From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
linux@roeck-us.net, shuahkh@osg.samsung.com,
patches@kernelci.org, ben.hutchings@codethink.co.uk,
stable@vger.kernel.org
Subject: [PATCH 4.11 00/28] 4.11.1-stable review
Date: Thu, 11 May 2017 16:12:17 +0200 [thread overview]
Message-ID: <20170511141221.109842231@linuxfoundation.org> (raw)
This is the start of the stable review cycle for the 4.11.1 release.
There are 28 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat May 13 14:12:05 UTC 2017.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.11.1-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.11.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Linux 4.11.1-rc1
Ilya Dryomov <idryomov@gmail.com>
block: get rid of blk_integrity_revalidate()
Boris Ostrovsky <boris.ostrovsky@oracle.com>
xen: Revert commits da72ff5bfcb0 and 72a9b186292d
Stefano Stabellini <sstabellini@kernel.org>
xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
Jin Qian <jinqian@google.com>
f2fs: sanity check segment count
Jon Mason <jon.mason@broadcom.com>
net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
Daniel Borkmann <daniel@iogearbox.net>
bpf: don't let ldimm64 leak map addresses on unprivileged
Dan Carpenter <dan.carpenter@oracle.com>
bnxt_en: allocate enough space for ->ntp_fltr_bmap
Eric Dumazet <edumazet@google.com>
tcp: randomize timestamps on syncookies
WANG Cong <xiyou.wangcong@gmail.com>
ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
WANG Cong <xiyou.wangcong@gmail.com>
ipv6: initialize route null entry in addrconf_init()
Michal Schmidt <mschmidt@redhat.com>
rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
Alexander Potapenko <glider@google.com>
ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
Eric Dumazet <edumazet@google.com>
tcp: do not inherit fastopen_req from parent
Daniele Palmas <dnlplm@gmail.com>
net: usb: qmi_wwan: add Telit ME910 support
David Ahern <dsahern@gmail.com>
net: ipv6: Do not duplicate DAD on link up
Eric Dumazet <edumazet@google.com>
tcp: fix wraparound issue in tcp_lp
Daniel Borkmann <daniel@iogearbox.net>
bpf, arm64: fix jit branch offset related to ldimm64
Yonghong Song <yhs@fb.com>
bpf: enhance verifier to understand stack pointer arithmetic
Girish Moodalbail <girish.moodalbail@oracle.com>
geneve: fix incorrect setting of UDP checksum flag
Davide Caratti <dcaratti@redhat.com>
tcp: fix access to sk->sk_state in tcp_poll()
Alexandre Belloni <alexandre.belloni@free-electrons.com>
net: macb: fix phy interrupt parsing
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
refcount: change EXPORT_SYMBOL markings
Dave Aldridge <david.j.aldridge@oracle.com>
sparc64: fix fault handling in NGbzero.S and GENbzero.S
James Hughes <james.hughes@raspberrypi.org>
brcmfmac: Make skb header writable before use
James Hughes <james.hughes@raspberrypi.org>
brcmfmac: Ensure pointer correctly set if skb data location changes
Giedrius Statkevičius <giedrius.statkevicius@gmail.com>
power: supply: lp8788: prevent out of bounds array access
Vincent Abriou <vincent.abriou@st.com>
drm/sti: fix GDP size to support up to UHD resolution
Adrian Salido <salidoa@google.com>
dm ioctl: prevent stack leak in dm ioctl call
-------------
Diffstat:
Makefile | 4 +-
arch/arm/include/asm/device.h | 3 ++
arch/arm/include/asm/dma-mapping.h | 12 +-----
arch/arm/mm/dma-mapping.c | 7 ++++
arch/arm64/include/asm/device.h | 3 ++
arch/arm64/include/asm/dma-mapping.h | 13 +------
arch/arm64/mm/dma-mapping.c | 7 ++++
arch/arm64/net/bpf_jit_comp.c | 8 ++--
arch/sparc/kernel/head_64.S | 6 +++
arch/sparc/lib/GENbzero.S | 2 +-
arch/sparc/lib/NGbzero.S | 2 +-
arch/x86/include/asm/xen/events.h | 11 ++++++
arch/x86/pci/xen.c | 2 +-
arch/x86/xen/enlighten.c | 16 +++++---
arch/x86/xen/smp.c | 2 +
arch/x86/xen/time.c | 5 +++
block/blk-integrity.c | 19 +--------
block/partition-generic.c | 1 -
drivers/gpu/drm/sti/sti_gdp.c | 12 +++---
drivers/md/dm-ioctl.c | 2 +-
drivers/net/ethernet/broadcom/bnxt/bnxt.c | 3 +-
drivers/net/ethernet/cadence/macb.c | 18 +++++----
drivers/net/geneve.c | 2 +-
drivers/net/phy/mdio-mux-bcm-iproc.c | 5 ++-
drivers/net/usb/qmi_wwan.c | 1 +
.../wireless/broadcom/brcm80211/brcmfmac/core.c | 23 ++++-------
drivers/power/supply/lp8788-charger.c | 2 +-
drivers/xen/events/events_base.c | 26 ++++++++-----
drivers/xen/platform-pci.c | 13 ++-----
fs/block_dev.c | 1 -
fs/f2fs/super.c | 7 ++++
include/linux/f2fs_fs.h | 6 +++
