From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 778B8653; Wed, 6 Sep 2023 04:57:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 81CFBC433C7; Wed, 6 Sep 2023 04:56:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1693976219; bh=gBkOSM1TXZtrGeu0Ok44mmJpgv7/rSvwRQZbceojhj0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uReM11Zfz+U97Tz8XyN8IPfW0d9wX8PD8kkzTS3ugl0k+sUllyJ0mfkfa+n2rpspx XDghQIPF2i30JprXM6991AXrJmRdCLyqdHda75xHZeegxlZTb3GwERvK1ZvgN5JpFM G2272vgYIc4hJQNhlmT0F5zIWwgcCddLrawitD6gFLzEP915Xqcq+6aNIc/JUkp1pw XsIrZn0JQOvCQpqf6nxD/04v11Cb3hMCpaC5m4VtJd0xYYp2nedrVbnqUDxdMusSjG 4wpqkER0gvYg4xDc8lkWgTzXvoITrEoE0BHzB/4P465GfeEI6dLmAlaYfMnzPGf4mg hEpUFNl8pN8VQ== From: SeongJae Park To: Greg Kroah-Hartman Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, damon@lists.linux.dev, SeongJae Park Subject: Re: [PATCH 6.1 00/31] 6.1.52-rc1 review Date: Wed, 6 Sep 2023 04:56:56 +0000 Message-Id: <20230906045656.183802-1-sj@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230904182946.999390199@linuxfoundation.org> References: Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Hello, On Mon, 4 Sep 2023 19:30:08 +0100 Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 6.1.52 release. > There are 31 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed, 06 Sep 2023 18:29:29 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.52-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.1.y > and the diffstat can be found below. This rc kernel passes DAMON functionality test[1] on my test machine. Attaching the test results summary below. Please note that I retrieved the kernel from linux-stable-rc tree[2]. Tested-by: SeongJae Park [1] https://github.com/awslabs/damon-tests/tree/next/corr [2] d0abe9b6003a ("Linux 6.1.52-rc1") Thanks, SJ [...] --- ok 1 selftests: damon: debugfs_attrs.sh ok 2 selftests: damon: debugfs_schemes.sh ok 3 selftests: damon: debugfs_target_ids.sh ok 4 selftests: damon: debugfs_empty_targets.sh ok 5 selftests: damon: debugfs_huge_count_read_write.sh ok 6 selftests: damon: debugfs_duplicate_context_creation.sh ok 7 selftests: damon: sysfs.sh ok 1 selftests: damon-tests: kunit.sh ok 2 selftests: damon-tests: huge_count_read_write.sh ok 3 selftests: damon-tests: buffer_overflow.sh ok 4 selftests: damon-tests: rm_contexts.sh ok 5 selftests: damon-tests: record_null_deref.sh ok 6 selftests: damon-tests: dbgfs_target_ids_read_before_terminate_race.sh ok 7 selftests: damon-tests: dbgfs_target_ids_pid_leak.sh ok 8 selftests: damon-tests: damo_tests.sh ok 9 selftests: damon-tests: masim-record.sh ok 10 selftests: damon-tests: build_i386.sh ok 11 selftests: damon-tests: build_m68k.sh ok 12 selftests: damon-tests: build_arm64.sh ok 13 selftests: damon-tests: build_i386_idle_flag.sh ok 14 selftests: damon-tests: build_i386_highpte.sh ok 15 selftests: damon-tests: build_nomemcg.sh PASS