From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
stable@vger.kernel.org
Subject: [ 00/42] 3.8.11-stable review
Date: Mon, 29 Apr 2013 12:01:42 -0700 [thread overview]
Message-ID: <20130429184752.435249613@linuxfoundation.org> (raw)
This is the start of the stable review cycle for the 3.8.11 release.
There are 42 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed May 1 18:47:07 UTC 2013.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
kernel.org/pub/linux/kernel/v3.0/stable-review/patch-3.8.11-rc1.gz
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Linux 3.8.11-rc1
Aaro Koskinen <aaro.koskinen@iki.fi>
ARM: 7692/1: iop3xx: move IOP3XX_PERIPHERAL_VIRT_BASE
Stephen Boyd <sboyd@codeaurora.org>
ARM: 7699/1: sched_clock: Add more notrace to prevent recursion
Steven Rostedt <srostedt@redhat.com>
tracing: Fix selftest function recursion accounting
Eric Dumazet <edumazet@google.com>
net: drop dst before queueing fragments
Linus Torvalds <torvalds@linux-foundation.org>
net: fix incorrect credentials passing
Ben Greear <greearb@candelatech.com>
net: rate-limit warn-bad-offload splats.
Eric Dumazet <edumazet@google.com>
tcp: call tcp_replace_ts_recent() from tcp_ack()
Bjørn Mork <bjorn@mork.no>
net: cdc_mbim: remove bogus sizeof()
Willy Tarreau <w@1wt.eu>
net: mvneta: fix improper tx queue usage in mvneta_tx()
Wei Yongjun <yongjun_wei@trendmicro.com.cn>
esp4: fix error return code in esp_output()
Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
net: mvmdio: add select PHYLIB
Thomas Graf <tgraf@suug.ch>
tcp: Reallocate headroom if it would overflow csum_start
Dmitry Popov <dp@highloadlab.com>
tcp: incoming connections might use wrong route under synflood
Michael Riesch <michael.riesch@omicron.at>
rtnetlink: Call nlmsg_parse() with correct header length
Christoph Paasch <christoph.paasch@uclouvain.be>
ipv6/tcp: Stop processing ICMPv6 redirect messages
Patrick McHardy <kaber@trash.net>
netfilter: don't reset nf_trace in nf_reset()
Eric W. Biederman <ebiederm@xmission.com>
af_unix: If we don't care about credentials coallesce all messages
Eric Dumazet <edumazet@google.com>
bonding: fix l23 and l34 load balancing in forwarding path
nikolay@redhat.com <nikolay@redhat.com>
bonding: IFF_BONDING is not stripped on enslave failure
nikolay@redhat.com <nikolay@redhat.com>
bonding: fix bonding_masters race condition in bond unloading
Hannes Frederic Sowa <hannes@stressinduktion.org>
atl1e: limit gso segment size to prevent generation of wrong ip length fields
Vlad Yasevich <vyasevic@redhat.com>
net: count hw_addr syncs so that unsync works properly.
Balakumaran Kannan <kumaran.4353@gmail.com>
net IPv6 : Fix broken IPv6 routing table after loopback down-up
Vasily Averin <vvs@parallels.com>
cbq: incorrect processing of high limits
Mathias Krause <minipli@googlemail.com>
tipc: fix info leaks via msg_name in recv_msg/recv_stream
Mathias Krause <minipli@googlemail.com>
rose: fix info leak via msg_name in rose_recvmsg()
Mathias Krause <minipli@googlemail.com>
NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
Mathias Krause <minipli@googlemail.com>
netrom: fix info leak via msg_name in nr_recvmsg()
Mathias Krause <minipli@googlemail.com>
llc: Fix missing msg_namelen update in llc_ui_recvmsg()
Mathias Krause <minipli@googlemail.com>
l2tp: fix info leak in l2tp_ip6_recvmsg()
Mathias Krause <minipli@googlemail.com>
iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
Mathias Krause <minipli@googlemail.com>
irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
Mathias Krause <minipli@googlemail.com>
caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
Mathias Krause <minipli@googlemail.com>
Bluetooth: SCO - Fix missing msg_namelen update in sco_sock_recvmsg()
Mathias Krause <minipli@googlemail.com>
Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg()
Mathias Krause <minipli@googlemail.com>
Bluetooth: fix possible info leak in bt_sock_recvmsg()
Mathias Krause <minipli@googlemail.com>
ax25: fix info leak via msg_name in ax25_recvmsg()
Mathias Krause <minipli@googlemail.com>
atm: update msg_namelen in vcc_recvmsg()
David S. Miller <davem@davemloft.net>
sparc64: Fix race in TLB batch processing.
