Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp8245891ybi; Tue, 23 Jul 2019 05:23:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqwqne/Atl7/j80lMJUVf2PnsDivCrl6XpwXDqQHFziwxUPVj80ww+Qy1pygQi5o7nUEFUgU X-Received: by 2002:a63:6110:: with SMTP id v16mr30205055pgb.81.1563884612881; Tue, 23 Jul 2019 05:23:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563884612; cv=none; d=google.com; s=arc-20160816; b=EZd7mck2aWPZ3dgrgAVATyl+eUpAyc27v2HHdhc+4k9B2t9xgGrNCJnBsQ6LIrtFrv 5JCAZyPZCx4eoe5LP/I7+ACmsiQbEosIJXGnkRtS72Q41Dd7BdD7KkUqcbXOnR7igoyb qdE5fJBEb99z5xfwiWk5yTjwJdpQpe3WKH6P1bCqRw7YZec0Gq2qyvzCW/jhrYCeu43h 4G5il3vDNb0EKM5qy11iRPQCHGFjwZUcX9UUW9MgUckaHr3hbd25M7b1FHfz6NDhP3ee T4xMcSd6VKehSyNsokY87dVlktWSUfhmtwiumdc+qoDXlqHcQ/kxG4XtYBtNjTbW10+s jzmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=XZ9c70efwT3n287aPzFAvChD53hroGbB7VB62fTwv7I=; b=KsukqnSI83J9bTF4Cv13BpycinHMNXgzBMJb9X+gfa37C7U6vCPvLg73f8BALlqM+h 6nTYKvyiPoeEHK/nkg8xWfszYVHoMH7hpNzdMBKucQxj+QfMwogm27+U74MZPHdINQVJ +f/yWamk9eybnOtBIHcgKx48Jy4g67jv+xUyPllTZH1hJ6Q9tSaBPZdx36T4li8+aqBv Zcw//x/5fs429WFILKxNXvg7pjK+kRKN2/5dZetgDQftfP984QGYq+cWvT2AF/WaOQQu bg0+0RsV92r/Gf2AUIdduLAnc4LT/ABYd0L/2YJxtkMjpeDzTyZu5MkeEZX+oYy19ou7 Mhyg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v16si13351199pfe.39.2019.07.23.05.23.16; Tue, 23 Jul 2019 05:23:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732369AbfGWDHo (ORCPT + 99 others); Mon, 22 Jul 2019 23:07:44 -0400 Received: from ex13-edg-ou-001.vmware.com ([208.91.0.189]:12294 "EHLO EX13-EDG-OU-001.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726687AbfGWDHo (ORCPT ); Mon, 22 Jul 2019 23:07:44 -0400 Received: from sc9-mailhost2.vmware.com (10.113.161.72) by EX13-EDG-OU-001.vmware.com (10.113.208.155) with Microsoft SMTP Server id 15.0.1156.6; Mon, 22 Jul 2019 20:07:24 -0700 Received: from akaher-lnx-dev.eng.vmware.com (unknown [10.110.19.203]) by sc9-mailhost2.vmware.com (Postfix) with ESMTP id DCBFFB28A8; Mon, 22 Jul 2019 23:07:38 -0400 (EDT) From: Ajay Kaher To: CC: , , , , , , , , , , , , , , , , , Subject: [PATCH 0/8] Backported fixes for 4.4 stable tree Date: Tue, 23 Jul 2019 16:38:23 +0530 Message-ID: <1563880111-19058-1-git-send-email-akaher@vmware.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-001.vmware.com: akaher@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org These patches include few backported fixes for the 4.4 stable tree. I would appreciate if you could kindly consider including them in the next release. Ajay --- [PATCH 1/8]: Backporting of upstream commit f958d7b528b1: mm: make page ref count overflow check tighter and more explicit [PATCH 2/8]: Backporting of upstream commit 88b1a17dfc3e: mm: add 'try_get_page()' helper function [PATCH 3/8]: Backporting of upstream commit 7aef4172c795: mm: handle PTE-mapped tail pages in gerneric fast gup implementaiton [PATCH 4/8]: Backporting of upstream commit a3e328556d41: mm, gup: remove broken VM_BUG_ON_PAGE compound check for hugepages [PATCH 5/8]: Backporting of upstream commit d63206ee32b6: mm, gup: ensure real head page is ref-counted when using hugepages [PATCH 6/8]: Backporting of upstream commit 8fde12ca79af: mm: prevent get_user_pages() from overflowing page refcount [PATCH 7/8]: Backporting of upstream commit 7bf2d1df8082: pipe: add pipe_buf_get() helper [PATCH 8/8]: Backporting of upstream commit 15fab63e1e57: fs: prevent page refcount overflow in pipe_buf_get