From: Willy Tarreau <w@1wt.eu>
To: linux-kernel@vger.kernel.org, stable@vger.kernel.org
Subject: [ 00/25] 2.6.32.65-longterm review
Date: Sat, 06 Dec 2014 18:41:48 +0100 [thread overview]
Message-ID: <20141206174148.394089034@1wt.eu> (raw)
In-Reply-To: <2a26e912d2438674771c36169c190830@local>
This is the start of the longterm review cycle for the 2.6.32.65 release.
All patches will be posted as a response to this one. If anyone has any
issue with these being applied, please let me know. If anyone is a
maintainer of the proper subsystem, and wants to add a Signed-off-by: line
to the patch, please respond with it.
Responses should be made by Fri Dec 12 12:00:00 CET 2014.
Anything received after that time might be too late. If someone
wants a bit more time for a deeper review, please let me know.
The whole patch series can be found in one patch at :
kernel.org/pub/linux/kernel/v2.6/longterm-review/patch-2.6.32.65-rc1.gz
The shortlog and diffstat are appended below.
Thanks,
Willy
===============
Andy Lutomirski (4):
x86_64/entry/xen: Do not invoke espfix64 on Xen
x86_64, traps: Stop using IST for #SS
x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
x86_64, traps: Rework bad_iret
Boris Ostrovsky (1):
x86/espfix/xen: Fix allocation of pages for paravirt page tables
Brian Gerst (1):
x86, 64-bit: Move K8 B step iret fixup to fault entry asm
Dan Carpenter (1):
ttusb-dec: buffer overflow in ioctl
Daniel Borkmann (3):
net: sctp: fix panic on duplicate ASCONF chunks
net: sctp: fix remote memory pressure from excessive queueing
net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet
H. Peter Anvin (7):
x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
x86-32, espfix: Remove filter for espfix32 due to race
x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack
x86, espfix: Move espfix definitions into a separate header file
x86, espfix: Fix broken header guard
x86, espfix: Make espfix64 a Kconfig option, fix UML
x86, espfix: Make it possible to disable 16-bit support
James Forshaw (1):
USB: whiteheat: Added bounds checking for bulk command response
Jan Beulich (1):
x86-64: Adjust frame type at paranoid_exit:
Jan Kara (1):
udf: Avoid infinite loop when processing indirect ICBs
Johannes Berg (1):
mac80211: fix fragmentation code, particularly for encryption
Lars-Peter Clausen (2):
ALSA: control: Don't access controls outside of protected regions
ALSA: control: Fix replacing user controls
Sasha Levin (1):
net/l2tp: don't fall back on UDP [get|set]sockopt
Willy Tarreau (1):
net: sendmsg: fix failed backport of "fix NULL pointer dereference"
Documentation/x86/x86_64/mm.txt | 2 +
arch/x86/Kconfig | 25 ++++++--
arch/x86/include/asm/irqflags.h | 2 +-
arch/x86/include/asm/page_32_types.h | 1 -
arch/x86/include/asm/page_64_types.h | 11 ++--
arch/x86/include/asm/pgtable_64_types.h | 2 +
arch/x86/include/asm/setup.h | 2 +
arch/x86/include/asm/uaccess.h | 1 -
arch/x86/kernel/Makefile | 1 +
arch/x86/kernel/dumpstack_64.c | 1 -
arch/x86/kernel/entry_32.S | 17 ++++--
arch/x86/kernel/entry_64.S | 98 ++++++++++++++++++++------------
arch/x86/kernel/ldt.c | 6 ++
arch/x86/kernel/paravirt_patch_64.c | 2 -
arch/x86/kernel/smpboot.c | 7 +++
arch/x86/kernel/traps.c | 67 +++++++++++++++++-----
arch/x86/mm/dump_pagetables.c | 38 +++++++++----
arch/x86/mm/extable.c | 31 ----------
drivers/media/dvb/ttusb-dec/ttusbdecfe.c | 3 +
