Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp699756imu; Fri, 7 Dec 2018 07:37:03 -0800 (PST) X-Google-Smtp-Source: AFSGD/XzwiJRuuQEOS+/IBq7dk9n5xj8GFfRE46SJQpJqE6ec+tlYoXduk6C/7R7215bC70yd667 X-Received: by 2002:a63:6782:: with SMTP id b124mr2387274pgc.151.1544197023316; Fri, 07 Dec 2018 07:37:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544197023; cv=none; d=google.com; s=arc-20160816; b=uAqtSwJ5HmOOHdMazbaiimw4mMy4VYkzrTWI/nwx4lWmivwqUJnFBWwWvH9impTxx5 87TY0wTxyAbm/y1N5yxrPIDQFDVLf3rFaNO9fDm406oBWESBi7ahmvhZM1jGfUW+SXqv QE1/D6pfNspMay1FSzUSN/gKD4pgjMjbscdF/A/KWkvw4EV1zwGLnwmU7TB80+yanHvE MYUKbcfjaK92WnkOfD3Ze6sK5zJ5ew+vXBQnDbke1x/bIDjIdxan4rqV7dVp90KfmTaV Cpy7DqGOYmBh1bvw67RQdmZhtcvhf+NdWnMNVejdocEQXElTlXm/ZGqCi3KgHVbAVkqS mA7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id; bh=R050C/oDXnwCwNFoVDqjsob3jQowcfS6wPie9e3BBS0=; b=PFqZ6A5D3jV1Yn3TNCgtuORPkd8fYD1b+ORNGQKyoxjK2s9f++xU8mMUL5Q415S+Ym rK/5NtsFda7jfGZCKYJM0mGSe03gcMSSQpEBiQhzWaAq76FjCZCIUWb5diqb4bRXfzVN t4XIoel9OZy+bwzfLDifWMTFNu+cbyaYHlmzJY8jQXwTaYr7g28tab4TKAMJamnjf1/K mRZKIS6od7fGR2MdNdiPwDVnOs0HVy+Hao07XWMLS2B75U7VmmXrx6Jt1gTyGmQ0eQzA JrOtF00RVDCK1Kab44e11PjZNPVfCPA1wf0K0pmgtKDjQ83Z4a3dqOEv208adSZZywX8 BDuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s38si2844801pga.38.2018.12.07.07.36.43; Fri, 07 Dec 2018 07:37:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726146AbeLGPeh (ORCPT + 99 others); Fri, 7 Dec 2018 10:34:37 -0500 Received: from imap1.codethink.co.uk ([176.9.8.82]:50703 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726027AbeLGPeg (ORCPT ); Fri, 7 Dec 2018 10:34:36 -0500 Received: from office.codethink.co.uk ([148.252.241.226] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1gVI93-0000EJ-PF; Fri, 07 Dec 2018 15:34:25 +0000 Message-ID: <1544196864.2867.70.camel@codethink.co.uk> Subject: Re: [PATCH 4.9 000/101] 4.9.144-stable review From: Ben Hutchings To: Greg Kroah-Hartman , Naresh Kamboju Cc: mike.kravetz@oracle.com, open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, linux- stable , Eric Munson Date: Fri, 07 Dec 2018 15:34:24 +0000 In-Reply-To: <20181207144157.GB20201@kroah.com> References: <20181206143011.174892052@linuxfoundation.org> <20181207144157.GB20201@kroah.com> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2018-12-07 at 15:41 +0100, Greg Kroah-Hartman wrote: > On Fri, Dec 07, 2018 at 02:40:26PM +0530, Naresh Kamboju wrote: > > On Thu, 6 Dec 2018 at 20:15, Greg Kroah-Hartman > > wrote: > > > > > > This is the start of the stable review cycle for the 4.9.144 release. > > > There are 101 patches in this series, all will be posted as a response > > > to this one.  If anyone has any issues with these being applied, please > > > let me know. > > > > > > Responses should be made by Sat Dec  8 14:29:43 UTC 2018. > > > Anything received after that time might be too late. > > > > > > The whole patch series can be found in one patch at: > > >         https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.144-rc1.gz > > > or in the git tree and branch at: > > >         git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y > > > and the diffstat can be found below. > > > > > > thanks, > > > > > > greg k-h > > > > > > Mike Kravetz > > >     hugetlbfs: check for pgoff value overflow > > > > > > Mike Kravetz > > >     hugetlbfs: fix offset overflow in hugetlbfs mmap > > > > > > Mike Kravetz > > >     mm/hugetlb.c: don't call region_abort if region_chg fails > > > > Results from Linaro’s test farm. > > Regressions detected on arm32 and i386. > > > > truncate_above_4GB (2M: 32): FAIL mmap() offset 4GB: Invalid argument > > Can this be tracked down to a commit in this tree that caused this > regression? The test failure is part of a hugetlb test group, so one of the above is responsible. Ah, I missed this fix (it's already in 4.14-stable: commit 5df63c2a149ae65a9ec239e7c2af44efa6f79beb Author: Mike Kravetz Date:   Thu Apr 5 16:18:21 2018 -0700     hugetlbfs: fix bug in pgoff overflow checking Ben. -- Ben Hutchings, Software Developer   Codethink Ltd https://www.codethink.co.uk/ Dale House, 35 Dale Street Manchester, M1 2HF, United Kingdom