From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754901AbbAGBza (ORCPT ); Tue, 6 Jan 2015 20:55:30 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:46417 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932577AbbAGBwX (ORCPT ); Tue, 6 Jan 2015 20:52:23 -0500 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, satoru.takeuchi@gmail.com, shuah.kh@samsung.com, stable@vger.kernel.org Subject: [PATCH 3.10 00/38] 3.10.64-stable review Date: Tue, 6 Jan 2015 17:50:12 -0800 Message-Id: <20150107014952.440109372@linuxfoundation.org> X-Mailer: git-send-email 2.2.1 User-Agent: quilt/0.63-1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 3.10.64 release. There are 38 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri Jan 9 01:49:29 UTC 2015. Anything received after that time might be too late. The whole patch series can be found in one patch at: kernel.org/pub/linux/kernel/v3.0/stable-review/patch-3.10.64-rc1.gz and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 3.10.64-rc1 Filipe Manana Btrfs: fix fs corruption on transaction abort if device supports discard Josef Bacik Btrfs: do not move em to modified list when unpinning Michael Halcrow eCryptfs: Remove buggy and unnecessary write in file name decode routine Tyler Hicks eCryptfs: Force RO mount when encrypted view is enabled Jan Kara udf: Verify symlink size before loading it Oleg Nesterov exit: pidns: alloc_pid() leaks pid_namespace if child_reaper is exiting Jan Kara ncpfs: return proper error from NCP_IOC_SETROOT ioctl Rabin Vincent crypto: af_alg - fix backlog handling Eric W. Biederman userns: Unbreak the unprivileged remount tests Eric W. Biederman userns: Allow setting gid_maps without privilege when setgroups is disabled Eric W. Biederman userns: Add a knob to disable setgroups on a per user namespace basis Eric W. Biederman userns: Rename id_map_mutex to userns_state_mutex Eric W. Biederman userns: Only allow the creator of the userns unprivileged mappings Eric W. Biederman userns: Check euid no fsuid when establishing an unprivileged uid mapping Eric W. Biederman userns: Don't allow unprivileged creation of gid mappings Eric W. Biederman userns: Don't allow setgroups until a gid mapping has been setablished Eric W. Biederman userns: Document what the invariant required for safe unprivileged mappings. Eric W. Biederman groups: Consolidate the setgroups permission checks Eric W. Biederman umount: Disallow unprivileged mount force Eric W. Biederman mnt: Update unprivileged remount test Eric W. Biederman mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount Johannes Berg mac80211: free management frame keys when removing station Andreas Müller mac80211: fix multicast LED blinking and counter Takashi Iwai KEYS: Fix stale key registration at error path Jan Kara isofs: Fix unchecked printing of ER records Andy Lutomirski x86/tls: Don't validate lm in set_thread_area() after all Dan Carpenter dm space map metadata: fix sm_bootstrap_get_nr_blocks() Darrick J. Wong dm bufio: fix memleak when using a dm_buffer's inline bio Peng Tao nfs41: fix nfs4_proc_layoutget error handling Sumit.Saxena@avagotech.com megaraid_sas: corrected return of wait_event from abort frame path Baruch Siach mmc: block: add newline to sysfs display of force_ro Dmitry Eremin-Solenikov mfd: tc6393xb: Fail ohci suspend if full state restore is required NeilBrown md/bitmap: always wait for writes on unplug. Andy Lutomirski x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit Andy Lutomirski x86_64, switch_to(): Load TLS descriptors before switching DS and ES Andy Lutomirski x86/tls: Disallow unusual TLS segments Andy Lutomirski x86/tls: Validate TLS entries to protect espfix Jan Kara isofs: Fix infinite looping over CE entries ------------- Diffstat: Makefile | 4 +- arch/s390/kernel/compat_linux.c | 2 +- arch/x86/include/uapi/asm/ldt.h | 7 + arch/x86/kernel/kvm.c | 9 +- arch/x86/kernel/kvmclock.c | 1 - arch/x86/kernel/process_64.c | 101 +++++++--- arch/x86/kernel/tls.c | 39 ++++ crypto/af_alg.c | 3 + drivers/md/bitmap.c | 16 +- drivers/md/dm-bufio.c | 20 +- drivers/md/persistent-data/dm-space-map-metadata.c | 4 +- drivers/mfd/tc6393xb.c | 13 +- drivers/mmc/card/block.c | 2 +- drivers/scsi/megaraid/megaraid_sas_base.c | 2 +- fs/btrfs/disk-io.c | 6 - fs/btrfs/extent-tree.c | 10 +- fs/btrfs/extent_map.c | 2 - fs/ecryptfs/crypto.c | 1 - fs/ecryptfs/file.c | 12 -- fs/ecryptfs/main.c | 16 +- fs/isofs/rock.c | 9 + fs/namespace.c | 11 +- fs/ncpfs/ioctl.c | 1 - fs/nfs/nfs4proc.c | 6 +- fs/proc/base.c | 53 ++++++ fs/udf/symlink.c | 17 +- include/linux/cred.h | 1 + include/linux/user_namespace.h | 12 ++ kernel/groups.c | 11 +- kernel/pid.c | 2 + kernel/uid16.c | 2 +- kernel/user.c | 1 + kernel/user_namespace.c | 125 +++++++++++-- net/mac80211/key.c | 2 +- net/mac80211/rx.c | 11 +- security/keys/encrypted-keys/encrypted.c | 5 +- .../selftests/mount/unprivileged-remount-test.c | 204 +++++++++++++++++---- 37 files changed, 599 insertions(+), 144 deletions(-)