From patchwork Mon Jan 22 15:37:50 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Khalid Elmously X-Patchwork-Id: 864283 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) by ozlabs.org (Postfix) with ESMTP id 3zQFv00myTz9s7n; Tue, 23 Jan 2018 02:38:04 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1edeAW-0004q8-W1; Mon, 22 Jan 2018 15:37:56 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1edeAV-0004pi-1N for kernel-team@lists.ubuntu.com; Mon, 22 Jan 2018 15:37:55 +0000 Received: from mail-qt0-f199.google.com ([209.85.216.199]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1edeAU-0001HO-Lf for kernel-team@lists.ubuntu.com; Mon, 22 Jan 2018 15:37:54 +0000 Received: by mail-qt0-f199.google.com with SMTP id z12so15146428qti.4 for ; Mon, 22 Jan 2018 07:37:54 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:subject:message-id:mime-version :content-disposition:user-agent; bh=vzfi7hpo16+RQK7HX2seZCIkKY+imx7sKxHhZzwWQqQ=; b=dOR3MThI+SsdAjwtIptUNWe7k2gTDYH8o471s/R50+fXASK7WQvq4G6G4Xmpg4XOr1 ouhmUMQ44FT5BLp4fYam2XrMnA0z9bHXfurRej8VkLeAF5aT95bSy1BbzW1NZbm7vpAX 0Ex8ca08o15NEkyoY04Nr0L2xcyuAPzP1D2m5LWq0xH1eC9orBPazan1vMwmEZh/L7EZ XonatBp1lpxneaV4KqhoeDm8eLm26lteSsSw7P5C7sbmEGYwiT3xYd7Pu7BtGAihFgzF OuHEUlDg5gOsB3B7JTug4QHDLY+JlLh30z9WxK3b3b6PzVS4Qyfgos56HDMZcE9s0XKX ZuwQ== X-Gm-Message-State: AKwxytdsdj8u9WfFYYPIpptm1L9v9cR0VzHQqMzKdSgn5eZy6yJicWza YwfaygGM/9R86sVO4yJzuz1/TlIHqFbaDQf3+eSDw8T7IhCaoHHe/jsucePeNdPyzyL+r8W9uOE q4QlfwhBkQCEedj5CTn7YB1jxa/q2j63lbF3DCkdVbA== X-Received: by 10.200.63.155 with SMTP id d27mr11259796qtk.299.1516635473536; Mon, 22 Jan 2018 07:37:53 -0800 (PST) X-Google-Smtp-Source: AH8x2256zaT9yy5mHn9C5NK5yuTwFOpvCUwFPe00+eNdnXc6+RV7pLQuU1G44CHCz/jxXqCPMFQ3yw== X-Received: by 10.200.63.155 with SMTP id d27mr11259771qtk.299.1516635473219; Mon, 22 Jan 2018 07:37:53 -0800 (PST) Received: from kbuntu (ool-457e4d26.dyn.optonline.net. [69.126.77.38]) by smtp.gmail.com with ESMTPSA id u4sm10325471qtg.33.2018.01.22.07.37.51 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 22 Jan 2018 07:37:52 -0800 (PST) Date: Mon, 22 Jan 2018 10:37:50 -0500 From: Khaled Elmously To: kernel-team@lists.ubuntu.com Subject: [PULL][artful] v2: Stable update to 4.13.14 Message-ID: <20180122153748.45kde6nr6vlaobge@kbuntu> MIME-Version: 1.0 Content-Disposition: inline User-Agent: NeoMutt/20170609 (1.8.3) X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" The following changes since commit ace671f1fe925ee83b84ee37aac289de7454b3c0: sctp: do not peel off an assoc from one netns to another one (2018-01-18 15:40:49 +0100) are available in the git repository at: git+ssh://kmously@git.launchpad.net/~kmously/ubuntu/+source/linux/+git/artful update-to-4.13.14 for you to fetch changes up to be8bfcdeae7f8d89cbce398d4b2d55c897c5585e: Linux 4.13.14 (2018-01-21 18:33:09 -0500) ---------------------------------------------------------------- Adam Wallis (1): dmaengine: dmatest: warn user when dma test times out Alan Stern (1): usb: usbtest: fix NULL pointer dereference Alexey Kodanev (1): gso: fix payload length when gso_size is zero Andrei Vagin (1): net/unix: don't show information about sockets from other namespaces Cong Wang (2): tun: call dev_get_valid_name() before register_netdevice() net_sched: avoid matching qdisc with zero handle Craig Gallek (2): soreuseport: fix initialization race tun/tap: sanitize TUNSETSNDBUF input Dmitry Torokhov (1): Input: ims-psu - check if CDC union descriptor is sane Eric Dumazet (9): net: call cgroup_sk_alloc() earlier in sk_clone_lock() tcp/dccp: fix ireq->opt races packet: avoid panic in packet_getsockopt() ipv6: flowlabel: do not leave opt->tot_len with garbage tcp/dccp: fix