On 07/15/2014 04:17 PM, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 3.4.99 release. There are 22 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu Jul 17 23:16:04 UTC 2014. Anything received after that time might be too late.
Build results: total: 117 pass: 111 fail: 6 Failed builds: alpha:allmodconfig arm:spear6xx_defconfig score:defconfig sparc64:allmodconfig unicore32:defconfig xtensa:allmodconfig Qemu tests all passed. Results are as expected. Details are available at http://server.roeck-us.net:8010/builders. A note on the above link and its accessibility: I have seen relentless attacks from various sources recently. All but one of those attacks originated from IP addresses allocated to Chinese service providers (the one exception was an attack from an Amazon virtual host). Attacks have become more sophisticated over time, to a point where I no longer trust my firewalls. For this reason, I now permanently block the entire IP address range of a service provider if an attack originates from an address range allocated to that provider. I understand that this may bve considered a bit drastic, but this is my server, the information on it is provided free of charge, for the benefit of everyone, and there should be no reason to attack it. Blame the attackers, not me. If you have reason to believe that your address has been blocked, I will be happy to selectively unblock it if you can show me legitimate interest in accessing the information. Guenter -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html