Return-Path: <kernel-team-bounces@lists.ubuntu.com> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) by ozlabs.org (Postfix) with ESMTP id 3wK6vJ08Gwz9s5L; Fri, 5 May 2017 20:04:44 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.76) (envelope-from <kernel-team-bounces@lists.ubuntu.com>) id 1d6a6F-00076J-11; Fri, 05 May 2017 10:04:35 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.76) (envelope-from <stefan.bader@canonical.com>) id 1d6a69-00076A-Mk for kernel-team@lists.ubuntu.com; Fri, 05 May 2017 10:04:29 +0000 Received: from 1.general.smb.uk.vpn ([10.172.193.28] helo=canonical.com) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from <stefan.bader@canonical.com>) id 1d6a69-00074v-CH for kernel-team@lists.ubuntu.com; Fri, 05 May 2017 10:04:29 +0000 From: Stefan Bader <stefan.bader@canonical.com> To: kernel-team@lists.ubuntu.com Subject: [Zesty SRU] Zesty update to 4.10.14 stable release Date: Fri, 5 May 2017 12:04:28 +0200 Message-Id: <1493978668-12610-1-git-send-email-stefan.bader@canonical.com> X-Mailer: git-send-email 2.7.4 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.14 Precedence: list List-Id: Kernel team discussions <kernel-team.lists.ubuntu.com> List-Unsubscribe: <https://lists.ubuntu.com/mailman/options/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe> List-Archive: <https://lists.ubuntu.com/archives/kernel-team> List-Post: <mailto:kernel-team@lists.ubuntu.com> List-Help: <mailto:kernel-team-request@lists.ubuntu.com?subject=help> List-Subscribe: <https://lists.ubuntu.com/mailman/listinfo/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: kernel-team-bounces@lists.ubuntu.com
https://bugs.launchpad.net/ubuntu/zesty/+source/linux/+bug/1688499 The following patches were skipped because they were already applied: * bug #1678009 / CVE-2017-7308 - net/packet: fix overflow in check for tp_frame_nr - net/packet: fix overflow in check for tp_reserve The following patch was reverted and replaced by its upstream counterpart to pick up the upstream commit SHA1: * bug #1676786 [Zesty] mlx5_core Kernel oops with bonding mode 1 and 6 - UBUNTU: SAUCE: (no-up) net/mlx5: Avoid dereferencing uninitialized pointer + net/mlx5: Avoid dereferencing uninitialized pointer The following commit required manual context handling due to changes introduced by bug #1676388 [zesty] mlx5e OVS fixes. * net/mlx5: E-Switch, Correctly deal with inline mode on ConnectX-5 -Stefan --- The following changes since commit cf86cc024f33d3132e2aacbf2e4149b27d8256fb: Linux 4.10.13 (2017-05-05 10:25:41 +0200) are available in the git repository at: git://git.launchpad.net/~smb/+git/linux-zesty stable-4.10 for you to fetch changes up to 65be86a526a11d6eb9d09014d4eaf9c79d50189b: Linux 4.10.14 (2017-05-05 11:24:57 +0200) ---------------------------------------------------------------- Al Viro (1): p9_client_readdir() fix Alexander Kochetkov (1): net: phy: fix auto-negotiation stall due to unavailable interrupt Alexei Starovoitov (1): bpf: improve verifier packet range checks Dan Carpenter (1): dp83640: don't recieve time stamps twice David Ahern (3): net: vrf: Fix setting NLM_F_EXCL flag when adding l3mdev rule net: ipv6: RTF_PCPU should not be settable from userspace net: ipv6: regenerate host route if moved to gc list David Lebrun (2): ipv6: sr: fix out-of-bounds access in SRH validation ipv6: sr: fix double free of skb after handling invalid SRH Dmitry Torokhov (1): Input: i8042 - add Clevo P650RS to the i8042 reset list Eric Dumazet (3): ping: implement proper locking net: neigh: guard against NULL solicit() method tcp: clear saved_syn in tcp_disconnect() Eugenia Emantayev (1): net/mlx5e: Fix small packet threshold Florian Larysch (1): net: ipv4: fix multipath RTM_GETROUTE behavior when iif is given Florian Westphal (1): secure_seq: downgrade to per-host timestamp offsets Greg Kroah-Hartman (1): Linux 4.10.14 Guillaume Nault (4): l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 l2tp: purge socket queues in the .destruct() callback l2tp: take reference on sessions being dumped l2tp: fix PPP pseudo-wire auto-loading Herbert Xu (1): macvlan: Fix device ref leak when purging bc_queue Ilan Tayari (2): gso: Validate assumption of frag_list segementation net/mlx5e: Fix ETHTOOL_GRXCLSRLALL handling J. Bruce Fields (3): nfsd: check for oversized NFSv2/v3 arguments nfsd4: minor NFSv2/v3 write decoding cleanup nfsd: stricter decoding of write-like NFSv2/v3 ops James Cowgill (1): MIPS: Avoid BUG warning in arch_check_elf James Hogan (2): MIPS: KGDB: Use kernel