lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 7 Apr 2021 08:58:00 +0800 From: Samuel Zou <zou_wei@...wei.com> To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, <linux-kernel@...r.kernel.org> CC: <torvalds@...ux-foundation.org>, <akpm@...ux-foundation.org>, <linux@...ck-us.net>, <shuah@...nel.org>, <patches@...nelci.org>, <lkft-triage@...ts.linaro.org>, <pavel@...x.de>, <jonathanh@...dia.com>, <f.fainelli@...il.com>, <stable@...r.kernel.org> Subject: Re: [PATCH 4.14 00/52] 4.14.229-rc1 review On 2021/4/5 16:53, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.14.229 release. > There are 52 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed, 07 Apr 2021 08:50:09 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.229-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y > and the diffstat can be found below. > > thanks, > > greg k-h Tested on x86 for 4.14.229-rc1, Kernel repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git Branch: linux-4.14.y Version: 4.14.229-rc1 Commit: 9d1c6513551e6928da195e22c6b32ed0adf42593 Compiler: gcc version 7.3.0 (GCC) x86: -------------------------------------------------------------------- Testcase Result Summary: total: 4667 passed: 4667 failed: 0 timeout: 0 -------------------------------------------------------------------- Tested-by: Hulk Robot <hulkrobot@...wei.com>
Powered by blists - more mailing lists