At Fri, 1 Feb 2013 14:07:15 +0100, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 3.7.6 release. > There are 89 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Sun Feb 3 13:01:49 UTC 2013. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > kernel.org/pub/linux/kernel/v3.0/stable-review/patch-3.7.6-rc1.gz > and the diffstat can be found below.
This kernel can be built and boot without any problem. Building a kernel with this kernel also works fine. - Build Machine: debian wheezy x86_64 CPU: Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz x 4 memory: 8GB - Test machine: debian wheezy x86_64(KVM guest on the Build Machine) vCPU: x2 memory: 2GB I reviewed the following patches and it looks good to me. > ------------- > Pseudo-Shortlog of commits: > > Greg Kroah-Hartman <[email protected]> > Linux 3.7.6-rc1 > > CAI Qian <[email protected]> > slub: assign refcount for kmalloc_caches > > Jani Nikula <[email protected]> > drm/i915: fix FORCEWAKE posting reads ... > Dave Chinner <[email protected]> > xfs: fix periodic log flushing > > H. Peter Anvin <[email protected]> > x86/Sandy Bridge: Sandy Bridge workaround depends on CONFIG_PCI ... > Alex Williamson <[email protected]> > kvm: Fix irqfd resampler list walk ... > Dave Chinner <[email protected]> > xfs: fix _xfs_buf_find oops on blocks beyond the filesystem end > > Matt Fleming <[email protected]> > x86, efi: Set runtime_version to the EFI spec revision ... > David Woodhouse <[email protected]> > x86, efi: Fix 32-bit EFI handover protocol entry point ... > Alan Cox <[email protected]> > x86/msr: Add capabilities check > > Wang YanQing <[email protected]> > smp: Fix SMP function call empty cpu mask race ... > Jan Kara <[email protected]> > xfs: Fix possible use-after-free with AIO ... > Cong Ding <[email protected]> > fs/cifs/cifs_dfs_ref.c: fix potential memory leakage Thanks, Satoru -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

