[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170320174718.794407270@linuxfoundation.org>
Date: Mon, 20 Mar 2017 18:48:55 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
ben.hutchings@...ethink.co.uk, stable@...r.kernel.org
Subject: [PATCH 4.4 00/28] 4.4.56-stable review
This is the start of the stable review cycle for the 4.4.56 release.
There are 28 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Wed Mar 22 17:47:06 UTC 2017.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.56-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Linux 4.4.56-rc1
Peter Zijlstra <peterz@...radead.org>
futex: Add missing error handling to FUTEX_REQUEUE_PI
Peter Zijlstra <peterz@...radead.org>
futex: Fix potential use-after-free in FUTEX_REQUEUE_PI
Andy Lutomirski <luto@...nel.org>
x86/perf: Fix CR4.PCE propagation to use active_mm instead of mm
Andrey Ryabinin <aryabinin@...tuozzo.com>
x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
Eric Biggers <ebiggers@...gle.com>
fscrypto: lock inode while setting encryption policy
Eric Biggers <ebiggers@...gle.com>
fscrypt: fix renaming and linking special files
Roman Mashak <mrv@...atatu.com>
net sched actions: decrement module reference count after table flush.
Hannes Frederic Sowa <hannes@...essinduktion.org>
dccp: fix memory leak during tear-down of unsuccessful connection request
Jon Maxwell <jmaxwell37@...il.com>
dccp/tcp: fix routing redirect race
Florian Westphal <fw@...len.de>
bridge: drop netfilter fake rtable unconditionally
Florian Westphal <fw@...len.de>
ipv6: avoid write to a possibly cloned skb
Sabrina Dubroca <sd@...asysnail.net>
ipv6: make ECMP route replacement less greedy
David Ahern <dsa@...ulusnetworks.com>
mpls: Send route delete notifications when router module is unloaded
Etienne Noss <etienne.noss@...irst.fr>
act_connmark: avoid crashing on malformed nlattrs with null parms
Dmitry V. Levin <ldv@...linux.org>
uapi: fix linux/packet_diag.h userspace compilation error
David Ahern <dsa@...ulusnetworks.com>
vrf: Fix use-after-free in vrf_xmit
Eric Dumazet <edumazet@...gle.com>
dccp: fix use-after-free in dccp_feat_activate_values
Eric Dumazet <edumazet@...gle.com>
net: fix socket refcounting in skb_complete_tx_timestamp()
Eric Dumazet <edumazet@...gle.com>
net: fix socket refcounting in skb_complete_wifi_ack()
Eric Dumazet <edumazet@...gle.com>
tcp: fix various issues for sockets morphing to listen state
Arnaldo Carvalho de Melo <acme@...hat.com>
dccp: Unlock sock before calling sk_free()
Eric Dumazet <edumazet@...gle.com>
net: net_enable_timestamp() can be called from irq contexts
Alexander Potapenko <glider@...gle.com>
net: don't call strlen() on the user buffer in packet_bind_spkt()
Paul Hüber <phueber@...nsp.in>
l2tp: avoid use-after-free caused by l2tp_ip_backlog_recv
Julian Anastasov <ja@....bg>
ipv4: mask tos for input route
David Forster <dforster@...cade.com>
vti6: return GRE_KEY for vti6
Matthias Schiffer <mschiffer@...verse-factory.net>
vxlan: correctly validate VXLAN ID against VXLAN_N_VID
Florian Westphal <fw@...len.de>
netlink: remove mmapped netlink support
-------------
Diffstat:
Documentation/networking/netlink_mmap.txt | 332 -------------
Makefile | 4 +-
arch/x86/kernel/cpu/perf_event.c | 4 +-
arch/x86/kernel/head64.c | 1 +
arch/x86/mm/kasan_init_64.c | 1 +
drivers/net/vrf.c | 3 +-
drivers/net/vxlan.c | 2 +-
fs/ext4/crypto_policy.c | 6 +
fs/ext4/ioctl.c | 4 +
fs/f2fs/crypto_policy.c | 5 +
fs/f2fs/file.c | 9 +-
include/linux/dccp.h | 1 +
include/uapi/linux/netlink.h | 4 +
include/uapi/linux/netlink_diag.h | 2 +
include/uapi/linux/packet_diag.h | 2 +-
kernel/futex.c | 22 +-
net/bridge/br_input.c | 1 +
net/bridge/br_netfilter_hooks.c | 21 -
net/core/dev.c | 35 +-
net/core/skbuff.c | 30 +-
net/dccp/ccids/ccid2.c | 1 +
net/dccp/ipv4.c | 3 +-
net/dccp/ipv6.c | 8 +-
net/dccp/minisocks.c | 25 +-
net/ipv4/route.c | 1 +
net/ipv4/tcp_ipv4.c | 10 +-
net/ipv4/tcp_timer.c | 6 +-
net/ipv6/ip6_fib.c | 2 +
net/ipv6/ip6_output.c | 7 +-
net/ipv6/ip6_vti.c | 4 +
net/ipv6/tcp_ipv6.c | 8 +-
net/l2tp/l2tp_ip.c | 2 +-
net/mpls/af_mpls.c | 1 +
net/netlink/Kconfig | 9 -
net/netlink/af_netlink.c | 751 +-----------------------------
net/netlink/af_netlink.h | 15 -
net/netlink/diag.c | 39 --
net/packet/af_packet.c | 8 +-
net/sched/act_api.c | 5 +-
net/sched/act_connmark.c | 3 +
40 files changed, 175 insertions(+), 1222 deletions(-)
Powered by blists - more mailing lists