From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linuxfoundation.org ([140.211.169.12]:33490 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752065AbdKVKPc (ORCPT ); Wed, 22 Nov 2017 05:15:32 -0500 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuahkh@osg.samsung.com, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 4.9 00/25] 4.9.65-stable review Date: Wed, 22 Nov 2017 11:11:52 +0100 Message-Id: <20171122101118.019080822@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org List-ID: This is the start of the stable review cycle for the 4.9.65 release. There are 25 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Nov 24 10:11:07 UTC 2017. Anything received after that time might be too late. The whole patch series can be found in one patch at: kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.65-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 4.9.65-rc1 Jan Harkes coda: fix 'kernel memory exposure attempt' in fsync Pavel Tatashin mm/page_alloc.c: broken deferred calculation Corey Minyard ipmi: fix unsigned long underflow alex chen ocfs2: should wait dio before inode lock in ocfs2_setattr() Changwei Ge ocfs2: fix cluster hang after a node dies Adam Wallis dmaengine: dmatest: warn user when dma test times out Ji-Ze Hong (Peter Hong) serial: 8250_fintek: Fix finding base_port with activated SuperIO Lukas Wunner serial: omap: Fix EFR write on RTS deassertion Roberto Sassu ima: do not update security.ima if appraisal status is not INTEGRITY_PASS Eric Biggers crypto: dh - Fix double free of ctx->p Tudor-Dan Ambarus crypto: dh - fix memleak in setkey Eric W. Biederman net/sctp: Always set scope_id in sctp_inet6_skb_msgname Huacai Chen fealnx: Fix building error on MIPS Xin Long sctp: do not peel off an assoc from one netns to another one Jason A. Donenfeld af_netlink: ensure that NLMSG_DONE never fails in dumps Cong Wang vlan: fix a use-after-free in vlan_device_event() Andrey Konovalov net: usb: asix: fill null-ptr-deref in asix_suspend Kristian Evensen qmi_wwan: Add missing skb_reset_mac_header-call Bjørn Mork net: qmi_wwan: fix divide by 0 on bad descriptors Bjørn Mork net: cdc_ether: fix divide by 0 on bad descriptors Hangbin Liu bonding: discard lowest hash bit for 802.3ad layer3+4 Ye Yin netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed Eric Dumazet tcp: do not mangle skb->cb[] in tcp_make_synack() Jeff Barnhill <0xeffeff@gmail.com> net: vrf: correct FRA_L3MDEV encode type Konstantin Khlebnikov tcp_nv: fix division by zero in tcpnv_acked() ------------- Diffstat: Makefile | 4 ++-- crypto/dh.c | 34 +++++++++++++++------------------- drivers/char/ipmi/ipmi_msghandler.c | 10 ++++++---- drivers/dma/dmatest.c | 1 + drivers/net/bonding/bond_main.c | 2 +- drivers/net/ethernet/fealnx.c | 6 +++--- drivers/net/usb/asix_devices.c | 4 ++-- drivers/net/usb/cdc_ether.c | 2 +- drivers/net/usb/qmi_wwan.c | 3 ++- drivers/net/vrf.c | 2 +- drivers/tty/serial/8250/8250_fintek.c | 3 +++ drivers/tty/serial/omap-serial.c | 2 +- fs/coda/upcall.c | 3 +-- fs/ocfs2/dlm/dlmrecovery.c | 1 + fs/ocfs2/file.c | 9 +++++++-- include/linux/mmzone.h | 3 ++- include/linux/skbuff.h | 7 +++++++ mm/page_alloc.c | 27 ++++++++++++++++++--------- net/8021q/vlan.c | 6 +++--- net/core/skbuff.c | 1 + net/ipv4/tcp_nv.c | 2 +- net/ipv4/tcp_output.c | 9 ++------- net/netlink/af_netlink.c | 17 +++++++++++------ net/netlink/af_netlink.h | 1 + net/sctp/ipv6.c | 5 +++-- net/sctp/socket.c | 4 ++++ security/integrity/ima/ima_appraise.c | 3 +++ 27 files changed, 103 insertions(+), 68 deletions(-)