Received: by 10.192.165.148 with SMTP id m20csp748810imm; Fri, 27 Apr 2018 06:59:21 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpsbvbdjn5KTb4v4jrrncxbvY/ErC1vl8w0PJty5qGfiHqLgrrYW2NCMzjMXXFoEU9V6oNh X-Received: by 10.98.185.23 with SMTP id z23mr2304882pfe.180.1524837561438; Fri, 27 Apr 2018 06:59:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524837561; cv=none; d=google.com; s=arc-20160816; b=XGKeX62CY5pkRx/7+0aqhDSO92/3ju2v7FulCXXA9GU9BrYDKsyjOQlg4/HuYK/0eP 6Mz94RjyV4XLnbnFD/U2dHdHWXO7JtMypdV35vgAWx/Hnu/MQgDqFNlh7i9sj/5Ov/JW f1PRX9YbN5TfujDQmCQ2PuuOXj55QD97B2E+FnG9v88c/lWgO8ke2fhUT61ikvv0L4pp NyKg5QVY7F/6EXrPPSEXHWbwUcFYbV1s4ZhvgfFdLBrxTursahYO1H3/F9UEz5OnWZyL ORD1JhCHeEKfoE++36KZ8UIdaBCPu01V9CROeVVHkZM1zR7iMlVi/01Xiq5O2oNoXYDY ycAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:date:subject:cc:to :from:dmarc-filter:arc-authentication-results; bh=Uf5YoyTPpqZacuQtrKTGMyEHPV1pE7ekpzHqRROgz5I=; b=Z11s1jr8kTqBXme/Dw70fLxR1wpTPKovzjoiOgz94IA8FngQ6meZ9wd9YXYMzw0s9h B8TXxwgqGUy/wxJ3jLyuENdvv8ar6quOwxyUgdqa/jzSAJyFAEKa90yJK+z7sukIk1RQ 3JrX9tk8ib2b9p6U1oELX5OjtceBeW3Y+bAAJpwh+D6xNRpPABXx3MyU4dYbLV86d+80 AB4hKM+p/afp1o6BtEXzux42+awzlCsdJzRGNZg8rO6/DQ7zzZCZrG9XPHdW1ECqpkXj WF3JTjCG8HjhlmfGqJ81T8bjiTm21ceyywOVdlIUPTGwdoNuYaPfXMbGKg3+zzKp3od7 2Ewg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h62si1309168pfg.308.2018.04.27.06.59.07; Fri, 27 Apr 2018 06:59:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932826AbeD0N6L (ORCPT + 99 others); Fri, 27 Apr 2018 09:58:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:46466 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932666AbeD0N6J (ORCPT ); Fri, 27 Apr 2018 09:58:09 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6A3AE21890; Fri, 27 Apr 2018 13:58:08 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6A3AE21890 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 3.18 00/24] 3.18.107-stable review Date: Fri, 27 Apr 2018 15:57:35 +0200 Message-Id: <20180427135631.584839868@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 User-Agent: quilt/0.65 X-stable: review X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-3.18.107-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-3.18.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 3.18.107-rc1 X-KernelTest-Deadline: 2018-04-29T13:56+00:00 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 3.18.107 release. There are 24 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun Apr 29 13:56:20 UTC 2018. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v3.x/stable-review/patch-3.18.107-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-3.18.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 3.18.107-rc1 Dan Carpenter cdrom: information leak in cdrom_ioctl_media_changed() Martin K. Petersen scsi: mptsas: Disable WRITE SAME Eric Dumazet ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy Cong Wang llc: delete timers synchronously in llc_sk_free() Eric Dumazet net: af_packet: fix race in PACKET_{R|T}X_RING Eric Dumazet tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets Willem de Bruijn packet: fix bitfield update race Cong Wang llc: fix NULL pointer deref for SOCK_ZAPPED Cong Wang llc: hold llc_sap before release_sock() Guillaume Nault pppoe: check sockaddr length in pppoe_connect() Xin Long team: fix netconsole setup over team Paolo Abeni team: avoid adding twice the same option to the event list Jann Horn tcp: don't read out-of-bounds opsize Guillaume Nault l2tp: check sockaddr length in pppol2tp_connect() Eric Biggers KEYS: DNS: limit the length of option strings Xin Long bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave Sahitya Tummala jbd2: fix use after free in kjournald2() Matthew Wilcox mm/filemap.c: fix NULL pointer in page_cache_tree_insert() Jiri Olsa perf: Return proper values for user stack errors Theodore Ts'o ext4: don't update checksum of new initialized bitmaps wangguang ext4: bugfix for mmaped pages in mpage_release_unused_pages() Theodore Ts'o ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() Xiaoming Gao x86/tsc: Prevent 32bit truncation in calc_hpet_ref() Steve French cifs: do not allow creating sockets except with SMB1 posix exensions ------------- Diffstat: Makefile | 4 +- arch/x86/kernel/tsc.c | 2 +- drivers/cdrom/cdrom.c | 2 +- drivers/message/fusion/mptsas.c | 1 + drivers/net/bonding/bond_main.c | 3 +- drivers/net/ppp/pppoe.c | 4 ++ drivers/net/team/team.c | 38 ++++++++++++++---- fs/cifs/dir.c | 9 +++-- fs/ext4/balloc.c | 3 +- fs/ext4/ialloc.c | 43 ++------------------ fs/ext4/inline.c | 66 ++++++++++++++----------------- fs/ext4/inode.c | 2 + fs/ext4/xattr.c | 30 ++++++-------- fs/ext4/xattr.h | 32 +++++++++++++++ fs/jbd2/journal.c | 2 +- include/net/llc_conn.h | 1 + kernel/events/core.c | 4 +- mm/filemap.c | 4 +- net/dns_resolver/dns_key.c | 13 +++--- net/ipv4/tcp.c | 6 ++- net/ipv4/tcp_input.c | 7 +--- net/ipv6/route.c | 2 + net/l2tp/l2tp_ppp.c | 7 ++++ net/llc/af_llc.c | 14 ++++++- net/llc/llc_c_ac.c | 9 +---- net/llc/llc_conn.c | 22 ++++++++++- net/packet/af_packet.c | 88 +++++++++++++++++++++++++++++------------ net/packet/internal.h | 10 ++--- 28 files changed, 254 insertions(+), 174 deletions(-)