From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932271AbbDHUq3 (ORCPT ); Wed, 8 Apr 2015 16:46:29 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:59462 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753905AbbDHUq1 (ORCPT ); Wed, 8 Apr 2015 16:46:27 -0400 Date: Wed, 8 Apr 2015 13:46:26 -0700 From: Andrew Morton To: Ingo Molnar Cc: Stephen Rothwell , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Peter Zijlstra , linux-next@vger.kernel.org, linux-kernel@vger.kernel.org, Borislav Petkov Subject: Re: linux-next: manual merge of the akpm tree with the tip tree Message-Id: <20150408134626.0de0d209e49d3911d46228d5@linux-foundation.org> In-Reply-To: <20150408151350.GA8490@gmail.com> References: <20150408184954.1356280d@canb.auug.org.au> <20150408151350.GA8490@gmail.com> X-Mailer: Sylpheed 3.4.1 (GTK+ 2.24.23; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 8 Apr 2015 17:13:51 +0200 Ingo Molnar wrote: > > * Stephen Rothwell wrote: > > > Hi Andrew, > > > > Today's linux-next merge of the akpm tree got a conflict in > > arch/x86/kernel/cpu/common.c between commit 6b51311c9765 > > ("x86/asm/entry/64: Use a define for an invalid segment selector") from > > the tip tree and commit f28c11e4b695 ("arch/x86/kernel/cpu/common.c: > > fix warning") from the akpm tree. > > So f28c11e4b695 doesn't appear to be in linux-next as fetched a minute > ago: > > triton:~/linux.trees.git> git log f28c11e4b695 -- > fatal: bad revision 'f28c11e4b695' > triton:~/linux.trees.git> git describe > next-20150408 > > How am I supposed to fetch and interpret such sha1's? Stephen didn't include the -mm patch so I guess that ID never was included in -next. For -mm patches the place to bookmark is http://ozlabs.org/~akpm/mmotm/broken-out/. This: http://ozlabs.org/~akpm/mmotm/broken-out/arch-x86-kernel-cpu-commonc-fix-warning.patch It sounds like the warning has now been fixed.