APPLIED[backlog]: [PULL][artful] v3: Stable update to 4.13.14

Stefan Bader stefan.bader at canonical.com
Tue Jan 23 09:45:48 UTC 2018


On 22.01.2018 21:04, Khaled Elmously wrote:
> The following changes since commit 72442b5315c73541fc81c5a7c8597e28858ef494:
> 
>   sctp: do not peel off an assoc from one netns to another one (2018-01-19 17:37:34 +0100)
> 
> are available in the git repository at:
> 
>   git+ssh://kmously@git.launchpad.net/~kmously/ubuntu/+source/linux/+git/artful update-to-4.13.14
> 
> for you to fetch changes up to 6dcea5e8d47b058689eb108696c566a98616bd81:
> 
>   Linux 4.13.14 (2018-01-22 14:52:39 -0500)
> 
> ----------------------------------------------------------------
> Adam Wallis (1):
>       dmaengine: dmatest: warn user when dma test times out
> 
> Alan Stern (1):
>       usb: usbtest: fix NULL pointer dereference
> 
> Alexey Kodanev (1):
>       gso: fix payload length when gso_size is zero
> 
> Andrei Vagin (1):
>       net/unix: don't show information about sockets from other namespaces
> 
> Cong Wang (2):
>       tun: call dev_get_valid_name() before register_netdevice()
>       net_sched: avoid matching qdisc with zero handle
> 
> Craig Gallek (2):
>       soreuseport: fix initialization race
>       tun/tap: sanitize TUNSETSNDBUF input
> 
> Dmitry Torokhov (1):
>       Input: ims-psu - check if CDC union descriptor is sane
> 
> Eric Dumazet (9):
>       net: call cgroup_sk_alloc() earlier in sk_clone_lock()
>       tcp/dccp: fix ireq->opt races
>       packet: avoid panic in packet_getsockopt()
>       ipv6: flowlabel: do not leave opt->tot_len with garbage
>       tcp/dccp: fix lockdep splat in inet_csk_route_req()
>       tcp/dccp: fix other lockdep splats accessing ireq_opt
>       tcp: refresh tp timestamp before tcp_mtu_probe()
>       ipv6: addrconf: increment ifp refcount before ipv6_del_addr()
>       tcp: fix tcp_mtu_probe() vs highest_sack
> 
> Girish Moodalbail (2):
>       tap: double-free in error path in tap_open()
>       tap: reference to KVA of an unloaded module causes kernel panic
> 
> Greg Kroah-Hartman (1):
>       Linux 4.13.14
> 
> Guillaume Nault (3):
>       ppp: fix race in ppp device destruction
>       l2tp: check ps->sock before running pppol2tp_session_ioctl()
>       l2tp: hold tunnel in pppol2tp_connect()
> 
> Jason A. Donenfeld (2):
>       netlink: do not set cb_running if dump's start() errs
>       mac80211: use constant time comparison with keys
> 
> Johannes Berg (3):
>       netlink: fix netlink_ack() extack race
>       mac80211: accept key reinstall without changing anything
>       mac80211: don't compare TKIP TX MIC key in reinstall prevention
> 
> Julien Gomes (1):
>       tun: allow positive return values on dev_get_valid_name() call
> 
> Laszlo Toth (1):
>       sctp: full support for ipv6 ip_nonlocal_bind & IP_FREEBIND
> 
> Moshe Shemesh (1):
>       net/mlx5: Fix health work queue spin lock to IRQ safe
> 
> Nikolay Aleksandrov (1):
>       net: bridge: fix returning of vlan range op errors
> 
> Or Gerlitz (1):
>       net/mlx5e: Properly deal with encap flows add/del under neigh update
> 
> Qiuxu Zhuo (1):
>       EDAC, sb_edac: Don't create a second memory controller if HA1 is not present
> 
> Sabrina Dubroca (1):
>       macsec: fix memory leaks when skb_to_sgvec fails
> 
> Stefano Brivio (1):
>       geneve: Fix function matching VNI and tunnel ID on big-endian
> 
> Steffen Klassert (2):
>       ipv4: Fix traffic triggered IPsec connections.
>       ipv6: Fix traffic triggered IPsec connections.
> 
> Vivien Didelot (1):
>       net: dsa: check master device before put
> 
> Xin Long (5):
>       sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect
>       ipip: only increase err_count for some certain type icmp in ipip_err
