[SRU][Bionic][PULL] Bionic upstream stable patchset 2018-07-09

Kamal Mostafa kamal at canonical.com
Tue Jul 10 19:47:49 UTC 2018


Bionic update: upstream stable patchset 2018-07-09
(ported from v4.14.42 and v4.16.10)

BugLink: http://bugs.launchpad.net/bugs/1780858

 -Kamal

-----

The following changes since commit 4db2f1976d1d67144e3152e318ef76f5d4ca3242:

  sched/core: Fix possible Spectre-v1 indexing for sched_prio_to_weight[] (2018-07-06 15:39:07 -0700)

are available in the git repository at:

  git://git.launchpad.net/~kamalmostafa/ubuntu/+source/linux/+git/bionic stable-lp1780858

for you to fetch changes up to a10ec4b1f33b6a56a880ba493a48133eed3b0b3b:

  hv_netvsc: Fix net device attach on older Windows hosts (2018-07-09 14:21:06 -0700)

----------------------------------------------------------------
Adi Nissim (1):
      net/mlx5: E-Switch, Include VF RDMA stats in vport statistics

Andre Tomt (1):
      net/tls: Fix connection stall on partial tls record

Andrey Ignatov (1):
      ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg

Bjørn Mork (1):
      qmi_wwan: do not steal interfaces from class drivers

Christophe JAILLET (1):
      net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()'

Dave Watson (1):
      net/tls: Don't recursively call push_record during tls_write_space callbacks

Debabrata Banerjee (2):
      bonding: do not allow rlb updates to invalid mac
      bonding: send learning packets for vlans on slave

Eric Dumazet (8):
      dccp: fix tasklet usage
      llc: better deal with too small mtu
      net_sched: fq: take care of throttled flows before reuse
      rds: do not leak kernel memory to user land
      ipv6: fix uninit-value in ip6_multipath_l3_keys()
      nsh: fix infinite loop
      tcp: restore autocorking
      tipc: fix one byte leak in tipc_sk_set_orig_addr()

Florian Fainelli (1):
      net: systemport: Correclty disambiguate driver instances

Grygorii Strashko (1):
      net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode

Hangbin Liu (1):
      bridge: check iface upper dev when setting master via ioctl

Heiner Kallweit (1):
      r8169: fix powering up RTL8168h

Huy Nguyen (1):
      net/mlx5e: DCBNL fix min inline header size for dscp

Ido Schimmel (1):
      mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list

Ingo Molnar (1):
      8139too: Use disable_irq_nosync() in rtl8139_poll_controller()

James Chapman (1):
      l2tp: revert "l2tp: fix missing print session offset info"

Jianbo Liu (1):
      net/mlx5e: Allow offloading ipv4 header re-write for icmp

Jiri Pirko (1):
      net: sched: fix error path in tcf_proto_create() when modules are not configured

Julian Anastasov (1):
      ipv4: fix fnhe usage by non-cached routes

Lance Richardson (1):
      net: support compat 64-bit time in {s,g}etsockopt

Michael Chan (1):
      tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent().

Mohammed Gamal (1):
      hv_netvsc: Fix net device attach on older Windows hosts

Moshe Shemesh (1):
      net/mlx4_en: Verify coalescing parameters are in range

Neal Cardwell (1):
      tcp_bbr: fix to zero idle_restart only upon S/ACKed data

Paolo Abeni (1):
      udp: fix SO_BINDTODEVICE

Rob Taglang (1):
      net: ethernet: sun: niu set correct packet size in skb

Roi Dayan (1):
      net/mlx5e: Err if asked to offload TC match on frag being first

Roman Mashak (1):
      net sched actions: fix refcnt leak in skbmod

Stefano Brivio (1):
      openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found

Stephen Hemminger (1):
      hv_netvsc: set master device

Talat Batheesh (1):
      net/mlx5: Avoid cleaning flow steering table twice during error flow

Tariq Toukan (1):
      net/mlx5e: TX, Use correct counter in dma_map error flow

Ursula Braun (1):
      net/smc: restrict non-blocking connect finish

Willy Tarreau (1):
      proc: do not access cmdline nor environ from file-backed areas