include/linux/genhd.h | 2 -
include/net/addrconf.h | 2 +
include/net/ip6_route.h | 1 +
include/net/secure_seq.h | 10 +++--
include/net/tcp.h | 5 ++-
include/xen/arm/page-coherent.h | 8 ++++
kernel/bpf/verifier.c | 32 ++++++++++++---
lib/refcount.c | 22 +++++------
lib/test_bpf.c | 45 ++++++++++++++++++++++
net/core/rtnetlink.c | 2 +-
net/core/secure_seq.c | 34 +++++++++-------
net/ipv4/raw.c | 3 ++
net/ipv4/syncookies.c | 12 +++++-
net/ipv4/tcp.c | 2 +-
net/ipv4/tcp_input.c | 8 ++--
net/ipv4/tcp_ipv4.c | 32 ++++++++-------
net/ipv4/tcp_lp.c | 6 ++-
net/ipv4/tcp_minisocks.c | 1 +
net/ipv6/addrconf.c | 8 +++-
net/ipv6/raw.c | 2 +
net/ipv6/route.c | 39 ++++++++++++-------
net/ipv6/syncookies.c | 10 ++++-
net/ipv6/tcp_ipv6.c | 32 ++++++++-------
tools/testing/selftests/bpf/test_verifier.c | 18 ++++++---
56 files changed, 375 insertions(+), 205 deletions(-)
next reply other threads:[~2017-05-11 14:12 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-05-11 14:12 Greg Kroah-Hartman [this message]
2017-05-11 14:12 ` [PATCH 4.11 01/28] dm ioctl: prevent stack leak in dm ioctl call Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 02/28] drm/sti: fix GDP size to support up to UHD resolution Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 04/28] brcmfmac: Ensure pointer correctly set if skb data location changes Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 05/28] brcmfmac: Make skb header writable before use Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 06/28] sparc64: fix fault handling in NGbzero.S and GENbzero.S Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 08/28] net: macb: fix phy interrupt parsing Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 09/28] tcp: fix access to sk->sk_state in tcp_poll() Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 10/28] geneve: fix incorrect setting of UDP checksum flag Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 11/28] bpf: enhance verifier to understand stack pointer arithmetic Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 12/28] bpf, arm64: fix jit branch offset related to ldimm64 Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 13/28] tcp: fix wraparound issue in tcp_lp Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 14/28] net: ipv6: Do not duplicate DAD on link up Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 16/28] tcp: do not inherit fastopen_req from parent Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 17/28] ipv4, ipv6: ensure raw socket message is big enough to hold an IP header Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 18/28] rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 19/28] ipv6: initialize route null entry in addrconf_init() Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 20/28] ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 21/28] tcp: randomize timestamps on syncookies Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 22/28] bnxt_en: allocate enough space for ->ntp_fltr_bmap Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 23/28] bpf: dont let ldimm64 leak map addresses on unprivileged Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 24/28] net: mdio-mux: bcm-iproc: call mdiobus_free() in error path Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 25/28] f2fs: sanity check segment count Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 26/28] xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..." Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 27/28] xen: Revert commits da72ff5bfcb0 and 72a9b186292d Greg Kroah-Hartman
2017-05-11 14:12 ` [PATCH 4.11 28/28] block: get rid of blk_integrity_revalidate() Greg Kroah-Hartman
2017-05-12 15:25 ` [PATCH 4.11 00/28] 4.11.1-stable review Shuah Khan
2017-05-12 15:47 ` Greg Kroah-Hartman
2017-05-12 16:01 ` Shuah Khan
2017-05-15 14:36 ` Matt Fleming
2017-05-15 17:28 ` Shuah Khan
2017-05-25 11:39 ` Matt Fleming
2017-05-25 20:06 ` Ard Biesheuvel
2017-05-12 19:50 ` Guenter Roeck
2017-05-14 10:59 ` Greg Kroah-Hartman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170511141221.109842231@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=akpm@linux-foundation.org \
--cc=ben.hutchings@codethink.co.uk \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@roeck-us.net \
--cc=patches@kernelci.org \
--cc=shuahkh@osg.samsung.com \
--cc=stable@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).