Jiri Slaby <jslaby@suse.cz>
TTY: fix atime/mtime regression
Jiri Slaby <jslaby@suse.cz>
TTY: do not update atime/mtime on read/write
Zhao Hongjiang <zhaohongjiang@huawei.com>
aio: fix possible invalid memory access when DEBUG is enabled
-------------
Diffstat:
Makefile | 4 +-
arch/arm/include/asm/hardware/iop3xx.h | 2 +-
arch/arm/kernel/sched_clock.c | 4 +-
arch/sparc/include/asm/pgtable_64.h | 1 +
arch/sparc/include/asm/switch_to_64.h | 3 +-
arch/sparc/include/asm/tlbflush_64.h | 37 ++++++--
arch/sparc/kernel/smp_64.c | 41 +++++++-
arch/sparc/mm/tlb.c | 39 +++++++-
arch/sparc/mm/tsb.c | 57 +++++++++---
arch/sparc/mm/ultra.S | 119 +++++++++++++++++++-----
drivers/net/bonding/bond_main.c | 65 ++++++++-----
drivers/net/ethernet/atheros/atl1e/atl1e.h | 2 +-
drivers/net/ethernet/atheros/atl1e/atl1e_main.c | 1 +
drivers/net/ethernet/marvell/Kconfig | 2 +-
drivers/net/ethernet/marvell/mvneta.c | 9 +-
drivers/net/usb/cdc_mbim.c | 2 +-
drivers/tty/tty_io.c | 14 ++-
fs/aio.c | 2 +-
include/linux/netdevice.h | 2 +-
include/linux/skbuff.h | 7 ++
include/net/scm.h | 4 +-
kernel/trace/trace_selftest.c | 16 +---
net/atm/common.c | 2 +
net/ax25/af_ax25.c | 1 +
net/bluetooth/af_bluetooth.c | 4 +-
net/bluetooth/rfcomm/sock.c | 1 +
net/bluetooth/sco.c | 1 +
net/caif/caif_socket.c | 2 +
net/core/dev.c | 4 +
net/core/dev_addr_lists.c | 6 +-
net/core/rtnetlink.c | 4 +-
net/ipv4/esp4.c | 6 +-
net/ipv4/ip_fragment.c | 15 ++-
net/ipv4/syncookies.c | 4 +-
net/ipv4/tcp_input.c | 64 ++++++-------
net/ipv4/tcp_output.c | 8 +-
net/ipv6/addrconf.c | 27 ++++++
net/ipv6/reassembly.c | 13 ++-
net/ipv6/tcp_ipv6.c | 1 +
net/irda/af_irda.c | 2 +
net/iucv/af_iucv.c | 2 +
net/l2tp/l2tp_ip6.c | 1 +
net/llc/af_llc.c | 2 +
net/netrom/af_netrom.c | 1 +
net/nfc/llcp/sock.c | 3 +
net/rose/af_rose.c | 1 +
net/sched/sch_cbq.c | 5 +-
net/tipc/socket.c | 7 ++
net/unix/af_unix.c | 2 +-
49 files changed, 455 insertions(+), 167 deletions(-)
next reply other threads:[~2013-04-29 19:02 UTC|newest]
Thread overview: 57+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-04-29 19:01 Greg Kroah-Hartman [this message]
2013-04-29 19:01 ` [ 01/42] aio: fix possible invalid memory access when DEBUG is enabled Greg Kroah-Hartman
2013-04-29 19:01 ` [ 02/42] TTY: do not update atime/mtime on read/write Greg Kroah-Hartman
2013-04-30 0:14 ` Simon Kirby
2013-04-30 0:21 ` Greg Kroah-Hartman
2013-04-30 0:36 ` Simon Kirby
2013-04-30 1:37 ` Greg Kroah-Hartman
2013-04-30 23:50 ` Simon Kirby
2013-05-01 0:57 ` Linus Torvalds
2013-05-01 1:41 ` Linus Torvalds
2013-05-01 5:23 ` Jiri Slaby
2013-05-01 13:05 ` Wolfram Gloger
2013-05-02 16:11 ` Simon Kirby
2013-04-29 19:01 ` [ 03/42] TTY: fix atime/mtime regression Greg Kroah-Hartman
2013-04-30 12:02 ` Wolfram Gloger
2013-04-29 19:01 ` [ 04/42] sparc64: Fix race in TLB batch processing Greg Kroah-Hartman
2013-04-29 19:01 ` [ 05/42] atm: update msg_namelen in vcc_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 06/42] ax25: fix info leak via msg_name in ax25_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 07/42] Bluetooth: fix possible info leak in bt_sock_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 08/42] Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 09/42] Bluetooth: SCO - Fix missing msg_namelen update in sco_sock_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 10/42] caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 11/42] irda: Fix missing msg_namelen update in irda_recvmsg_dgram() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 12/42] iucv: Fix missing msg_namelen update in iucv_sock_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 13/42] l2tp: fix info leak in l2tp_ip6_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 14/42] llc: Fix missing msg_namelen update in llc_ui_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 15/42] netrom: fix info leak via msg_name in nr_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 16/42] NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg() Greg Kroah-Hartman