lockdep splat in inet_csk_route_req() tcp/dccp: fix other lockdep splats accessing ireq_opt tcp: refresh tp timestamp before tcp_mtu_probe() ipv6: addrconf: increment ifp refcount before ipv6_del_addr() tcp: fix tcp_mtu_probe() vs highest_sack Girish Moodalbail (2): tap: double-free in error path in tap_open() tap: reference to KVA of an unloaded module causes kernel panic Greg Kroah-Hartman (1): Linux 4.13.14 Guillaume Nault (3): ppp: fix race in ppp device destruction l2tp: check ps->sock before running pppol2tp_session_ioctl() l2tp: hold tunnel in pppol2tp_connect() Jason A. Donenfeld (2): netlink: do not set cb_running if dump's start() errs mac80211: use constant time comparison with keys Johannes Berg (3): netlink: fix netlink_ack() extack race mac80211: accept key reinstall without changing anything mac80211: don't compare TKIP TX MIC key in reinstall prevention Julien Gomes (1): tun: allow positive return values on dev_get_valid_name() call Laszlo Toth (1): sctp: full support for ipv6 ip_nonlocal_bind & IP_FREEBIND Moshe Shemesh (1): net/mlx5: Fix health work queue spin lock to IRQ safe Nikolay Aleksandrov (1): net: bridge: fix returning of vlan range op errors Or Gerlitz (1): net/mlx5e: Properly deal with encap flows add/del under neigh update Qiuxu Zhuo (1): EDAC, sb_edac: Don't create a second memory controller if HA1 is not present Sabrina Dubroca (1): macsec: fix memory leaks when skb_to_sgvec fails Stefano Brivio (1): geneve: Fix function matching VNI and tunnel ID on big-endian Steffen Klassert (2): ipv4: Fix traffic triggered IPsec connections. ipv6: Fix traffic triggered IPsec connections. Vivien Didelot (1): net: dsa: check master device before put Xin Long (5): sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect ipip: only increase err_count for some certain type icmp in ipip_err ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err ip6_gre: update dst pmtu if dev mtu has been updated by toobig in __gre6_xmit sctp: reset owner sk for data chunks on out queues when migrating a sock Makefile | 2 +- drivers/dma/dmatest.c | 1 + drivers/edac/sb_edac.c | 9 ++- drivers/input/misc/ims-pcu.c | 16 ++++- drivers/net/ethernet/mellanox/mlx5/core/en_tc.c | 89 ++++++++++++++---------- drivers/net/ethernet/mellanox/mlx5/core/health.c | 5 +- drivers/net/geneve.c | 6 -- drivers/net/ipvlan/ipvtap.c | 4 +- drivers/net/macsec.c | 2 + drivers/net/macvtap.c | 4 +- drivers/net/ppp/ppp_generic.c | 20 ++++++ drivers/net/tap.c | 25 ++++--- drivers/net/tun.c | 7 ++ drivers/usb/misc/usbtest.c | 5 +- include/linux/if_tap.h | 4 +- include/linux/netdevice.h | 3 + include/net/inet_sock.h | 8 ++- include/net/tcp.h | 6 +- net/bridge/br_netlink.c | 2 +- net/core/dev.c | 6 +- net/core/sock.c | 3 +- net/core/sock_reuseport.c | 12 +++- net/dccp/ipv4.c | 13 ++-- net/dsa/dsa2.c | 7 +- net/ipv4/cipso_ipv4.c | 24 ++----- net/ipv4/gre_offload.c | 2 +- net/ipv4/inet_connection_sock.c | 9 ++- net/ipv4/inet_hashtables.c | 5 +- net/ipv4/ipip.c | 59 +++++++++++----- net/ipv4/route.c | 2 +- net/ipv4/syncookies.c | 2 +- net/ipv4/tcp_input.c | 2 +- net/ipv4/tcp_ipv4.c | 21 +++--- net/ipv4/tcp_output.c | 5 +- net/ipv4/udp.c | 5 +- net/ipv4/udp_offload.c | 2 +- net/ipv6/addrconf.c | 1 + net/ipv6/ip6_flowlabel.c | 1 + net/ipv6/ip6_gre.c | 20 ++++-- net/ipv6/ip6_offload.c | 2 +- net/ipv6/ip6_output.c | 4 +- net/ipv6/route.c | 2 +- net/l2tp/l2tp_ppp.c | 10 ++- net/mac80211/key.c | 54 ++++++++++++-- net/netlink/af_netlink.c | 21 +++--- net/packet/af_packet.c | 24 ++++--- net/sched/sch_api.c | 2 + net/sctp/input.c | 2 +- net/sctp/ipv6.c | 6 +- net/sctp/socket.c | 32 +++++++++ net/unix/diag.c | 2 + 51 files changed, 394 insertions(+), 186 deletions(-)