lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20151018060237.GA32100@kroah.com>
Date:	Sat, 17 Oct 2015 23:02:37 -0700
From:	Greg KH <gregkh@...uxfoundation.org>
To:	Willy Tarreau <w@....eu>
Cc:	stable@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: Stable queue is caught up on for 3.10, 3.14, 4.1, and 4.2-stable
 kernels

On Sun, Oct 18, 2015 at 07:56:06AM +0200, Willy Tarreau wrote:
> Hi Greg,
> 
> On Sat, Oct 17, 2015 at 07:09:52PM -0700, Greg KH wrote:
> > Hi all,
> > 
> > I've finally caught up on all pending patches for the above mentioned
> > stable kernels that have either hit Linus's tree with a stable@ or
> > fixes: marking, or have been emailed to the stable@ list requesting to
> > be included.
> 
> Impressed :-)
> 
> I'm seeing that each series ends with patch (N-1)/N, so I think something
> changed in your scripts, either N is wrong in which case we can ignore
> this, or the last patch of each series was not sent.
> 
> Could you please double-check ?

I see it on my end, and I got the cc:.  vger likes to reject some of the
patches due to odd mime-encoding issues as it fights between git
send-email and how it creates the patches.  So maybe that was one of
them, I know I got many bounces this time around.

I don't really know how to resolve this, sorry.

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