Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp347441imp; Wed, 20 Feb 2019 01:06:57 -0800 (PST) X-Google-Smtp-Source: AHgI3IYGoZO22tYD4KxVGE/6/39ghwa2auYdU9k/jyl9UFcJkZl0XXC3RfvKURoTNrn4bwcys74m X-Received: by 2002:a63:e553:: with SMTP id z19mr28106224pgj.331.1550653617314; Wed, 20 Feb 2019 01:06:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550653617; cv=none; d=google.com; s=arc-20160816; b=Nt0xs+4UX/hjeaIURIZf4Nc/GOFud2KvAyNXXhp8cjGZcWKwbtV4h8Q6Dg2y5kKOFI 2uahu6Xnq8nLChUdFHGl8lp25yCH7lLrh/Ok/M1uvbH3+riXSws84NA2wqXPfbYm10o5 ca3+L1UIgHG79b7v4NQu+rtcnICy7djttNUYWfgHSUKDEnD9xFCtY+yQg6LLHz6yzPjY XJDv1kwcZGf8YAIjbJtaDVG2Cb5goxad9dU1LF4v1dpDK2aOJnL4e539O8Cf0RVSVh64 vtifUaf+PZjfHmR+sKvwOTSOPf5Nfh+9T4uMx3kwzjrQaOT+h5jH8wcubzWwiSAWJZJd MYSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=n8QVy4xcN+xrVh0UuRWMke/gRYXxsjWaDvKBk7hyC7I=; b=pk5HOhrcb8QMNVsnb3k+JKy6Odm6GgxWa5hHgBNMmOfzF9ZLFXmyyJpvNF013EYFs6 H0Q8nVzH/Spr0c3GXgZumm0RuSTsWyYOH4oEXe6ZI+e8DgBzK8gti66eZvoBjLAF81fo pxe/ihNDO6+r91z/esYTycgFN4JC2metw8YWcr0TAH5kC9FFNUEgUhmOWg0jKtzm3enU 9qUwjzKVCPLs9Pb8lNuiwBKiK1sPsh4J+YebIs2YmISVxUtDrs9wlt+A/4dY3E/r9rxZ WTjLyw8fwf7jYPkstvKVNMQIzW0pYyJ5lbAwWBE+TtKvv6vUSWYd7W+UMLeEazNPeyJz rECQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hvzWN8xs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l192si13935299pge.280.2019.02.20.01.06.41; Wed, 20 Feb 2019 01:06:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hvzWN8xs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726317AbfBTJE6 (ORCPT + 99 others); Wed, 20 Feb 2019 04:04:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:45540 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725857AbfBTJE6 (ORCPT ); Wed, 20 Feb 2019 04:04:58 -0500 Received: from localhost (unknown [195.134.171.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3CC3A208E4; Wed, 20 Feb 2019 09:04:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550653498; bh=KK3tdbxk1eqQpwZ/Kd+GJUcnaptpL6USf15JxHOhjNU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hvzWN8xsXf39BI52vX6jUTV0FWAAy2vHvhspSX6YA/u1twPDDhilpDLL6IkPukirS eQV7j8Beq8CfAhEv4oPfK2ZONZOLCDZzkZoctWRLltBQvY1cfFSk/vuQi1Y38Q1yb7 awOjQPxxBhAL9TosFbbDqBJUCp4vCZ2dmLg/Azcg= Date: Wed, 20 Feb 2019 10:04:53 +0100 From: Greg Kroah-Hartman To: Guenter Roeck Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 4.20 00/92] 4.20.11-stable review Message-ID: <20190220090453.GA29215@kroah.com> References: <20190218133454.668268457@linuxfoundation.org> <1ed0095f-ae1a-f57d-8005-38603ab460b5@roeck-us.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1ed0095f-ae1a-f57d-8005-38603ab460b5@roeck-us.net> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 19, 2019 at 09:39:11AM -0800, Guenter Roeck wrote: > On 2/18/19 5:42 AM, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 4.20.11 release. > > There are 92 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Wed Feb 20 13:34:25 UTC 2019. > > Anything received after that time might be too late. > > > > Build results: > total: 159 pass: 156 fail: 3 > Failed builds: > csky:defconfig > csky:allnoconfig > csky:tinyconfig > Qemu test results: > total: 343 pass: 343 fail: 0 > > > Building csky:defconfig ... failed > -------------- > Error log: > mm/memory.c: In function ‘__pte_alloc’: > mm/memory.c:406:18: error: too many arguments to function ‘pte_alloc_one’ > > Commit d6caf1d0d553 ("csky: fixup compile error with pte_alloc") > (upstream patch 2a60aa14a9a) needs to be removed; the offending patch > is not in v4.20.y. > > The automatic scripts seem to be a bit too aggressive. Thanks for finding this. I'll drop it before I do the release. And thanks for testing all of these and letting me know. greg k-h