From: kbuild test robot <lkp@intel.com>
To: "Greg Kroah-Hartman" <gregkh@linuxfoundation.org>
Cc: linux-serial@vger.kernel.org
Subject: [tty:tty-next] BUILD SUCCESS 8508f4cba308f785b2fd4b8c38849c117b407297
Date: Thu, 07 May 2020 01:30:20 +0800 [thread overview]
Message-ID: <5eb2f42c.v43K2YJbP/oa5RBP%lkp@intel.com> (raw)
tree/branch: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git tty-next
branch HEAD: 8508f4cba308f785b2fd4b8c38849c117b407297 serial: amba-pl011: Make sure we initialize the port.lock spinlock
elapsed time: 1294m
configs tested: 235
configs skipped: 0
The following configs have been built successfully.
More configs may be tested in the coming days.
arm64 allyesconfig
arm64 allmodconfig
arm allmodconfig
arm64 allnoconfig
arm allnoconfig
arm allyesconfig
sparc allyesconfig
m68k allyesconfig
parisc allnoconfig
um x86_64_defconfig
ia64 allnoconfig
um allyesconfig
nds32 defconfig
ia64 allmodconfig
alpha defconfig
microblaze allyesconfig
m68k defconfig
um i386_defconfig
um defconfig
sparc64 allmodconfig
microblaze allnoconfig
openrisc defconfig
i386 defconfig
sparc defconfig
sh allmodconfig
s390 allyesconfig
i386 allnoconfig
i386 allyesconfig
i386 alldefconfig
i386 debian-10.3
ia64 defconfig
ia64 allyesconfig
ia64 alldefconfig
m68k allmodconfig
m68k sun3_defconfig
m68k multi_defconfig
nios2 defconfig
nios2 allyesconfig
c6x allyesconfig
c6x allnoconfig
openrisc allyesconfig
nds32 allnoconfig
csky allyesconfig
csky defconfig
alpha allyesconfig
xtensa allyesconfig
h8300 allyesconfig
h8300 allmodconfig
xtensa defconfig
arc defconfig
arc allyesconfig
sh allnoconfig
mips allyesconfig
mips 64r6el_defconfig
mips allnoconfig
mips 32r2_defconfig
mips allmodconfig
parisc allyesconfig
parisc allmodconfig
powerpc defconfig
powerpc allyesconfig
powerpc alldefconfig
powerpc rhel-kconfig
powerpc allmodconfig
powerpc allnoconfig
m68k randconfig-a001-20200503
mips randconfig-a001-20200503
nds32 randconfig-a001-20200503
alpha randconfig-a001-20200503
parisc randconfig-a001-20200503
riscv randconfig-a001-20200503
m68k randconfig-a001-20200506
mips randconfig-a001-20200506
nds32 randconfig-a001-20200506
parisc randconfig-a001-20200506
alpha randconfig-a001-20200506
riscv randconfig-a001-20200506
m68k randconfig-a001-20200505
mips randconfig-a001-20200505
nds32 randconfig-a001-20200505
parisc randconfig-a001-20200505
alpha randconfig-a001-20200505
riscv randconfig-a001-20200505
h8300 randconfig-a001-20200503
nios2 randconfig-a001-20200503
microblaze randconfig-a001-20200503
c6x randconfig-a001-20200503
sparc64 randconfig-a001-20200503
h8300 randconfig-a001-20200506
nios2 randconfig-a001-20200506
microblaze randconfig-a001-20200506
c6x randconfig-a001-20200506
sparc64 randconfig-a001-20200506
s390 randconfig-a001-20200505
xtensa randconfig-a001-20200505
sh randconfig-a001-20200505
openrisc randconfig-a001-20200505
csky randconfig-a001-20200505
xtensa randconfig-a001-20200503
openrisc randconfig-a001-20200503
csky randconfig-a001-20200503
s390 randconfig-a001-20200506
xtensa randconfig-a001-20200506
sh randconfig-a001-20200506
openrisc randconfig-a001-20200506
csky randconfig-a001-20200506
i386 randconfig-b003-20200506
i386 randconfig-b001-20200506
x86_64 randconfig-b001-20200506
x86_64 randconfig-b003-20200506
i386 randconfig-b002-20200506
i386 randconfig-b003-20200503
x86_64 randconfig-b002-20200503
i386 randconfig-b001-20200503
x86_64 randconfig-b003-20200503
x86_64 randconfig-b001-20200503
i386 randconfig-b002-20200503
i386 randconfig-b003-20200505
x86_64 randconfig-b002-20200505
i386 randconfig-b001-20200505
x86_64 randconfig-b001-20200505
