From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757590AbcBACmC (ORCPT ); Sun, 31 Jan 2016 21:42:02 -0500 Received: from bh-25.webhostbox.net ([208.91.199.152]:34243 "EHLO bh-25.webhostbox.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752816AbcBACl5 (ORCPT ); Sun, 31 Jan 2016 21:41:57 -0500 Subject: Re: [PATCH 4.4 00/67] 4.4.1-stable review To: Greg Kroah-Hartman References: <20160127180907.419868641@linuxfoundation.org> <56A97BA2.5030201@roeck-us.net> <56A98937.8040100@roeck-us.net> <20160131191734.GB23698@kroah.com> Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah.kh@samsung.com, info@kernelci.org, stable@vger.kernel.org From: Guenter Roeck Message-ID: <56AEC5F2.3050503@roeck-us.net> Date: Sun, 31 Jan 2016 18:41:54 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: <20160131191734.GB23698@kroah.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated_sender: linux@roeck-us.net X-OutGoing-Spam-Status: No, score=-1.0 X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - roeck-us.net X-Get-Message-Sender-Via: bh-25.webhostbox.net: authenticated_id: linux@roeck-us.net X-Authenticated-Sender: bh-25.webhostbox.net: linux@roeck-us.net X-Source: X-Source-Args: X-Source-Dir: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/31/2016 11:17 AM, Greg Kroah-Hartman wrote: > On Wed, Jan 27, 2016 at 07:21:27PM -0800, Guenter Roeck wrote: >> On 01/27/2016 06:23 PM, Guenter Roeck wrote: >>> On 01/27/2016 10:11 AM, Greg Kroah-Hartman wrote: >>>> ------------------------- >>>> NOTE: >>>> There are still a lot of pending stable patches in the queue, well >>>> over 400 of them to be specific, so some of your favorite/pet patches >>>> might not be included in these releases. Please be patient as I dig >>>> out from this backlog over the next few weeks. If there are specific >>>> patches that you just _must_ have included in a stable release soon, >>>> please let me know. >>>> ------------------------- >>>> >>>> This is the start of the stable review cycle for the 4.4.1 release. >>>> There are 67 patches in this series, all will be posted as a response >>>> to this one. If anyone has any issues with these being applied, please >>>> let me know. >>>> >>>> Responses should be made by Fri Jan 29 18:08:16 UTC 2016. >>>> Anything received after that time might be too late. >>>> >>> Build results: >>> total: 145 pass: 145 fail: 0 >>> >>> Qemu test results: >>> total: 96 pass: 94 fail: 2 >>> Failed tests: >>> arm64:smp:defconfig >>> arm64:nosmp:defconfig >>> >>> arm64 qemu test failures are the same as in v4.1.y, v4.3.y, and mainline. >>> >> >> Fix is now upstream, in case you want to apply it to v4.1 / v4.3 / v4.4. >> Commit f436b2ac90a0 ("arm64: kernel: fix architected PMU registers >> unconditional access"). > > I've applied it to 4.3 and 4.4, but it doesn't apply to 4.1 at all :( > Turns out f436b2ac90a0 wasn't needed in 4.1 after all since you did not apply 60792ad349f3 ("arm64: kernel: enforce pmuserenr_el0 initialization and restore"). All (my) final builds and qemu tests for 4.1.17, 4.3.5, and 4.4.1 are good. Thanks, Guenter