From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B3A78BA31; Sat, 2 Dec 2023 00:40:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="d7F0gYoK" Received: by smtp.kernel.org (Postfix) with ESMTPSA id B4038C433C8; Sat, 2 Dec 2023 00:40:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701477612; bh=JAT/1n7S31Qi9ta5zOkJzWjF1kM8UujOOAJ7I+rNqqA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=d7F0gYoK2cK24Y5b8aV5NyWfZ/U81hDCKJbQ6The7TLz3GC2yg/JUVyxVzVSRQgQp aTHzW4s4/M+Jn6OVI5bvphAAKFziInYfvzizlZ2kxyLMLDkxVCk6gMZ5J9dfC9+cHH 0dWJx8Rz3vkqZv1D8AIwI4mXI35+f/n9XvshN6vAYJtE0yDjuD5ZiIhG+cKXu6Gy3N 9qPWgYew5dm4nvsCr0ueWcb4zOdUpLEC9f4y7klxaRdw+jhORvxcXctIIwy7YYK2yx KJ8rLIl8MrCrAhkJ53bTLk4I2iLsnymA2F4o3N+biCkUcR96McHFt52GmFvoaYbXzU Rv3Ja4qmAnIqw== From: SeongJae Park To: Greg Kroah-Hartman Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, allen.lkml@gmail.com, damon@lists.linux.dev, SeongJae Park Subject: Re: [PATCH 6.1 00/82] 6.1.65-rc1 review Date: Sat, 2 Dec 2023 00:40:09 +0000 Message-Id: <20231202004009.46340-1-sj@kernel.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20231130162135.977485944@linuxfoundation.org> References: Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Hello, On 2023-11-30T16:21:31+00:00 Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 6.1.65 release. > There are 82 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Sat, 02 Dec 2023 16:21:18 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.65-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.1.y > and the diffstat can be found below. This rc kernel passes DAMON functionality test[1] on my test machine. Attaching the test results summary below. Please note that I retrieved the kernel from linux-stable-rc tree[2]. Tested-by: SeongJae Park [1] https://github.com/awslabs/damon-tests/tree/next/corr [2] 49ac60b65ef7 ("Linux 6.1.65-rc1") Thanks, SJ [...] --- ok 1 selftests: damon: debugfs_attrs.sh ok 2 selftests: damon: debugfs_schemes.sh ok 3 selftests: damon: debugfs_target_ids.sh ok 4 selftests: damon: debugfs_empty_targets.sh ok 5 selftests: damon: debugfs_huge_count_read_write.sh ok 6 selftests: damon: debugfs_duplicate_context_creation.sh ok 7 selftests: damon: sysfs.sh ok 1 selftests: damon-tests: kunit.sh ok 2 selftests: damon-tests: huge_count_read_write.sh ok 3 selftests: damon-tests: buffer_overflow.sh ok 4 selftests: damon-tests: rm_contexts.sh ok 5 selftests: damon-tests: record_null_deref.sh ok 6 selftests: damon-tests: dbgfs_target_ids_read_before_terminate_race.sh ok 7 selftests: damon-tests: dbgfs_target_ids_pid_leak.sh ok 8 selftests: damon-tests: damo_tests.sh ok 9 selftests: damon-tests: masim-record.sh ok 10 selftests: damon-tests: build_i386.sh ok 11 selftests: damon-tests: build_arm64.sh ok 12 selftests: damon-tests: build_i386_idle_flag.sh ok 13 selftests: damon-tests: build_i386_highpte.sh ok 14 selftests: damon-tests: build_nomemcg.sh [33m [92mPASS [39m