lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 27 Apr 2022 12:11:14 +0100 From: Sudip Mukherjee <sudipm.mukherjee@...il.com> To: Greg Kroah-Hartman <gregkh@...uxfoundation.org> Cc: linux-kernel@...r.kernel.org, stable@...r.kernel.org, torvalds@...ux-foundation.org, akpm@...ux-foundation.org, linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org, lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com, f.fainelli@...il.com, slade@...dewatkins.com Subject: Re: [PATCH 5.15 000/124] 5.15.36-rc1 review Hi Greg, On Tue, Apr 26, 2022 at 10:20:01AM +0200, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 5.15.36 release. > There are 124 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu, 28 Apr 2022 08:17:22 +0000. > Anything received after that time might be too late. Build test: mips (gcc version 11.2.1 20220408): 62 configs -> no failure arm (gcc version 11.2.1 20220408): 100 configs -> no new failure arm64 (gcc version 11.2.1 20220408): 3 configs -> no failure x86_64 (gcc version 11.2.1 20220408): 4 configs -> no failure Boot test: x86_64: Booted on my test laptop. No regression. x86_64: Booted on qemu. No regression. [1] arm64: Booted on rpi4b (4GB model). No regression. [2] mips: Booted on ci20 board. No regression. [3] [1]. https://openqa.qa.codethink.co.uk/tests/1068 [2]. https://openqa.qa.codethink.co.uk/tests/1073 [3]. https://openqa.qa.codethink.co.uk/tests/1075 Tested-by: Sudip Mukherjee <sudip.mukherjee@...ethink.co.uk> -- Regards Sudip
Powered by blists - more mailing lists