lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1410647981.3040.21.camel@decadent.org.uk>
Date: Sat, 13 Sep 2014 23:39:41 +0100
From: Ben Hutchings <ben@...adent.org.uk>
To: Guenter Roeck <linux@...ck-us.net>
Cc: linux-kernel@...r.kernel.org, stable@...r.kernel.org,
torvalds@...ux-foundation.org,
Satoru Takeuchi <satoru.takeuchi@...il.com>,
akpm@...ux-foundation.org
Subject: Re: [PATCH 3.2 000/131] 3.2.63-rc1 review
On Thu, 2014-09-11 at 06:30 -0700, Guenter Roeck wrote:
> On 09/11/2014 05:32 AM, Ben Hutchings wrote:
> > This is the start of the stable review cycle for the 3.2.63 release.
> > There are 131 patches in this series, which will be posted as responses
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Sat Sep 13 12:32:13 UTC 2014.
> > Anything received after that time might be too late.
> >
>
> Build results:
> total: 111 pass: 106 fail: 5
> Failed builds:
> microblaze:mmu_defconfig
> microblaze:nommu_defconfig
> mips:allmodconfig
> xtensa:defconfig
> xtensa:allmodconfig
>
> Qemu test results:
> total: 18 pass: 17 fail: 1
> Failed tests:
> microblaze:microblaze_defconfig
>
> Results are as expected and an improvement over previous releases,
> where sparc64:allmodconfig used to fail as well. The failing qemu
> test was added to the list of tests only recently and is a known
> problem.
Thanks for testing!
Ben.
--
Ben Hutchings
I'm always amazed by the number of people who take up solipsism because
they heard someone else explain it. - E*Borg on alt.fan.pratchett
Download attachment "signature.asc" of type "application/pgp-signature" (812 bytes)
Powered by blists - more mailing lists