Linux 2.6.32.66

From: Willy Tarreau
Date: Sun May 24 2015 - 18:22:06 EST


Hello,

I've just released Linux 2.6.32.66.

The patch and changelog will appear soon at the following locations:
https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/
https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/patch-2.6.32.66.xz
https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/patch-2.6.32.66.gz
https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/ChangeLog-2.6.32.66

The updated 2.6.32.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-2.6.32.y
http://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-2.6.32.y

The tree can be browsed on the gitweb interface:
http://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/log/?h=linux-2.6.32.y

Testing status (build/boot, OK/FAIL, otherwise not tested) :

ARCH | CONFIGURATION
--------+-----------------------------------
| allmodconfig other-config
x86_64 | build:OK boot:OK
i386 | build:OK -

Thanks to all reviewers, and to Greg for the final packaging.
Willy

---------
Makefile | 2 +-
arch/x86/include/asm/desc.h | 20 ++++++---
arch/x86/include/asm/ldt.h | 7 ++++
arch/x86/include/asm/msr-index.h | 1 +
arch/x86/kernel/apic/apic.c | 12 +++---
arch/x86/kernel/cpu/amd.c | 10 +++++
arch/x86/kernel/entry_64.S | 13 +++---
arch/x86/kernel/kvm.c | 9 ++++-
arch/x86/kernel/kvmclock.c | 1 -
arch/x86/kernel/tls.c | 62 +++++++++++++++++++++++++++-
arch/x86/kernel/traps.c | 4 +-
arch/x86/mm/mmap.c | 6 +--
arch/x86/vdso/vma.c | 36 ++++++++++++-----
block/scsi_ioctl.c | 3 +-
drivers/infiniband/core/umem.c | 8 ++++
drivers/infiniband/core/uverbs_main.c | 1 +
drivers/net/ppp_deflate.c | 2 +-
drivers/serial/samsung.c | 4 ++
drivers/spi/spidev.c | 5 ++-
fs/binfmt_elf.c | 5 ++-
fs/exec.c | 65 ++++++++++++++++++------------
fs/hfsplus/brec.c | 20 ++++-----
fs/isofs/rock.c | 9 +++++
fs/lockd/mon.c | 6 +++
fs/ocfs2/file.c | 8 +++-
fs/proc/task_mmu.c | 10 +++++
fs/splice.c | 8 +++-
kernel/posix-timers.c | 1 +
net/compat.c | 7 ++++
net/core/dev.c | 2 +-
net/core/sysctl_net_core.c | 19 +++++++--
net/ipv4/fib_semantics.c | 2 +-
net/ipv4/ip_forward.c | 3 ++
net/ipv4/ip_output.c | 3 +-
net/ipv4/sysctl_net_ipv4.c | 13 ++++--
net/ipv4/tcp_output.c | 52 +++++++++++++-----------
net/ipv6/ip6_output.c | 3 +-
net/ipv6/ndisc.c | 9 ++++-
net/llc/sysctl_net_llc.c | 8 ++--
net/netfilter/ipvs/ip_vs_ftp.c | 10 ++---
net/netfilter/nf_conntrack_proto_generic.c | 26 +++++++++++-
net/rds/iw_rdma.c | 40 +++++++++---------
net/rds/sysctl.c | 4 +-
net/rxrpc/ar-recvmsg.c | 2 +-
net/sched/ematch.c | 1 +
net/sctp/associola.c | 1 -
net/sctp/auth.c | 2 -
net/socket.c | 3 ++
sound/oss/sequencer.c | 12 +-----
49 files changed, 400 insertions(+), 160 deletions(-)

Summary of changes from 2.6.32.65 to 2.6.32.66
==============================================
Al Viro (1):
rxrpc: bogus MSG_PEEK test in rxrpc_recvmsg()

Alexey Khoroshilov (1):
sound/oss: fix deadlock in sequencer_ioctl(SNDCTL_SEQ_OUTOFBAND)

Alexey Kodanev (1):
net: sysctl_net_core: check SNDBUF and RCVBUF for min length

Andy Lutomirski (9):
x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs
x86/tls: Validate TLS entries to protect espfix
x86, tls, ldt: Stop checking lm in LDT_empty
x86, tls: Interpret an all-zero struct user_desc as "no segment"
x86/tls: Disallow unusual TLS segments
x86/tls: Don't validate lm in set_thread_area() after all
x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
x86_64, vdso: Fix the vdso address randomization algorithm
x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization

Ani Sinha (1):
net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland.

Arnd Bergmann (1):
rds: avoid potential stack overflow

Ben Hutchings (1):
splice: Apply generic position and size checks to each write

Benjamin Coddington (1):
lockd: Try to reconnect if statd has moved

Borislav Petkov (1):
x86, cpu, amd: Add workaround for family 16h, erratum 793

Catalin Marinas (1):
net: compat: Update get_compat_msghdr() to match copy_msghdr_from_user() behaviour

D.S. Ljungmark (1):
ipv6: Don't reduce hop limit for an interface

Dan Carpenter (1):
ipvs: uninitialized data with IP_VS_IPV6

Daniel Borkmann (2):
net: sctp: fix memory leak in auth key management
net: sctp: fix slab corruption from use after free on INIT collisions

Eli Cohen (1):
IB/core: Avoid leakage from kernel to user space

Eric Dumazet (2):
tcp: make connect() mem charging friendly
tcp: avoid looping in tcp_send_fin()

Florian Westphal (2):
netfilter: conntrack: disable generic tracking for known protocols
ppp: deflate: never return len larger than output buffer

Hector Marco-Gisbert (1):
ASLR: fix stack randomization on 64-bit systems

Ian Abbott (1):
spi: spidev: fix possible arithmetic overflow for multi-transfer message

Ignacy GawÄ?dzki (1):
ematch: Fix auto-loading of ematch modules.

Jan Kara (3):
isofs: Fix infinite looping over CE entries
isofs: Fix unchecked printing of ER records
scsi: Fix error handling in SCSI_IOCTL_SEND_COMMAND

Jann Horn (1):
fs: take i_mutex during prepare_binprm for set[ug]id executables

Jiri Pirko (1):
ipv4: fix nexthop attlen check in fib_nh_match

Kirill A. Shutemov (1):
pagemap: do not leak physical addresses to non-privileged userspace

Mathias Krause (1):
posix-timers: Fix stack info leak in timer_create()

Matthew Thode (1):
net: reject creation of netdev names with colons

Michal KubeÄ?ek (1):
udp: only allow UFO for packets from SOCK_DGRAM sockets

Robert Baldyga (1):
serial: samsung: wait for transfer completion before clock disable

Sasha Levin (2):
net: llc: use correct size for sysctl timeout entries
net: rds: use correct size for max unacked packets and bytes

Sebastian Pöhn (1):
ip_forward: Drop frames with attached skb->sk

Sergei Antonov (1):
hfsplus: fix B-tree corruption after insertion at position 0

Shachar Raindel (1):
IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic

Shai Fultheim (1):
x86: Conditionally update time when ack-ing pending irqs

Steffen Klassert (1):
ipv4: Don't use ufo handling on later transformed packets

Willy Tarreau (1):
Linux 2.6.32.66

bingtian.ly@xxxxxxxxxx (1):
net: avoid to hang up on sending due to sysctl configuration overflow.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/