lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Ysw4VMoYvMaWNgq0@kroah.com>
Date:   Mon, 11 Jul 2022 16:48:52 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     "Deucher, Alexander" <Alexander.Deucher@....com>
Cc:     "Koenig, Christian" <Christian.Koenig@....com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "stable@...r.kernel.org" <stable@...r.kernel.org>,
        Sasha Levin <sashal@...nel.org>
Subject: Re: [PATCH 5.15 138/230] drm/amdgpu: bind to any 0x1002 PCI diplay
 class device

On Mon, Jul 11, 2022 at 02:01:50PM +0000, Deucher, Alexander wrote:
> [Public]
> 
> > -----Original Message-----
> > From: Koenig, Christian <Christian.Koenig@....com>
> > Sent: Monday, July 11, 2022 5:30 AM
> > To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>; Deucher,
> > Alexander <Alexander.Deucher@....com>; linux-kernel@...r.kernel.org
> > Cc: stable@...r.kernel.org; Sasha Levin <sashal@...nel.org>
> > Subject: Re: [PATCH 5.15 138/230] drm/amdgpu: bind to any 0x1002 PCI
> > diplay class device
> > 
> > Hi Greg & Alex
> > 
> > why is that patch picked up for stable? Or are we backporting IP based
> > discovery?
> > 
> 
> Looks like Sasha picked it up.  This should not go to stable.

Ok, will go and drop it now, thanks for letting us know.

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