Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758029Ab3CNNjR (ORCPT ); Thu, 14 Mar 2013 09:39:17 -0400 Received: from mail-pb0-f52.google.com ([209.85.160.52]:55711 "EHLO mail-pb0-f52.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757886Ab3CNNjP (ORCPT ); Thu, 14 Mar 2013 09:39:15 -0400 Date: Thu, 14 Mar 2013 22:39:10 +0900 Message-ID: <87ip4ugkxt.wl%satoru.takeuchi@gmail.com> From: Satoru Takeuchi To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, stable@vger.kernel.org Subject: Re: [ 00/40] 3.4.36-stable review In-Reply-To: <20130312223211.492954675@linuxfoundation.org> References: <20130312223211.492954675@linuxfoundation.org> User-Agent: Wanderlust/2.14.0 (Africa) Emacs/23.4 Mule/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1645 Lines: 50 At Tue, 12 Mar 2013 15:43:21 -0700, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 3.4.36 release. > There are 40 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu Mar 14 22:31:37 UTC 2013. > Anything received after that time might be too late. This kernel can be built and boot without any problem. Building a kernel with this kernel also works fine. - Build Machine: debian wheezy x86_64 CPU: Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz x 4 memory: 8GB - Test machine: debian wheezy x86_64(KVM guest on the Build Machine) vCPU: x2 memory: 2GB I reviewed the following patches. > Rusty Russell > hw_random: make buffer usable in scatterlist. There is a memory leak possibility at unloding rng-core.ko as I replied to this patch. However I consider it doesn't need to be dropped here since this memory leak only happen with CONFIG_HW_RANDOM=m and unloading rng-core.ko seldom happens. > Steven Rostedt > ftrace: Update the kconfig for DYNAMIC_FTRACE > > Tu, Xiaobing > Fix memory leak in cpufreq stats. ... > Al Viro > vfs: fix pipe counter breakage Theese patches looks good to me. Thanks, Satoru -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/