-pf1-f194.google.com with SMTP id 64so3825443pfr.9; Wed, 09 Jan 2019 07:47:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=g8I9zZGfxAN8gpks+OLWMo263nsMOAIaotopBzxeY/o=; b=SAZSHEeXfrc0Iay8S0+7pnjYYybYBC7/65L0yjg7HyTVDpjUCWKt0aHLYcFfivoloF 3qk8iQ917ImnLv09dCYC1M6V7184paiaAb2lDiONegMeXFihYGwnmvmdHEzGtalQX3yX AvACZ3beUw+KpgXqIrE054sHlIZT+ZLIFjUghKAsqD7z8xVlkVnuvHkZ9mAgbI16yFgY sUpTs/eiEPT9Dmj1ZovUlGRAv0EoMFWxEp0S8vzo7lfkHeB4Dt3O6y32juwRxCDFjgTC DK2dcTeqk9M6vi/xgwCFJaxwtr/KXnd2THSfc3HIaOYwij6hPEKYq+36QJZB+3tAjy+f Dkgw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition :content-transfer-encoding:in-reply-to:user-agent; bh=g8I9zZGfxAN8gpks+OLWMo263nsMOAIaotopBzxeY/o=; b=hkg+0s5EN4RPu87i+Dk/aEyeiqpr5zeIM4ZTisGwoBYPGwwkzkctrVfTM6GtHs7zoj wST/qrVGRcXf2KPye9QeK9MLHHEorW/IxYcUoaHmG680wQrJG1PweeK/mXpEIX5MuJ0v W+6sHhtJBxVKZI8VpWoD7vdhceh4ecpaT+U91PoczeE9+ydILnDm053xZPdae0WVxVud usnY5RsAoj9BfRvEAjUnmJfKTHiDk3kn1B31CJFlxXcHt9HWX3yf07h+BEYxjTVRXns1 WIVZCNVT6ds5USPjDZu/W6p5GpbRvxxN2eu1ucTfHGhRpa902MZOTYeo0+3S0zaCD8cz /Nzg== X-Gm-Message-State: AJcUukdAU7Fdo4/BBZ15/JcAA8iJnSBsjBB/HYSnQSz3w9pDJ4dfB6Hi 1qy1JehLqh7MmNutsjqZ+aA= X-Received: by 2002:a63:2643:: with SMTP id m64mr5727785pgm.35.1547048830220; Wed, 09 Jan 2019 07:47:10 -0800 (PST) Received: from localhost ([2600:1700:e321:62f0:329c:23ff:fee3:9d7c]) by smtp.gmail.com with ESMTPSA id l70sm81484077pgd.20.2019.01.09.07.47.08 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 09 Jan 2019 07:47:09 -0800 (PST) Date: Wed, 9 Jan 2019 07:47:08 -0800 From: Guenter Roeck To: Greg Kroah-Hartman Cc: Jinpu Wang , LKML , torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, "v3.14+, only the raid10 part" Subject: Re: [PATCH 4.14 000/101] 4.14.92-stable review Message-ID: <20190109154708.GA997@roeck-us.net> References: <20190107105330.372621917@linuxfoundation.org> <20190108122542.GA4801@kroah.com> <20190109144658.GF29274@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190109144658.GF29274@kroah.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 09, 2019 at 03:46:58PM +0100, Greg Kroah-Hartman wrote: > On Wed, Jan 09, 2019 at 12:40:11PM +0100, Jinpu Wang wrote: > > Greg Kroah-Hartman 于2019年1月8日周二 下午1:28写道: > > > > > > On Mon, Jan 07, 2019 at 08:59:12PM -0800, Guenter Roeck wrote: > > > > > > Should all now be fixed up. > > > > > > I hope, this set of releases has been a pain... > > > > > > greg k-h > > > > I had build failure below, looks related to 0fe69354b888 ("crypto: > > testmgr - add AES-CFB tests") ... > > make[4]: *** [crypto/testmgr.o] Error 1 > > Makefile:1045: recipe for target 'crypto' failed > > make[3]: *** [crypto] Error 2 > > You are right, that totally does not build. Odd that no one else's > tests caught this :( > The failure is only seen with CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=n, but CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y by default, meaning it is explicitly disabled for all test builds. Out of the probably thousands of default configurations, only two s390 configurations enable those tests (ie explicitly set CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=n). So that is not at all surprising. Question should be why the responsible developers pretty much ensured that this code is never even build tested. Guenter