From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753620AbcEINVL (ORCPT ); Mon, 9 May 2016 09:21:11 -0400 Received: from bh-25.webhostbox.net ([208.91.199.152]:47600 "EHLO bh-25.webhostbox.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753586AbcEINVF (ORCPT ); Mon, 9 May 2016 09:21:05 -0400 Subject: Re: [PATCH 3.14 00/23] 3.14.69-stable review To: Greg Kroah-Hartman , linux-kernel@vger.kernel.org References: <20160509071646.726412064@linuxfoundation.org> Cc: torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah.kh@samsung.com, patches@kernelci.org, stable@vger.kernel.org From: Guenter Roeck Message-ID: <57308EB5.30707@roeck-us.net> Date: Mon, 9 May 2016 06:20:53 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 In-Reply-To: <20160509071646.726412064@linuxfoundation.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated_sender: linux@roeck-us.net X-OutGoing-Spam-Status: No, score=-1.0 X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - roeck-us.net X-Get-Message-Sender-Via: bh-25.webhostbox.net: authenticated_id: linux@roeck-us.net X-Authenticated-Sender: bh-25.webhostbox.net: linux@roeck-us.net X-Source: X-Source-Args: X-Source-Dir: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/09/2016 12:17 AM, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 3.14.69 release. > There are 23 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed May 11 07:16:11 UTC 2016. > Anything received after that time might be too late. > Build results: total: 129 pass: 129 fail: 0 Qemu test results: total: 90 pass: 90 fail: 0 Runtime warnings (mainstone:mainstone_defconfig): WARNING: CPU: 0 PID: 0 at kernel/irq/chip.c:670 __irq_set_handler+0x118/0x128() Modules linked in: CPU: 0 PID: 0 Comm: swapper Not tainted 3.14.68-00023-g982ed6e #1 [] (unwind_backtrace) from [] (show_stack+0x10/0x14) [] (show_stack) from [] (warn_slowpath_common+0x6c/0x8c) [] (warn_slowpath_common) from [] (warn_slowpath_null+0x1c/0x24) [] (warn_slowpath_null) from [] (__irq_set_handler+0x118/0x128) [] (__irq_set_handler) from [] (mainstone_init_irq+0x84/0xa4) [] (mainstone_init_irq) from [] (init_IRQ+0x14/0x1c) [] (init_IRQ) from [] (start_kernel+0x1b8/0x350) [] (start_kernel) from [] (0xa0008040)70 __irq_set_handler+0x118/0x128() To be fair, this is not a new warning. Only reason for it to show up now is that I recently added mainstone to my list of tests. The problem is also seen with v3.14. I do not see it with the current mainline kernel, so it must have been fixed at some point. I may do a reverse bisect if I find the time. For the time being, this is not a concern. Details are available at http://kerneltests.org/builders. Guenter