From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 68A0AC4332F for ; Mon, 30 Oct 2023 21:10:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229814AbjJ3VKn (ORCPT ); Mon, 30 Oct 2023 17:10:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39838 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229646AbjJ3VKl (ORCPT ); Mon, 30 Oct 2023 17:10:41 -0400 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DF921F7; Mon, 30 Oct 2023 14:10:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canb.auug.org.au; s=201702; t=1698700237; bh=is4JBeiI18bzBYV22PqwabroerzhWqb6I32Kgi4a67E=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=cIzO9JXwydt1F1RZBE3wLfL7pGnEkflVAMDkA6TsjaX32fZHa+Pdl1Hjem/82h2i1 FME3yw76GwYhTvV2eUrUW3t1v/CaO98iioYnBaL4HRg6+8Y5XLzE4sYhvR23ca6PN4 LWFJJiNAw3PxiZcwFyFPvR3L2rps+Ie2uA38VC32D0pFY8VqGV9lboo+XeIV9mnSRu VxBbw13V4MciCIFvBJp8L8N0dPtK/zJfXHce+fXkMhUZXc/d+YRwZ1waKfvwGwe49n hYgWheV8sqaC8BQ3mZn3fBzveEbt3ImtMS68D+AsWnk6SXrB6mXXXItdTGc+gmefI3 L7FDuAilD4Q2Q== Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4SK5XF1MSnz4wdD; Tue, 31 Oct 2023 08:10:37 +1100 (AEDT) Date: Tue, 31 Oct 2023 08:10:35 +1100 From: Stephen Rothwell To: Sean Christopherson Cc: Paolo Bonzini , Christian Brauner , Ackerley Tng , Chao Peng , Isaku Yamahata , "Kirill A. Shutemov" , Michael Roth , Yu Zhang , Linux Kernel Mailing List , Linux Next Mailing List Subject: Re: linux-next: build failure after merge of the kvm-x86 tree Message-ID: <20231031081035.7f7d860b@canb.auug.org.au> In-Reply-To: References: <20231030134806.24510492@canb.auug.org.au> <20231030-ignorant-liebschaft-6d603ab43494@brauner> <3ed75fa4-6b49-4fd2-a907-8619ca19a8b8@redhat.com> <20231031073705.512dab4b@canb.auug.org.au> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="Sig_/.ipiPiFX+WGg=/kWFhoCo2W"; protocol="application/pgp-signature"; micalg=pgp-sha256 Precedence: bulk List-ID: X-Mailing-List: linux-next@vger.kernel.org --Sig_/.ipiPiFX+WGg=/kWFhoCo2W Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hi Sean, On Mon, 30 Oct 2023 14:05:12 -0700 Sean Christopherson = wrote: > > That's my bad, I wanted to get the guest_memfd code exposure asap and jum= ped the > gun. I'll yank the branch out kvm-x86/next. Thanks. > I assume -rc1 is when the floodgates "officially" open again? Yes, indeed. --=20 Cheers, Stephen Rothwell --Sig_/.ipiPiFX+WGg=/kWFhoCo2W Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEENIC96giZ81tWdLgKAVBC80lX0GwFAmVAG8sACgkQAVBC80lX 0GyPBQf+OfPml3Xi9xrWB/wr4CEt6GQGPDOLIhY5HkKwRTaDM+mN7FDKLkkvO9Qc PRsB0nMnsbofE8fu8EDrjvPWwaerXsMSYcbEieU3mvD61QhjXpnO9AGI+uV0ayVa 5slatc1y64wnMd9iHWbBqEfdKsBERPAjyGW5DUQun0RM8McA9JbikOPAhg/sncQX CCYoNiQVHw3tmuJj7gwxl1pPxsyowmqr0TYBSc+NTfY9J6zYLg8cCS9omUc6x1UZ 8H7R738EXk/6WZ43tX4kA+eeO+nTi+UZAvPbi8PLGfqVIs/QQdElHbjxRJdx/kWJ ExRJX1xVKeQD4s4efNnlezPhuivnLw== =YCGZ -----END PGP SIGNATURE----- --Sig_/.ipiPiFX+WGg=/kWFhoCo2W--