drivers/net/pppol2tp.c | 4 +-
drivers/usb/serial/whiteheat.c | 7 ++-
fs/udf/inode.c | 35 +++++++-----
include/net/sctp/sctp.h | 5 ++
init/main.c | 4 ++
net/compat.c | 2 +-
net/mac80211/tx.c | 2 +-
net/sctp/associola.c | 2 +
net/sctp/inqueue.c | 33 +++--------
net/sctp/sm_make_chunk.c | 3 +
net/sctp/sm_statefuns.c | 3 +
sound/core/control.c | 31 +++++-----
31 files changed, 274 insertions(+), 174 deletions(-)
--
next prev parent reply other threads:[~2014-12-06 18:01 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-12-06 17:41 [ 01/25] net: sendmsg: fix failed backport of "fix NULL pointer dereference" Willy Tarreau
2014-12-06 17:41 ` Willy Tarreau [this message]
2014-12-08 0:58 ` [ 00/25] 2.6.32.65-longterm review Willy Tarreau
2014-12-06 17:41 ` [ 01/25] net: sendmsg: fix failed backport of "fix NULL pointer dereference" Willy Tarreau
2014-12-06 17:41 ` [ 02/25] x86, 64-bit: Move K8 B step iret fixup to fault entry asm Willy Tarreau
2014-12-06 17:41 ` [ 03/25] x86-64: Adjust frame type at paranoid_exit: Willy Tarreau
2014-12-06 17:41 ` [ 04/25] x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels Willy Tarreau
2014-12-06 17:41 ` [ 05/25] x86-32, espfix: Remove filter for espfix32 due to race Willy Tarreau
2014-12-06 17:41 ` [ 06/25] x86-64, espfix: Dont leak bits 31:16 of %esp returning to 16-bit stack Willy Tarreau
2014-12-06 17:41 ` [ 07/25] x86, espfix: Move espfix definitions into a separate header file Willy Tarreau
2014-12-06 17:41 ` [ 08/25] x86, espfix: Fix broken header guard Willy Tarreau
2014-12-06 17:41 ` [ 09/25] x86, espfix: Make espfix64 a Kconfig option, fix UML Willy Tarreau
2014-12-06 17:41 ` [ 10/25] x86, espfix: Make it possible to disable 16-bit support Willy Tarreau
2014-12-08 2:58 ` Ben Hutchings
2014-12-08 7:11 ` Willy Tarreau
2014-12-06 17:41 ` [ 11/25] x86_64/entry/xen: Do not invoke espfix64 on Xen Willy Tarreau
2014-12-06 17:42 ` [ 12/25] x86/espfix/xen: Fix allocation of pages for paravirt page tables Willy Tarreau
2014-12-06 17:42 ` [ 13/25] x86_64, traps: Stop using IST for #SS Willy Tarreau
2014-12-06 17:42 ` [ 14/25] x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C Willy Tarreau
2014-12-06 17:42 ` [ 15/25] x86_64, traps: Rework bad_iret Willy Tarreau
2014-12-06 17:42 ` [ 16/25] net/l2tp: dont fall back on UDP [get|set]sockopt Willy Tarreau
2014-12-06 17:42 ` [ 17/25] ALSA: control: Dont access controls outside of protected regions Willy Tarreau
2014-12-06 17:42 ` [ 18/25] ALSA: control: Fix replacing user controls Willy Tarreau
2014-12-06 17:42 ` [ 19/25] USB: whiteheat: Added bounds checking for bulk command response Willy Tarreau
2014-12-06 17:42 ` [ 20/25] net: sctp: fix panic on duplicate ASCONF chunks Willy Tarreau
2014-12-06 17:42 ` [ 21/25] net: sctp: fix remote memory pressure from excessive queueing Willy Tarreau
2014-12-06 17:42 ` [ 22/25] udf: Avoid infinite loop when processing indirect ICBs Willy Tarreau
2014-12-06 17:42 ` [ 23/25] net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet Willy Tarreau
2014-12-06 17:42 ` [ 24/25] mac80211: fix fragmentation code, particularly for encryption Willy Tarreau
2014-12-06 17:42 ` [ 25/25] ttusb-dec: buffer overflow in ioctl Willy Tarreau
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20141206174148.394089034@1wt.eu \
--to=w@1wt.eu \
--cc=linux-kernel@vger.kernel.org \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.