From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753042AbcECH1j (ORCPT ); Tue, 3 May 2016 03:27:39 -0400 Received: from bh-25.webhostbox.net ([208.91.199.152]:41013 "EHLO bh-25.webhostbox.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750732AbcECH1h (ORCPT ); Tue, 3 May 2016 03:27:37 -0400 Subject: Re: [PATCH 4.4 000/163] 4.4.9-stable review To: Greg Kroah-Hartman , linux-kernel@vger.kernel.org References: <20160503000508.556845508@linuxfoundation.org> Cc: torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah.kh@samsung.com, patches@kernelci.org, stable@vger.kernel.org, Addy Ke From: Guenter Roeck Message-ID: <572852CD.5050408@roeck-us.net> Date: Tue, 3 May 2016 00:27:09 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 In-Reply-To: <20160503000508.556845508@linuxfoundation.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated_sender: linux@roeck-us.net X-OutGoing-Spam-Status: No, score=-1.0 X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - roeck-us.net X-Get-Message-Sender-Via: bh-25.webhostbox.net: authenticated_id: linux@roeck-us.net X-Authenticated-Sender: bh-25.webhostbox.net: linux@roeck-us.net X-Source: X-Source-Args: X-Source-Dir: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/02/2016 05:10 PM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.4.9 release. > There are 163 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu May 5 00:04:47 UTC 2016. > Anything received after that time might be too late. > Build results: total: 146 pass: 143 fail: 3 Failed builds: arm:allmodconfig arm64:allmodconfig mips:allmodconfig Qemu test results: total: 100 pass: 90 fail: 10 Failed tests: arm:beagle:multi_v7_defconfig:omap3-beagle arm:beaglexm:multi_v7_defconfig:omap3-beagle-xm arm:overo:multi_v7_defconfig:omap3-overo-tobi arm:vexpress-a9:multi_v7_defconfig:vexpress-v2p-ca9 arm:vexpress-a15:multi_v7_defconfig:vexpress-v2p-ca15-tc1 arm:xilinx-zynq-a9:multi_v7_defconfig:zynq-zc702 arm:xilinx-zynq-a9:multi_v7_defconfig:zynq-zc706 arm:xilinx-zynq-a9:multi_v7_defconfig:zynq-zed arm:midway:multi_v7_defconfig:ecx-2000 arm:smdkc210:multi_v7_defconfig:exynos4210-smdkv310 Details are available at http://kerneltests.org/builders. The failures are all build failures. drivers/spi/spi-rockchip.c: In function 'rockchip_spi_prepare_dma': drivers/spi/spi-rockchip.c:458:19: error: 'struct dma_slave_caps' has no member named 'max_burst' drivers/spi/spi-rockchip.c:478:19: error: 'struct dma_slave_caps' has no member named 'max_burst' Culprit is "spi: rockchip: modify DMA max burst to 1". That patch would also require commit 6d5bbed30f89 ("dmaengine: core: expose max burst capability to clients"), which unfortunately does not apply cleanly. Guenter