APPLIED[A]/cmnt: [PULL][artful] v3: Stable update to 4.13.16

Stefan Bader stefan.bader at canonical.com
Mon Feb 19 14:27:47 UTC 2018


On 22.01.2018 21:05, Khaled Elmously wrote:
> The following changes since commit 70d294b0f4afdeb065290ff457b31965b04b1d69:
> 
>   Linux 4.13.15 (2018-01-22 14:55:13 -0500)
> 
> are available in the git repository at:
> 
>   git+ssh://kmously@git.launchpad.net/~kmously/ubuntu/+source/linux/+git/artful update-to-4.13.16
> 
> for you to fetch changes up to 9f2430d689d1aa1f633e7152c6a4d207bcdc1e1f:
> 
>   Linux 4.13.16 (2018-01-22 14:57:50 -0500)
> 
> ----------------------------------------------------------------
> Alexander Steffen (1):
>       tpm-dev-common: Reject too short writes
> 
> Andrey Konovalov (1):
>       net: usb: asix: fill null-ptr-deref in asix_suspend
> 
> Bjørn Mork (3):
>       net: cdc_ether: fix divide by 0 on bad descriptors
>       net: qmi_wwan: fix divide by 0 on bad descriptors
>       net: cdc_ncm: GetNtbFormat endian fix
> 
> Changwei Ge (1):
>       ocfs2: fix cluster hang after a node dies
> 
> Cong Wang (1):
>       vlan: fix a use-after-free in vlan_device_event()
> 
> Corey Minyard (1):
>       ipmi: fix unsigned long underflow
> 
> Eric Dumazet (2):
>       tcp: do not mangle skb->cb[] in tcp_make_synack()
>       tcp: gso: avoid refcount_t warning from tcp_gso_segment()
> 
> Eric W. Biederman (1):
>       net/sctp: Always set scope_id in sctp_inet6_skb_msgname
> 
> Florian Fainelli (1):
>       net: systemport: Correct IPG length settings
> 
> Greg Kroah-Hartman (1):
>       Linux 4.13.16
> 
> Guillaume Nault (1):
>       l2tp: don't use l2tp_tunnel_find() in l2tp_ip and l2tp_ip6
> 
> Hangbin Liu (1):
>       bonding: discard lowest hash bit for 802.3ad layer3+4
> 
> Huacai Chen (1):
>       fealnx: Fix building error on MIPS
> 
> Huy Nguyen (1):
>       net/mlx5: Cancel health poll before sending panic teardown command
> 
> Inbar Karmy (1):
>       net/mlx5e: Set page to null in case dma mapping fails
> 
> Jaewon Kim (1):
>       mm/page_ext.c: check if page_ext is not prepared
> 
> Jan Harkes (1):
>       coda: fix 'kernel memory exposure attempt' in fsync
> 
> Jann Horn (1):
>       mm/pagewalk.c: report holes in hugetlb ranges
> 
> Jason A. Donenfeld (1):
>       af_netlink: ensure that NLMSG_DONE never fails in dumps
> 
> Jeff Barnhill (1):
>       net: vrf: correct FRA_L3MDEV encode type
> 
> Ji-Ze Hong (Peter Hong) (1):
>       serial: 8250_fintek: Fix finding base_port with activated SuperIO
> 
> Konstantin Khlebnikov (1):
>       tcp_nv: fix division by zero in tcpnv_acked()
> 
> Kristian Evensen (1):
>       qmi_wwan: Add missing skb_reset_mac_header-call
> 
> Lukas Wunner (1):
>       serial: omap: Fix EFR write on RTS deassertion
> 
> Neeraj Upadhyay (1):
>       rcu: Fix up pending cbs check in rcu_prepare_for_idle
> 
> Pavel Tatashin (1):
>       mm/page_alloc.c: broken deferred calculation
> 
> Roberto Sassu (1):
>       ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
> 
> Suravee Suthikulpanit (1):
>       x86/cpu/amd: Derive L3 shared_cpu_map from cpu_llc_shared_mask
> 
> Xin Long (1):
>       vxlan: fix the issue that neigh proxy blocks all icmpv6 packets
> 
> Ye Yin (1):
>       netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed
> 
> Yuchung Cheng (1):
>       tcp: fix tcp_fastretrans_alert warning
> 
> alex chen (1):
>       ocfs2: should wait dio before inode lock in ocfs2_setattr()
> 
>  Makefile                                        |  2 +-
>  arch/x86/kernel/cpu/intel_cacheinfo.c           | 32 ++++++++++++++-----------
>  drivers/char/ipmi/ipmi_msghandler.c             | 10 ++++----
>  drivers/char/tpm/tpm-dev-common.c               |  6 +++++
>  drivers/net/bonding/bond_main.c                 |  2 +-
>  drivers/net/ethernet/broadcom/bcmsysport.c      | 10 ++++----
>  drivers/net/ethernet/fealnx.c                   |  6 ++---
>  drivers/net/ethernet/mellanox/mlx5/core/en_rx.c | 12 ++++------
>  drivers/net/ethernet/mellanox/mlx5/core/main.c  |  7 ++++++
>  drivers/net/usb/asix_devices.c                  |  4 ++--
>  drivers/net/usb/cdc_ether.c                     |  2 +-
>  drivers/net/usb/cdc_ncm.c                       |  4 ++--
>  drivers/net/usb/qmi_wwan.c                      |  3 ++-
>  drivers/net/vrf.c                               |  2 +-
>  drivers/net/vxlan.c                             | 31 ++++++++++--------------
>  drivers/tty/serial/8250/8250_fintek.c           |  3 +++
>  drivers/tty/serial/omap-serial.c                |  2 +-
>  fs/coda/upcall.c                                |  3 +--
>  fs/ocfs2/dlm/dlmrecovery.c                      |  1 +
>  fs/ocfs2/file.c                                 |  9 +++++--
>  include/linux/mmzone.h                          |  3 ++-
>  include/linux/skbuff.h                          |  7 ++++++
>  kernel/rcu/tree_plugin.h                        |  2 +-
>  mm/page_alloc.c                                 | 27 ++++++++++++++-------
>  mm/page_ext.c                                   |  4 ----
>  mm/pagewalk.c                                   |  6 ++++-
>  net/8021q/vlan.c                                |  6 ++---
>  net/core/skbuff.c                               |  1 +
>  net/ipv4/tcp_input.c                            |  3 +--
>  net/ipv4/tcp_nv.c                               |  2 +-
>  net/ipv4/tcp_offload.c                          | 12 ++++++++--
>  net/ipv4/tcp_output.c                           |  9 ++-----
>  net/l2tp/l2tp_ip.c                              | 24 +++++++------------
>  net/l2tp/l2tp_ip6.c                             | 24 +++++++------------
>  net/netlink/af_netlink.c                        | 17 ++++++++-----
>  net/netlink/af_netlink.h                        |  1 +
>  net/sctp/ipv6.c                                 |  5 ++--
>  security/integrity/ima/ima_appraise.c           |  3 +++
>  38 files changed, 174 insertions(+), 133 deletions(-)
> 
> 
At time of picking also skipped:
* "mm/pagewalk.c: report holes in hugetlb ranges" as this was already
  picked as fix for CVE-2017-16994

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180219/040256cf/attachment.sig>


More information about the kernel-team mailing list