lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 6 Aug 2014 22:00:39 -0400
From:	Andev <>
To:	Kamal Mostafa <>
Cc:	Davidlohr Bueso <>,
	Peter Zijlstra <>,
	Mikulas Patocka <>,
	David Miller <>,
	Chris Metcalf <>,
	James Bottomley <>,
	Vineet Gupta <>,
	Jason Low <>,
	Waiman Long <>,
	"James E.J. Bottomley" <>,
	Paul McKenney <>,
	John David Anglin <>,
	James Hogan <>,
	Linus Torvalds <>,
	Benjamin Herrenschmidt <>,
	Catalin Marinas <>,
	Russell King <>,
	Will Deacon <>,,
	LKML <>,,,
	Ingo Molnar <>,
Subject: Re: [3.13.y.z extended stable] Patch "locking/mutex: Disable
 optimistic spinning on some architectures" has been added to staging queue

On Wed, Aug 6, 2014 at 9:55 PM, Kamal Mostafa <> wrote:
> On Wed, 2014-08-06 at 14:30 -0700, Davidlohr Bueso wrote:
>> Well 3.13.y.z isn't an Ubuntu kernel, its upstream, and those archs
>> *are* supported.
> Davidlohr's answer is correct: This is not an "Ubuntu kernel".
> 3.13.y.z is an "extended stable" kernel which follows the same rules as
> the official stable kernels.  It contains no Ubuntu-specific
> patches, and supports the same arch's as mainline.
> More details about this and the other Canonical-funded-and-hosted
> "extended stable" kernel versions is available here:
>> For more information about the 3.13.y.z tree, see

OK, thank you for clarification. I was unsure as this is not hosted on, I thought it was a Ubuntu specific kernel.

So we have the following stable kernels as of now:

3.10, 3.12, 3.13, 3.14, 3.15(for a few days), 3.16!

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists