Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp445220imm; Tue, 14 Aug 2018 23:21:20 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwIBgQO09vfSpXHZqwqC/fz/OtLXfVFUG74280kBE0HcKGgF28BcyG5+rmZb0sqvdtIhQij X-Received: by 2002:a63:8f53:: with SMTP id r19-v6mr23690209pgn.17.1534314080306; Tue, 14 Aug 2018 23:21:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534314080; cv=none; d=google.com; s=arc-20160816; b=Bqtzh2C1J/psf6mxDfaWalT1C4kRP3CDr6f4vnV4IOR28TpOQvHLDV/qclLvZQ2A3X YNsn5JEG19zDQaQZXOHxmVX2Y1GAf7ecr2ntJS4tAPaVnDxX0keEsI203F+Fy6hW9OzJ 5hYKHk9Zk2omcQIuyBsy6EJNNJuhExS/TZQtqqSp8IFNvEyQlRG5QPnmnYKyFQRMj2Q7 jKYn01iQzj/TUuQIg828wxNzzaFVRKDQe/SAYm3rwCeNiMWbwC1x4k5Q+Rw02PjZc8sc MNKKmcgppmZegpRCO8VQN5njKuJePB6jKRPt3XUKxnLrVkGDi1Z+URVeaPn5p0Rp6yk0 AgUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=wvPJ05SOGiwIaV8XHnxNb4GPQBmVPNXxmdWPRRI4hIU=; b=bkbxZ7+iCR0wLBmX4oJlC1D6bYJtCQAsFcoD/nxWtQEJuge707pCRUKQwJe476g7F4 S0TtfWP7VPpne+nod/vNdigmXMzEqkdyJB5uSYmCzp8b+kvL4s64abTZbj8gb3ygK9QY 3XIgY4sL47Y5zq5Rq7LuOrF4Mn30/inhxFvbnykaQ4kJmphqf3BLOGVJZbp//iZ9up21 pvZIk45b/m9wzFr/HnOVufGHv2cMVBFoGkysVL2OoJ6ceKpqUsPbi7eCd2wNuRgTepNb JE8EhSzMFYEMWB2TCRwEe46bqRPfyDHSQMpqgyVpv3uisoOu9BWtvzCwj6uFEcVSHAc2 U6XA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v11-v6si21052286pgl.27.2018.08.14.23.21.05; Tue, 14 Aug 2018 23:21:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728717AbeHOJFT (ORCPT + 99 others); Wed, 15 Aug 2018 05:05:19 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:51550 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725914AbeHOJFT (ORCPT ); Wed, 15 Aug 2018 05:05:19 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 9C1103EE; Wed, 15 Aug 2018 06:14:31 +0000 (UTC) Date: Wed, 15 Aug 2018 08:14:29 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 4.14 000/104] 4.14.63-stable review Message-ID: <20180815061429.GB1253@kroah.com> References: <20180814171515.270692185@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180814171515.270692185@linuxfoundation.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 14, 2018 at 07:16:14PM +0200, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.14.63 release. > There are 104 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu Aug 16 17:14:49 UTC 2018. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.63-rc1.gz -rc2 is now out: https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.63-rc2.gz