Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp211584yba; Sat, 4 May 2019 00:30:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqymSYm0nuvtTFw9lsAHQXHxoiPWDilqqNK3l3gza3AZxtmQ2Kjv0wzOXo+89XaGz8Wj2fhr X-Received: by 2002:aa7:8251:: with SMTP id e17mr17951381pfn.147.1556955043585; Sat, 04 May 2019 00:30:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556955043; cv=none; d=google.com; s=arc-20160816; b=kGffjyJNgS+y3kgpQNthTYefvcYyeCjlGOtNq+0+4fkDnAgTzpekxMlBcteSDwWQj0 xq5XLaz3GjV4YQ4k9BoAW0YbbDiC+jKW9mvddkq1UutD9azBpNoT5sjpeMCg1aw446Ho yPByrLI8kltZHEMdwvIZ1KD7HI1onPDzUbOJYtH/fjB0XSiQdpnkqohStXRDvq9lY7wU QzM3nZfhkv71ml0dxt5reVgkS29R8CMp9/Yi2SBnywpBR9Ywf4YLOrAqNuse/ucNn1bW m4WwIyqQroIQI+wXsJIN5GyS9+AOL12ssyf/+GIiCr7AI02onnMUfKHmBIhJzw3bIk0z mvcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=UyVBVnc99nDz+QTlz/oEIFU4ZQValGXcDpftp/0tJ38=; b=tmNoRK7/SXozyAPDiwAQIC39y+gomOkz+NYqRzYF3+vHP5Q8V+ZWRKgDO4F7TCGMEI a7VTBrTc+Nt3lT2B6KDOwHuQcoUH9k8IMOaU11uPagt9/QiICi1WvuREoq/mq5XVPOEI bhxvt0U21R4SW8U3Y0SltbEt6VZM6+1Jd09tL6ccc2e8wIHpdpitYy2uad/OkSNvCYLX XBBPPULSRhcoSH/NQbtBNdl1bu82Q4bjahopJRKDRtk33Q4OprMa3LTmgnrXWQ3xLzeX niUJFJCGnnyl4NUiAlIFHleA+z8dthWuE3KnzMK/K1GJpAmZRgsQdWn8bJH3vjOO5ZYl WXmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zynfTzrE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u19si867380pgh.536.2019.05.04.00.30.27; Sat, 04 May 2019 00:30:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zynfTzrE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726913AbfEDHSf (ORCPT + 99 others); Sat, 4 May 2019 03:18:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:47494 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725802AbfEDHSf (ORCPT ); Sat, 4 May 2019 03:18:35 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E005A206DF; Sat, 4 May 2019 07:18:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556954314; bh=KjtIdOqgGdJRkpK539kaYm/XfWHQJNxowDI71iFyh04=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=zynfTzrERwQ2d+YOgHuXK5YKpGnpkRJru55Yn+3GTl2D/ipka7IFpkKSozOSkew4I cu8ugxESTz/4SdQ8/Wl6ibUzvnVvV2sCNDG4bscjKFTW4M+4T2bM/MRFEP5W9aUSiT /57JgIM85amImI98v4NO5PC3cyImuet3LvShR6wM= Date: Sat, 4 May 2019 09:18:31 +0200 From: Greg Kroah-Hartman To: Pavel Machek Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 4.19 00/72] 4.19.39-stable review Message-ID: <20190504071831.GA12815@kroah.com> References: <20190502143333.437607839@linuxfoundation.org> <20190504065447.GA16530@amd> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190504065447.GA16530@amd> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, May 04, 2019 at 08:54:47AM +0200, Pavel Machek wrote: > On Thu 2019-05-02 17:20:22, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 4.19.39 release. > > There are 72 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Sat 04 May 2019 02:32:17 PM UTC. > > Anything received after that time might be too late. > > These do not meet stable criteria afaict: (3-5... I see this is > probably security bug; it would be good to mention in the preparation > patches what is going on because otherwise it is tricky to understand). I do not do "explain why specific patches are applied" because yes, sometimes it is due to security issues that we know about. > ?? 03/72] mm: make page ref count overflow check tighter and m -- not sure description is good enough; preparation for later changes? > ?? 04/72] mm: add try_get_page() helper function -- adds unused function > ?? 05/72] mm: prevent get_user_pages() from overflowing page r -- over > 100 line limit and depedns on previous patches. get_gate_page() change > not in -rc?.. it is in -next. These are all well-known as solving a public security issue, please see lkml for the details, no need for you to "guess". thanks for the review. greg k-h