Hello, I've just released Linux 2.6.32.66. The patch and changelog will appear soon at the following locations: https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/ https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/patch-2.6.32.66.xz https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/patch-2.6.32.66.gz https://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.32/ChangeLog-2.6.32.66 The updated 2.6.32.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-2.6.32.y http://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-2.6.32.y The tree can be browsed on the gitweb interface: http://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/log/?h=linux-2.6.32.y Testing status (build/boot, OK/FAIL, otherwise not tested) : ARCH | CONFIGURATION --------+----------------------------------- | allmodconfig other-config x86_64 | build:OK boot:OK i386 | build:OK - Thanks to all reviewers, and to Greg for the final packaging. Willy --------- Makefile | 2 +- arch/x86/include/asm/desc.h | 20 ++++++--- arch/x86/include/asm/ldt.h | 7 ++++ arch/x86/include/asm/msr-index.h | 1 + arch/x86/kernel/apic/apic.c | 12 +++--- arch/x86/kernel/cpu/amd.c | 10 +++++ arch/x86/kernel/entry_64.S | 13 +++--- arch/x86/kernel/kvm.c | 9 ++++- arch/x86/kernel/kvmclock.c | 1 - arch/x86/kernel/tls.c | 62 +++++++++++++++++++++++++++- arch/x86/kernel/traps.c | 4 +- arch/x86/mm/mmap.c | 6 +-- arch/x86/vdso/vma.c | 36 ++++++++++++----- block/scsi_ioctl.c | 3 +- drivers/infiniband/core/umem.c | 8 ++++ drivers/infiniband/core/uverbs_main.c | 1 + drivers/net/ppp_deflate.c | 2 +- drivers/serial/samsung.c | 4 ++ drivers/spi/spidev.c | 5 ++- fs/binfmt_elf.c | 5 ++- fs/exec.c | 65 ++++++++++++++++++------------ fs/hfsplus/brec.c | 20 ++++----- fs/isofs/rock.c | 9 +++++ fs/lockd/mon.c | 6 +++ fs/ocfs2/file.c | 8 +++- fs/proc/task_mmu.c | 10 +++++ fs/splice.c | 8 +++- kernel/posix-timers.c | 1 + net/compat.c | 7 ++++ net/core/dev.c | 2 +- net/core/sysctl_net_core.c | 19 +++++++-- net/ipv4/fib_semantics.c | 2 +- net/ipv4/ip_forward.c | 3 ++ net/ipv4/ip_output.c | 3 +- net/ipv4/sysctl_net_ipv4.c | 13 ++++-- net/ipv4/tcp_output.c | 52 +++++++++++++----------- net/ipv6/ip6_output.c | 3 +- net/ipv6/ndisc.c | 9 ++++- net/llc/sysctl_net_llc.c | 8 ++-- net/netfilter/ipvs/ip_vs_ftp.c | 10 ++--- net/netfilter/nf_conntrack_proto_generic.c | 26 +++++++++++- net/rds/iw_rdma.c | 40 +++++++++--------- net/rds/sysctl.c | 4 +- net/rxrpc/ar-recvmsg.c | 2 +- net/sched/ematch.c | 1 + net/sctp/associola.c | 1 - net/sctp/auth.c | 2 - net/socket.c | 3 ++ sound/oss/sequencer.c | 12 +----- 49 files changed, 400 insertions(+), 160 deletions(-) Summary of changes from 2.6.32.65 to 2.6.32.66 ============================================== Al Viro (1): rxrpc: bogus MSG_PEEK test in rxrpc_recvmsg() Alexey Khoroshilov (1): sound/oss: fix deadlock in sequencer_ioctl(SNDCTL_SEQ_OUTOFBAND) Alexey Kodanev (1): net: sysctl_net_core: check SNDBUF and RCVBUF for min length Andy Lutomirski (9): x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs x86/tls: Validate TLS entries to protect espfix x86, tls, ldt: Stop checking lm in LDT_empty x86, tls: Interpret an all-zero struct user_desc as "no segment" x86/tls: Disallow unusual TLS segments x86/tls: Don't validate lm in set_thread_area() after all x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit x86_64, vdso: Fix the vdso address randomization algorithm x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization Ani Sinha (1): net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr struct from userland. Arnd Bergmann (1): rds: avoid potential stack overflow Ben Hutchings (1): splice: Apply generic position and size checks to each write Benjamin Coddington (1): lockd: Try to reconnect if statd has moved Borislav Petkov (1): x86, cpu, amd: Add workaround for family 16h, erratum 793 Catalin Marinas (1): net: compat: Update get_compat_msghdr() to match copy_msghdr_from_user() behaviour D.S. Ljungmark (1): ipv6: Don't reduce hop limit for an interface Dan Carpenter (1): ipvs: uninitialized data with IP_VS_IPV6 Daniel Borkmann (2): net: sctp: fix memory leak in auth key management net: sctp: fix slab corruption from use after free on INIT collisions Eli Cohen (1): IB/core: Avoid leakage from kernel to user space Eric Dumazet (2): tcp: make connect() mem charging friendly tcp: avoid looping in tcp_send_fin() Florian Westphal (2): netfilter: conntrack: disable generic tracking for known protocols ppp: deflate: never return len larger than output buffer Hector Marco-Gisbert (1): ASLR: fix stack randomization on 64-bit systems Ian Abbott (1): spi: spidev: fix possible arithmetic overflow for multi-transfer message Ignacy GawÄ?dzki (1): ematch: Fix auto-loading of ematch modules. Jan Kara (3): isofs: Fix infinite looping over CE entries isofs: Fix unchecked printing of ER records scsi: Fix error handling in SCSI_IOCTL_SEND_COMMAND Jann Horn (1): fs: take i_mutex during prepare_binprm for set[ug]id executables Jiri Pirko (1): ipv4: fix nexthop attlen check in fib_nh_match Kirill A. Shutemov (1): pagemap: do not leak physical addresses to non-privileged userspace Mathias Krause (1): posix-timers: Fix stack info leak in timer_create() Matthew Thode (1): net: reject creation of netdev names with colons Michal KubeÄ?ek (1): udp: only allow UFO for packets from SOCK_DGRAM sockets Robert Baldyga (1): serial: samsung: wait for transfer completion before clock disable Sasha Levin (2): net: llc: use correct size for sysctl timeout entries net: rds: use correct size for max unacked packets and bytes Sebastian Pöhn (1): ip_forward: Drop frames with attached skb->sk Sergei Antonov (1): hfsplus: fix B-tree corruption after insertion at position 0 Shachar Raindel (1): IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic Shai Fultheim (1): x86: Conditionally update time when ack-ing pending irqs Steffen Klassert (1): ipv4: Don't use ufo handling on later transformed packets Willy Tarreau (1): Linux 2.6.32.66 bingtian.ly@xxxxxxxxxx (1): net: avoid to hang up on sending due to sysctl configuration overflow. -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html