2013-04-29 19:01 ` [ 17/42] rose: fix info leak via msg_name in rose_recvmsg() Greg Kroah-Hartman
2013-04-29 19:02 ` [ 18/42] tipc: fix info leaks via msg_name in recv_msg/recv_stream Greg Kroah-Hartman
2013-04-29 19:02 ` [ 19/42] cbq: incorrect processing of high limits Greg Kroah-Hartman
2013-04-29 19:02 ` [ 20/42] net IPv6 : Fix broken IPv6 routing table after loopback down-up Greg Kroah-Hartman
2013-04-29 19:02 ` [ 21/42] net: count hw_addr syncs so that unsync works properly Greg Kroah-Hartman
2013-04-29 19:02 ` [ 22/42] atl1e: limit gso segment size to prevent generation of wrong ip length fields Greg Kroah-Hartman
2013-04-29 19:02 ` [ 23/42] bonding: fix bonding_masters race condition in bond unloading Greg Kroah-Hartman
2013-04-29 19:02 ` [ 24/42] bonding: IFF_BONDING is not stripped on enslave failure Greg Kroah-Hartman
2013-04-29 19:02 ` [ 25/42] bonding: fix l23 and l34 load balancing in forwarding path Greg Kroah-Hartman
2013-04-29 19:02 ` [ 26/42] af_unix: If we dont care about credentials coallesce all messages Greg Kroah-Hartman
2013-04-29 19:02 ` [ 27/42] netfilter: dont reset nf_trace in nf_reset() Greg Kroah-Hartman
2013-04-29 19:02 ` [ 28/42] ipv6/tcp: Stop processing ICMPv6 redirect messages Greg Kroah-Hartman
2013-04-29 19:02 ` [ 29/42] rtnetlink: Call nlmsg_parse() with correct header length Greg Kroah-Hartman
2013-04-29 19:02 ` [ 30/42] tcp: incoming connections might use wrong route under synflood Greg Kroah-Hartman
2013-04-29 19:02 ` [ 31/42] tcp: Reallocate headroom if it would overflow csum_start Greg Kroah-Hartman
2013-04-29 19:02 ` [ 32/42] net: mvmdio: add select PHYLIB Greg Kroah-Hartman
2013-04-29 19:02 ` [ 33/42] esp4: fix error return code in esp_output() Greg Kroah-Hartman
2013-04-29 19:02 ` [ 34/42] net: mvneta: fix improper tx queue usage in mvneta_tx() Greg Kroah-Hartman
2013-04-29 19:02 ` [ 35/42] net: cdc_mbim: remove bogus sizeof() Greg Kroah-Hartman
2013-04-29 19:02 ` [ 36/42] tcp: call tcp_replace_ts_recent() from tcp_ack() Greg Kroah-Hartman
2013-04-29 19:02 ` [ 37/42] net: rate-limit warn-bad-offload splats Greg Kroah-Hartman
2013-04-29 19:02 ` [ 38/42] net: fix incorrect credentials passing Greg Kroah-Hartman
2013-04-29 19:02 ` [ 39/42] net: drop dst before queueing fragments Greg Kroah-Hartman
2013-04-29 19:02 ` [ 40/42] tracing: Fix selftest function recursion accounting Greg Kroah-Hartman
2013-04-29 19:02 ` [ 41/42] ARM: 7699/1: sched_clock: Add more notrace to prevent recursion Greg Kroah-Hartman
2013-04-29 19:02 ` [ 42/42] ARM: 7692/1: iop3xx: move IOP3XX_PERIPHERAL_VIRT_BASE Greg Kroah-Hartman
2013-04-30 1:54 ` [ 00/42] 3.8.11-stable review Shuah Khan
2013-04-30 1:54 ` Shuah Khan
2013-04-30 2:02 ` Greg Kroah-Hartman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130429184752.435249613@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=akpm@linux-foundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=stable@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.