Xin Long (6):
      sctp: delay the authentication for the duplicated cookie-echo chunk
      sctp: fix the issue that the cookie-ack with auth can't get processed
      sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
      sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg
      sctp: use the old asoc when making the cookie-ack chunk in dupcook_d
      sctp: clear the new asoc's stream outcnt in sctp_stream_update

Yuchung Cheng (1):
      tcp: ignore Fast Open on repair mode

 drivers/net/bonding/bond_alb.c                     |  15 +--
 drivers/net/bonding/bond_main.c                    |   2 +
 drivers/net/ethernet/broadcom/bcmsysport.c         |  16 ++-
 drivers/net/ethernet/broadcom/tg3.c                |   9 +-
 drivers/net/ethernet/mellanox/mlx4/en_ethtool.c    |  16 +++
 drivers/net/ethernet/mellanox/mlx4/en_netdev.c     |   8 +-
 drivers/net/ethernet/mellanox/mlx4/mlx4_en.h       |   7 +-
 drivers/net/ethernet/mellanox/mlx5/core/en_dcbnl.c |   8 +-
 drivers/net/ethernet/mellanox/mlx5/core/en_tc.c    |   7 +-
 drivers/net/ethernet/mellanox/mlx5/core/en_tx.c    |  20 ++--
 drivers/net/ethernet/mellanox/mlx5/core/eswitch.c  |  11 +-
 drivers/net/ethernet/mellanox/mlx5/core/fs_core.c  |  23 ++--
 .../ethernet/mellanox/mlxsw/spectrum_switchdev.c   |  12 +--
 drivers/net/ethernet/realtek/8139too.c             |   2 +-
 drivers/net/ethernet/realtek/r8169.c               |   3 +
 drivers/net/ethernet/sun/niu.c                     |   5 +-
 drivers/net/ethernet/ti/cpsw.c                     |   2 +
 drivers/net/hyperv/netvsc_drv.c                    |   3 +-
 drivers/net/hyperv/rndis_filter.c                  |   2 +-
 drivers/net/usb/qmi_wwan.c                         |  12 +++
 fs/proc/base.c                                     |   8 +-
 include/linux/mm.h                                 |   1 +
 include/net/bonding.h                              |   1 +
 include/net/tls.h                                  |   1 +
 mm/gup.c                                           |   3 +
 net/bridge/br_if.c                                 |   4 +-
 net/compat.c                                       |   6 +-
 net/dccp/ccids/ccid2.c                             |  14 ++-
 net/dccp/timer.c                                   |   2 +-
 net/ipv4/ping.c                                    |   7 +-
 net/ipv4/route.c                                   | 118 +++++++++------------
 net/ipv4/tcp.c                                     |   5 +-
 net/ipv4/tcp_bbr.c                                 |   4 +-
 net/ipv4/udp.c                                     |  11 +-
 net/ipv6/route.c                                   |   7 +-
 net/ipv6/udp.c                                     |   4 +-
 net/l2tp/l2tp_netlink.c                            |   2 -
 net/llc/af_llc.c                                   |   3 +
 net/nsh/nsh.c                                      |   2 +
 net/openvswitch/flow_netlink.c                     |   9 +-
 net/rds/recv.c                                     |   1 +
 net/sched/act_skbmod.c                             |   5 +-
 net/sched/cls_api.c                                |   2 +-
 net/sched/sch_fq.c                                 |  37 ++++---
 net/sctp/associola.c                               |  30 +++++-
 net/sctp/inqueue.c                                 |   2 +-
 net/sctp/ipv6.c                                    |   3 +
 net/sctp/sm_statefuns.c                            |  88 ++++++++-------
 net/sctp/stream.c                                  |   2 +
 net/sctp/ulpevent.c                                |   1 -
 net/smc/af_smc.c                                   |  14 +--
 net/tipc/socket.c                                  |   3 +-
 net/tls/tls_main.c                                 |   8 ++
 53 files changed, 370 insertions(+), 221 deletions(-)




More information about the kernel-team mailing list