>       ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err
>       ip6_gre: update dst pmtu if dev mtu has been updated by toobig in __gre6_xmit
>       sctp: reset owner sk for data chunks on out queues when migrating a sock
> 
>  Makefile                                         |  2 +-
>  drivers/dma/dmatest.c                            |  1 +
>  drivers/edac/sb_edac.c                           |  9 ++-
>  drivers/input/misc/ims-pcu.c                     | 16 ++++-
>  drivers/net/ethernet/mellanox/mlx5/core/en_tc.c  | 89 ++++++++++++++----------
>  drivers/net/ethernet/mellanox/mlx5/core/health.c |  5 +-
>  drivers/net/geneve.c                             |  6 --
>  drivers/net/ipvlan/ipvtap.c                      |  4 +-
>  drivers/net/macsec.c                             |  2 +
>  drivers/net/macvtap.c                            |  4 +-
>  drivers/net/ppp/ppp_generic.c                    | 20 ++++++
>  drivers/net/tap.c                                | 25 ++++---
>  drivers/net/tun.c                                |  7 ++
>  drivers/usb/misc/usbtest.c                       |  5 +-
>  include/linux/if_tap.h                           |  4 +-
>  include/linux/netdevice.h                        |  3 +
>  include/net/inet_sock.h                          |  8 ++-
>  include/net/tcp.h                                |  6 +-
>  net/bridge/br_netlink.c                          |  2 +-
>  net/core/dev.c                                   |  6 +-
>  net/core/sock.c                                  |  3 +-
>  net/core/sock_reuseport.c                        | 12 +++-
>  net/dccp/ipv4.c                                  | 13 ++--
>  net/dsa/dsa2.c                                   |  7 +-
>  net/ipv4/cipso_ipv4.c                            | 24 ++-----
>  net/ipv4/gre_offload.c                           |  2 +-
>  net/ipv4/inet_connection_sock.c                  |  9 ++-
>  net/ipv4/inet_hashtables.c                       |  5 +-
>  net/ipv4/ipip.c                                  | 59 +++++++++++-----
>  net/ipv4/route.c                                 |  2 +-
>  net/ipv4/syncookies.c                            |  2 +-
>  net/ipv4/tcp_input.c                             |  2 +-
>  net/ipv4/tcp_ipv4.c                              | 21 +++---
>  net/ipv4/tcp_output.c                            |  5 +-
>  net/ipv4/udp.c                                   |  5 +-
>  net/ipv4/udp_offload.c                           |  2 +-
>  net/ipv6/addrconf.c                              |  1 +
>  net/ipv6/ip6_flowlabel.c                         |  1 +
>  net/ipv6/ip6_gre.c                               | 20 ++++--
>  net/ipv6/ip6_offload.c                           |  2 +-
>  net/ipv6/ip6_output.c                            |  4 +-
>  net/ipv6/route.c                                 |  2 +-
>  net/l2tp/l2tp_ppp.c                              | 10 ++-
>  net/mac80211/key.c                               | 54 ++++++++++++--
>  net/netlink/af_netlink.c                         | 21 +++---
>  net/packet/af_packet.c                           | 24 ++++---
>  net/sched/sch_api.c                              |  2 +
>  net/sctp/input.c                                 |  2 +-
>  net/sctp/ipv6.c                                  |  6 +-
>  net/sctp/socket.c                                | 32 +++++++++
>  net/unix/diag.c                                  |  2 +
>  51 files changed, 394 insertions(+), 186 deletions(-)
> 
> 
Latest branch looked good to me.

Applied to artful/master-next-backlog (we might have to prioritize a
critical/boot essential kernel update for the 16.04.5 point release).

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180123/03100625/attachment.sig>


More information about the kernel-team mailing list