From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6B585C43381 for ; Tue, 26 Mar 2019 03:03:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2F92020823 for ; Tue, 26 Mar 2019 03:03:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727157AbfCZDDA convert rfc822-to-8bit (ORCPT ); Mon, 25 Mar 2019 23:03:00 -0400 Received: from mx1.redhat.com ([209.132.183.28]:48202 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726186AbfCZDDA (ORCPT ); Mon, 25 Mar 2019 23:03:00 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C6495308625A for ; Tue, 26 Mar 2019 03:02:59 +0000 (UTC) Received: from [172.54.249.206] (cpt-0006.paas.prod.upshift.rdu2.redhat.com [10.0.18.69]) by smtp.corp.redhat.com (Postfix) with ESMTP id E4BF55FC34; Tue, 26 Mar 2019 03:02:56 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 From: CKI Project To: Linux Stable maillist Subject: =?utf-8?b?4pyF?= PASS: Stable queue: queue-5.0 Message-ID: X-Gitlab-Pipeline-ID: 5883 X-Gitlab-Pipeline: https://xci32.lab.eng.rdu2.redhat.com/cki-project/cki-pipeline/pipelines/5883 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.49]); Tue, 26 Mar 2019 03:02:59 +0000 (UTC) Date: Mon, 25 Mar 2019 23:03:00 -0400 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Hello, We ran automated tests on a patchset that was proposed for merging into this kernel tree. The patches were applied to: Kernel repo: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git Commit: 239cc2c5a3c8 - Linux 5.0.4 The results of these automated tests are provided below. Overall result: PASSED Merge: OK Compile: OK Tests: OK Please reply to this email if you have any questions about the tests that we ran or if you have any suggestions on how to make future tests more effective. ,-. ,-. ( C ) ( K ) Continuous `-',-.`-' Kernel ( I ) Integration `-' ______________________________________________________________________________ Merge testing ------------- We cloned this repository and checked out a ref: Repo: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git Ref: 239cc2c5a3c8 - Linux 5.0.4 We then merged the patchset with `git am`: alsa-hda-add-lenovo-ideacentre-b550-to-the-power_save_blacklist.patch alsa-firewire-motu-use-version-field-of-unit-directory-to-identify-model.patch mmc-pxamci-fix-enum-type-confusion.patch mmc-alcor-fix-dma-reads.patch mmc-mxcmmc-revert-mmc-mxcmmc-handle-highmem-pages.patch mmc-renesas_sdhi-limit-block-count-to-16-bit-for-old-revisions.patch drm-amdgpu-fix-invalid-use-of-change_bit.patch drm-vmwgfx-don-t-double-free-the-mode-stored-in-par-set_mode.patch drm-vmwgfx-return-0-when-gmrid-get_node-runs-out-of-id-s.patch iommu-amd-fix-sg-dma_address-for-sg-offset-bigger-than-page_size.patch iommu-iova-fix-tracking-of-recently-failed-iova-address.patch libceph-wait-for-latest-osdmap-in-ceph_monc_blacklist_add.patch udf-fix-crash-on-io-error-during-truncate.patch mips-loongson64-lemote-2f-add-irqf_no_suspend-to-cascade-irqaction.patch mips-ensure-elf-appended-dtb-is-relocated.patch mips-fix-kernel-crash-for-r6-in-jump-label-branch-function.patch powerpc-vdso64-fix-clock_monotonic-inconsistencies-across-y2038.patch powerpc-security-fix-spectre_v2-reporting.patch net-mlx5-fix-dct-creation-bad-flow.patch scsi-core-avoid-that-a-kernel-warning-appears-during-system-resume.patch scsi-qla2xxx-fix-fc-al-connection-target-discovery.patch scsi-ibmvscsi-protect-ibmvscsi_head-from-concurrent-modificaiton.patch scsi-ibmvscsi-fix-empty-event-pool-access-during-host-removal.patch futex-ensure-that-futex-address-is-aligned-in-handle_futex_death.patch cifs-allow-guest-mounts-to-work-for-smb3.11.patch perf-probe-fix-getting-the-kernel-map.patch