I'm announcing the release of the 4.4.82 kernel. All users of the 4.4 kernel series must upgrade. The updated 4.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary thanks, greg k-h ------------ Makefile | 2 +- arch/arm/kvm/mmu.c | 4 ++++ arch/s390/net/bpf_jit_comp.c | 3 ++- arch/sparc/include/asm/mmu_context_64.h | 14 +++++++++----- arch/sparc/kernel/tsb.S | 12 ++++++++++++ arch/sparc/power/hibernate.c | 3 +-- mm/mempool.c | 2 +- net/core/dev.c | 2 +- net/ipv4/ip_output.c | 8 +++++--- net/ipv4/tcp_input.c | 4 ++-- net/ipv4/tcp_output.c | 3 +++ net/ipv4/tcp_timer.c | 3 ++- net/ipv4/udp.c | 2 +- net/ipv4/udp_offload.c | 2 +- net/ipv6/ip6_output.c | 7 ++++--- net/ipv6/udp_offload.c | 2 +- net/packet/af_packet.c | 13 +++++++++---- net/sched/act_ipt.c | 2 +- 18 files changed, 60 insertions(+), 28 deletions(-) Daniel Borkmann (1): bpf, s390: fix jit branch offset related to ldimm64 Eric Dumazet (2): net: fix keepalive code vs TCP_FASTOPEN_CONNECT tcp: fastopen: tcp_connect() must refresh the route Greg Kroah-Hartman (3): revert "net: account for current skb length when deciding about UFO" revert "ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output" Linux 4.4.82 Matthew Dawson (1): mm/mempool: avoid KASAN marking mempool poison checks as use-after-free Michal Kubeček (1): net: account for current skb length when deciding about UFO Rob Gardner (1): sparc64: Prevent perf from running during super critical sections Suzuki K Poulose (1): KVM: arm/arm64: Handle hva aging while destroying the vm Willem de Bruijn (3): net: avoid skb_warn_bad_offload false positives on UFO packet: fix tp_reserve race in packet_set_ring udp: consistently apply ufo or fragmentation Xin Long (1): net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target Yuchung Cheng (1): tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states zheng li (1): ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output
Attachment:
signature.asc
Description: PGP signature