x86_64 randconfig-b003-20200505
i386 randconfig-b002-20200505
i386 randconfig-b003-20200502
i386 randconfig-b001-20200502
x86_64 randconfig-b003-20200502
x86_64 randconfig-b001-20200502
i386 randconfig-b002-20200502
x86_64 randconfig-a003-20200506
x86_64 randconfig-a001-20200506
x86_64 randconfig-a002-20200506
i386 randconfig-a001-20200506
i386 randconfig-a002-20200506
i386 randconfig-a003-20200506
x86_64 randconfig-c001-20200503
x86_64 randconfig-c002-20200503
i386 randconfig-c002-20200503
x86_64 randconfig-c003-20200503
i386 randconfig-c001-20200503
i386 randconfig-c003-20200503
x86_64 randconfig-d001-20200505
i386 randconfig-d003-20200505
i386 randconfig-d001-20200505
x86_64 randconfig-d003-20200505
x86_64 randconfig-d002-20200505
i386 randconfig-d002-20200505
i386 randconfig-d003-20200506
i386 randconfig-d001-20200506
x86_64 randconfig-d002-20200506
i386 randconfig-d002-20200506
x86_64 randconfig-d001-20200503
i386 randconfig-d003-20200503
x86_64 randconfig-d003-20200503
i386 randconfig-d001-20200503
x86_64 randconfig-d002-20200503
i386 randconfig-d002-20200503
i386 randconfig-e003-20200506
x86_64 randconfig-e003-20200506
x86_64 randconfig-e001-20200506
i386 randconfig-e002-20200506
i386 randconfig-e001-20200506
x86_64 randconfig-e003-20200503
x86_64 randconfig-e002-20200503
i386 randconfig-e003-20200503
x86_64 randconfig-e001-20200503
i386 randconfig-e002-20200503
i386 randconfig-e001-20200503
i386 randconfig-f003-20200505
x86_64 randconfig-f001-20200505
x86_64 randconfig-f003-20200505
i386 randconfig-f001-20200505
i386 randconfig-f002-20200505
i386 randconfig-f003-20200503
x86_64 randconfig-f002-20200503
i386 randconfig-f001-20200503
i386 randconfig-f002-20200503
i386 randconfig-f003-20200506
x86_64 randconfig-f001-20200506
x86_64 randconfig-f003-20200506
x86_64 randconfig-f002-20200506
i386 randconfig-f001-20200506
i386 randconfig-f002-20200506
x86_64 randconfig-a003-20200505
x86_64 randconfig-a001-20200505
i386 randconfig-a001-20200505
i386 randconfig-a003-20200505
i386 randconfig-a002-20200505
x86_64 randconfig-g003-20200506
i386 randconfig-g003-20200506
i386 randconfig-g002-20200506
x86_64 randconfig-g001-20200506
i386 randconfig-g001-20200506
x86_64 randconfig-g002-20200506
i386 randconfig-g003-20200505
i386 randconfig-g002-20200505
i386 randconfig-g001-20200505
x86_64 randconfig-g002-20200505
i386 randconfig-h002-20200506
i386 randconfig-h001-20200506
i386 randconfig-h003-20200506
x86_64 randconfig-h002-20200506
x86_64 randconfig-h003-20200506
x86_64 randconfig-h001-20200506
x86_64 randconfig-a002-20200503
i386 randconfig-a002-20200503
i386 randconfig-a003-20200503
i386 randconfig-a001-20200503
arm64 randconfig-a001-20200506
arc randconfig-a001-20200506
powerpc randconfig-a001-20200506
arm randconfig-a001-20200506
sparc randconfig-a001-20200506
ia64 randconfig-a001-20200505
powerpc randconfig-a001-20200505
arm randconfig-a001-20200505
ia64 randconfig-a001-20200506
riscv allyesconfig
riscv defconfig
riscv allmodconfig
riscv allnoconfig
s390 allnoconfig
s390 allmodconfig
s390 alldefconfig
s390 defconfig
sparc64 defconfig
sparc64 allnoconfig
sparc64 allyesconfig
um allmodconfig
x86_64 rhel
x86_64 rhel-7.6
x86_64 rhel-7.6-kselftests
x86_64 rhel-7.2-clear
x86_64 lkp
x86_64 fedora-25
x86_64 kexec
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
reply other threads:[~2020-05-06 17:30 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5eb2f42c.v43K2YJbP/oa5RBP%lkp@intel.com \
--to=lkp@intel.com \
--cc=gregkh@linuxfoundation.org \
--cc=linux-serial@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).