objtool-move-objtool_file-struct-off-the-stack.patch irqchip-gic-v3-its-fix-comparison-logic-in-lpi_range_cmp.patch clocksource-drivers-riscv-fix-clocksource-mask.patch smb3-fix-smb3.1.1-guest-mounts-to-samba.patch alsa-hda-don-t-trigger-jackpoll_work-in-azx_resume.patch alsa-ac97-fix-of-node-refcount-unbalance.patch ext4-fix-null-pointer-dereference-while-journal-is-aborted.patch ext4-fix-data-corruption-caused-by-unaligned-direct-aio.patch ext4-brelse-all-indirect-buffer-in-ext4_ind_remove_space.patch Compile testing --------------- We compiled the kernel for 3 architectures: aarch64: make options: make INSTALL_MOD_STRIP=1 -j64 targz-pkg -j64 configuration: https://artifacts.cki-project.org/builds/aarch64/436df05ece48fd94e98918d1b8c9c1a3824fde8a.config ppc64le: make options: make INSTALL_MOD_STRIP=1 -j64 targz-pkg -j64 configuration: https://artifacts.cki-project.org/builds/ppc64le/48ebd5613cdb1a384e4105487d59479b3e123196.config x86_64: make options: make INSTALL_MOD_STRIP=1 -j64 targz-pkg -j64 configuration: https://artifacts.cki-project.org/builds/x86_64/d4ba3edcd163cefd3b8e045bd612f550cc80e816.config Hardware testing ---------------- We booted each kernel and ran the following tests: aarch64: ✅ Boot test [0] ✅ LTP lite - release 20190115 [1] ✅ Loopdev Sanity [2] ✅ xfstests: ext4 [3] ✅ AMTU (Abstract Machine Test Utility) [4] 🚧 ✅ audit: audit testsuite test [5] ✅ httpd: mod_ssl smoke sanity [6] ✅ httpd: php sanity [7] 🚧 ✅ iotop: sanity [8] 🚧 ✅ /CoreOS/net-snmp/Regression/bz251332-tcp-transport 🚧 ✅ tuned: tune-processes-through-perf [9] ✅ Usex - version 1.9-29 [10] ppc64le: ✅ Boot test [0] ✅ LTP lite - release 20190115 [1] ✅ Loopdev Sanity [2] ✅ xfstests: ext4 [3] ✅ AMTU (Abstract Machine Test Utility) [4] 🚧 ✅ audit: audit testsuite test [5] ✅ httpd: mod_ssl smoke sanity [6] ✅ httpd: php sanity [7] 🚧 ✅ iotop: sanity [8] 🚧 ✅ /CoreOS/net-snmp/Regression/bz251332-tcp-transport 🚧 ✅ tuned: tune-processes-through-perf [9] ✅ Usex - version 1.9-29 [10] x86_64: ✅ Boot test [0] ✅ LTP lite - release 20190115 [1] ✅ Loopdev Sanity [2] ✅ xfstests: ext4 [3] ✅ AMTU (Abstract Machine Test Utility) [4] 🚧 ✅ audit: audit testsuite test [5] ✅ httpd: mod_ssl smoke sanity [6] ✅ httpd: php sanity [7] 🚧 ✅ iotop: sanity [8] 🚧 ✅ /CoreOS/net-snmp/Regression/bz251332-tcp-transport 🚧 ✅ tuned: tune-processes-through-perf [9] ✅ Usex - version 1.9-29 [10] Test source: [0]: https://github.com/CKI-project/tests-beaker/archive/master.zip#distribution/kpkginstall [1]: https://github.com/CKI-project/tests-beaker/archive/master.zip#distribution/ltp/lite [2]: https://github.com/CKI-project/tests-beaker/archive/master.zip#filesystems/loopdev/sanity [3]: https://github.com/CKI-project/tests-beaker/archive/master.zip#/filesystems/xfs/xfstests [4]: https://github.com/CKI-project/tests-beaker/archive/master.zip#misc/amtu [5]: https://github.com/CKI-project/tests-beaker/archive/master.zip#packages/audit/audit-testsuite [6]: https://github.com/CKI-project/tests-beaker/archive/master.zip#packages/httpd/mod_ssl-smoke [7]: https://github.com/CKI-project/tests-beaker/archive/master.zip#packages/httpd/php-mysql-sanity [8]: https://github.com/CKI-project/tests-beaker/archive/master.zip#packages/iotop/sanity [9]: https://github.com/CKI-project/tests-beaker/archive/master.zip#packages/tuned/tune-processes-through-perf [10]: https://github.com/CKI-project/tests-beaker/archive/master.zip#standards/usex/1.9-29 Waived tests (marked with 🚧) ----------------------------- This test run included waived tests. Such tests are executed but their results are not taken into account. Tests are waived when their results are not reliable enough, e.g. when they're just introduced or are being fixed.