From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 027698C18 for ; Tue, 12 Sep 2023 12:38:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1694522297; x=1726058297; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=E11vL+vKmGmqTBrCBKI+lUMsWSxGJAYLgvxq7xVynqw=; b=lFuxVYj1VbNorc6GEwaVTXBgoYDWVr6OK58LjfuqOn3yPqrqMsdHWzpf j57lcNAKykA2ajsW5kcXAb938Orvypv8qONmxhCJgaGOwA65Jr4nMqo8A 8zo5D+/MEDrllQ/SztzutE/GqdvJVgro/QqSBO3fMrp5rlACXtMR5Ojmf PLdGYhN9ADk/1nTOQtQrggnGueY3tQlZtv6szvlOFCxxi7PZW53birhyR JXd+LgEXpUtAVQ+YC5carO/um7IhvRQuiRpsKZXceow7bE0aygYIXkoKP 5QidexIxQy/fjMoix5J4JnUZ10m/fljAJRtyIE3NFQW/yb//ap31zflcR g==; X-CSE-ConnectionGUID: EyUWy97gRbWOmegeCIWtEQ== X-CSE-MsgGUID: vb0JJ17+QVOUK2cdjaCGKA== X-ThreatScanner-Verdict: Negative X-IronPort-AV: E=Sophos;i="6.02,139,1688454000"; d="asc'?scan'208";a="171179712" X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa6.microchip.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 12 Sep 2023 05:37:32 -0700 Received: from chn-vm-ex02.mchp-main.com (10.10.85.144) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21; Tue, 12 Sep 2023 05:37:32 -0700 Received: from wendy (10.10.85.11) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.21 via Frontend Transport; Tue, 12 Sep 2023 05:37:29 -0700 Date: Tue, 12 Sep 2023 13:37:13 +0100 From: Conor Dooley To: Greg Kroah-Hartman CC: , , , , , , , , , , , , , , , Subject: Re: [PATCH 6.1 000/600] 6.1.53-rc1 review Message-ID: <20230912-boots-hatchery-d41b78c06dc4@wendy> References: <20230911134633.619970489@linuxfoundation.org> Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="+hIUuOqW4OReJAQc" Content-Disposition: inline In-Reply-To: <20230911134633.619970489@linuxfoundation.org> --+hIUuOqW4OReJAQc Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Mon, Sep 11, 2023 at 03:40:33PM +0200, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 6.1.53 release. > There are 600 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. Other than the already reported ufs inode build failure, Tested-by: Conor Dooley Thanks, Conor. --+hIUuOqW4OReJAQc Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQRh246EGq/8RLhDjO14tDGHoIJi0gUCZQBbeQAKCRB4tDGHoIJi 0jwTAPoCVRMBIUky80V20IOzliDT6PEJBg3Ox3SCcuKmY1qZ+QD+JWvwR2nlzF6e P5yvvrU27M9zU72J+mdl9adxKaKcAwE= =DpZK -----END PGP SIGNATURE----- --+hIUuOqW4OReJAQc--