context for sleeping threads MIPS: cevt-r4k: Fix out-of-bounds array access Jamie Bainbridge (1): ipv6: check raw payload size correctly in ioctl Jason A. Donenfeld (1): macsec: avoid heap overflow in skb_to_sgvec Johannes Thumshirn (1): scsi: return correct blkprep status code in case scsi_init_io() fails. Josh Poimboeuf (1): ftrace/x86: Fix triple fault with graph tracing and suspend-to-ram Maksim Salau (1): net: can: usb: gs_usb: Fix buffer on stack Mohamad Haj Yahia (1): net/mlx5: Fix driver load bad flow when having fw initializing timeout Nathan Sullivan (1): net: phy: handle state correctly in phy_stop_machine Nikolay Aleksandrov (1): ip6mr: fix notification device destruction Noam Camus (1): ARC: [plat-eznps] Fix build error Or Gerlitz (1): net/mlx5: E-Switch, Correctly deal with inline mode on ConnectX-5 Rabin Vincent (1): ipv6: Fix idev->addr_list corruption Sabrina Dubroca (1): ipv6: fix source routing Sebastian Andrzej Siewior (1): cpu/hotplug: Serialize callback invocations proper Sergei Shtylyov (1): sh_eth: unmap DMA buffers when freeing rings Soheil Hassas Yeganeh (2): tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS Stefan Bader (1): Revert "UBUNTU: SAUCE: (no-up) net/mlx5: Avoid dereferencing uninitialized pointer" Takashi Iwai (2): ALSA: seq: Don't break snd_use_lock_sync() loop by timeout ASoC: intel: Fix PM and non-atomic crash in bytcr drivers Takashi Sakamoto (2): ALSA: oxfw: fix regression to handle Stanton SCS.1m/1d ALSA: firewire-lib: fix inappropriate assignment between signed/unsigned type Talat Batheesh (1): net/mlx5: Avoid dereferencing uninitialized pointer Tom Hromatka (1): sparc64: Fix kernel panic due to erroneous #ifdef surrounding pmd_write() Tushar Dave (1): netpoll: Check for skb->queue_mapping WANG Cong (2): kcm: return immediately after copy_from_user() failure ipv6: check skb->protocol before lookup for nexthop Wei Wang (1): tcp: memset ca_priv data to 0 properly Willem de Bruijn (1): net-timestamp: avoid use-after-free in ip_recv_error Xin Long (1): sctp: listen on the sock only when it's state is listening or closed Yan, Zheng (1): ceph: fix recursion between ceph_set_acl() and __ceph_setattr() Yi-Hung Wei (1): openvswitch: Fix ovs_flow_key_update() bob picco (1): sparc64: kern_addr_valid regression Makefile | 2 +- arch/arc/include/asm/atomic.h | 3 +- arch/mips/kernel/cevt-r4k.c | 2 +- arch/mips/kernel/elf.c | 2 +- arch/mips/kernel/kgdb.c | 48 +++++--- arch/sparc/include/asm/pgtable_64.h | 15 +-- arch/sparc/mm/init_64.c | 2 +- arch/x86/kernel/ftrace.c | 12 ++ drivers/input/serio/i8042-x86ia64io.h | 7 ++ drivers/net/can/usb/gs_usb.c | 17 ++- drivers/net/ethernet/mellanox/mlx5/core/en.h | 2 +- .../ethernet/mellanox/mlx5/core/en_fs_ethtool.c | 1 + drivers/net/ethernet/mellanox/mlx5/core/en_tc.c | 3 +- .../ethernet/mellanox/mlx5/core/eswitch_offloads.c | 36 ++++-- drivers/net/ethernet/mellanox/mlx5/core/main.c | 2 +- drivers/net/ethernet/renesas/sh_eth.c | 122 +++++++++++---------- drivers/net/macsec.c | 2 +- drivers/net/macvlan.c | 11 +- drivers/net/phy/dp83640.c | 2 - drivers/net/phy/phy.c | 42 ++++++- drivers/net/vrf.c | 2 +- drivers/scsi/scsi_lib.c | 4 +- fs/ceph/inode.c | 22 ++-- fs/nfsd/nfs3xdr.c | 13 ++- fs/nfsd/nfssvc.c | 36 ++++++ fs/nfsd/nfsxdr.c | 10 +- include/linux/errqueue.h | 2 + include/linux/phy.h | 1 + include/uapi/linux/ipv6_route.h | 2 +- kernel/bpf/verifier.c | 5 +- kernel/cpu.c | 28 ++--- net/9p/client.c | 4 + net/core/neighbour.c | 3 +- net/core/netpoll.c | 10 +- net/core/secure_seq.c | 29 ++++- net/core/skbuff.c | 46 ++++++-- net/ipv4/ip_sockglue.c | 9 +- net/ipv4/ping.c | 5 +- net/ipv4/route.c | 2 +- net/ipv4/tcp.c | 1 + net/ipv4/tcp_cong.c | 11 +- net/ipv6/addrconf.c | 25 ++++- net/ipv6/datagram.c | 10 +- net/ipv6/exthdrs.c | 5 +- net/ipv6/ip6_tunnel.c | 34 +++--- net/ipv6/ip6mr.c | 13 +-- net/ipv6/raw.c | 3 +- net/ipv6/route.c | 4 + net/ipv6/seg6.c | 3 + net/kcm/kcmsock.c | 6 +- net/l2tp/l2tp_core.c | 8 +- net/l2tp/l2tp_core.h | 3 +- net/l2tp/l2tp_debugfs.c | 10 +- net/l2tp/l2tp_ip.c | 5 +- net/l2tp/l2tp_ip6.c | 5 +- net/l2tp/l2tp_netlink.c | 7 +- net/l2tp/l2tp_ppp.c | 19 ++-- net/openvswitch/flow.c | 10 +- net/sctp/socket.c | 3 + net/socket.c | 13 ++- sound/core/seq/seq_lock.c | 9 +- sound/firewire/lib.h | 2 +- sound/firewire/oxfw/oxfw.c | 4 +- sound/soc/intel/boards/bytcr_rt5640.c | 4 +- sound/soc/intel/boards/bytcr_rt5651.c | 2 - tools/testing/selftests/bpf/test_verifier.c | 20 ++++ 66 files changed, 544 insertions(+), 261 deletions(-)
Applied to zesty master-next branch. Thanks. Cascardo.