Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2548469ybl; Thu, 29 Aug 2019 09:36:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqxaFKqdtqeKCiVnxkijrHJ0dUM0tJvDaRO/C9gl7zdSWfaYohWBnGfOP9WumuMNOyjsFeyr X-Received: by 2002:a17:902:8301:: with SMTP id bd1mr10031393plb.120.1567096598829; Thu, 29 Aug 2019 09:36:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567096598; cv=none; d=google.com; s=arc-20160816; b=pwbZ+c1cztQ53CaO62zGJ3duXvvKmLtQZU3OdMMyLzWPM75syrsqN8y/4RhSITPMtF ryvFfspIMRjJvNRwKzUOyOkVZ3q+WODBNKf6LMQRwrO9W4jRLNphla2sWXK4dYIDY63i n6HUecK6B6XVXsgMC7gbJCxswUpAgOlwV3JiVt5QwkaoakJx7H2Idmwm6OZ1V1NTemN5 CD4n2tJ1xtTD35spZQEqor+ifEYFJX6wRmMigga06OJDCtgC08uJ8mW05IPZCSD+syOc e34OvYIEa9o9IjZEmOLHcj5BoavGDAGak8uewa44hBYNCt7TkjWPMk/WNXWaJl5SmQbt 11tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=B5GDuiUgp0J8QiithK8i/7ja6hPpHK37P4a0q7hN4Fc=; b=y6q/ToGYlPnn9IjntP/07mBthTcEn/wtgTQ9toxAir0zCaoSc9+4lyzbWT5vKnnqtw Qg42geTDA4ezLWsDM2f2uY8jhF91LaQ3jfuQYluk7JdgzJFm6G9zw5miB+0ub2lQClHs IimQG2AhgMfy8NkE1z4quA0RLKhft6jH5TMFHdIlgFNtI+eY0SM1Ki4fZdTQbLqopMwT 0ONyloGZVfE9CuTESGrp49suQ3/dulf8bTdb7h2pJeY+KjbgRMj9hlASaXCdZ1Q+3o5z glxbqvfrLummzsXQ8JO6TALFFEeAI3Z4daZaJnaPCgsxT8BJ+bbE2f0xZpg5YBgOLy+e 9RuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u19si2520375pgf.531.2019.08.29.09.36.22; Thu, 29 Aug 2019 09:36:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727938AbfH2Qd4 (ORCPT + 99 others); Thu, 29 Aug 2019 12:33:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:54174 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726973AbfH2Qdz (ORCPT ); Thu, 29 Aug 2019 12:33:55 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 391E8AEE9; Thu, 29 Aug 2019 16:33:54 +0000 (UTC) Date: Thu, 29 Aug 2019 18:33:53 +0200 From: Borislav Petkov To: kbuild test robot Cc: tip-bot2 for Thomas Hellstrom , kbuild-all@01.org, linux-tip-commits@vger.kernel.org, Thomas Hellstrom , Doug Covelli , Dmitry Torokhov , "H. Peter Anvin" , Ingo Molnar , linux-input@vger.kernel.org, Thomas Gleixner , VMware Graphics , pv-drivers@vmware.com, x86-ml , Ingo Molnar , linux-kernel@vger.kernel.org Subject: Re: [tip: x86/vmware] input/vmmouse: Update the backdoor call with support for new instructions Message-ID: <20190829163353.GC2132@zn.tnic> References: <156699905611.5321.15444519862547054670.tip-bot2@tip-bot2> <201908292325.aLXyyzEx%lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <201908292325.aLXyyzEx%lkp@intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 30, 2019 at 12:01:48AM +0800, kbuild test robot wrote: > Hi tip-bot2, > > Thank you for the patch! Yet something to improve: > > [auto build test ERROR on linus/master] > [cannot apply to v5.3-rc6 next-20190829] > [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] Yes, it looks like it. > url: https://github.com/0day-ci/linux/commits/tip-bot2-for-Thomas-Hellstrom/input-vmmouse-Update-the-backdoor-call-with-support-for-new-instructions/20190829-205315 This patch is part of a series which are here: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/log/?h=x86/vmware so you need the patches before it. I don't know what you guys are doing to track patches but if you really wanna test trees, I'd suggest simply testing TIP's tip/master branch which gets redone on a daily basis instead of testing patches in the tip-bot{,2} notification mails. Thx. -- Regards/Gruss, Boris. SUSE Software Solutions Germany GmbH, GF: Felix Imendörffer, HRB 247165, AG München