lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <lsq.1498561833.742501160@decadent.org.uk>
Date:   Tue, 27 Jun 2017 12:10:33 +0100
From:   Ben Hutchings <ben@...adent.org.uk>
To:     linux-kernel@...r.kernel.org, stable@...r.kernel.org
CC:     torvalds@...ux-foundation.org, Guenter Roeck <linux@...ck-us.net>,
        akpm@...ux-foundation.org
Subject: [PATCH 3.16 0/7] 3.16.45-rc1 review

This is the start of the stable review cycle for the 3.16.45 release.
There are 7 patches in this series, which will be posted as responses
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Thu Jun 29 11:10:33 UTC 2017.
Anything received after that time might be too late.

A combined patch relative to 3.16.44 will be posted as an additional
response to this.  A shortlog and diffstat can be found below.

Ben.

-------------

David Howells (1):
      rxrpc: Fix several cases where a padded len isn't checked in ticket decode
         [5f2f97656ada8d811d3c1bef503ced266fcd53a0]

Helge Deller (1):
      Allow stack to grow up to address space limit
         [bd726c90b6b8ce87602208701b208a208e6d5600]

Hugh Dickins (2):
      mm: fix new crash in unmapped_area_topdown()
         [f4cb767d76cf7ee72f97dd76f6cfa6c76a5edc89]
      mm: larger stack guard gap, between vmas
         [1be7107fbe18eed3e319a6c3e83c78254b693acb]

Paolo Bonzini (1):
      KVM: x86: fix singlestepping over syscall
         [c8401dda2f0a00cd25c0af6a95ed50e478d25de4]

Seung-Woo Kim (1):
      regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing
         [60a2362f769cf549dc466134efe71c8bf9fbaaba]

Vladis Dronov (1):
      drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()
         [ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf]

 Documentation/kernel-parameters.txt     |   7 ++
 Makefile                                |   4 +-
 arch/arc/mm/mmap.c                      |   2 +-
 arch/arm/mm/mmap.c                      |   4 +-
 arch/frv/mm/elf-fdpic.c                 |   2 +-
 arch/mips/mm/mmap.c                     |   2 +-
 arch/parisc/kernel/sys_parisc.c         |  15 +--
 arch/powerpc/mm/slice.c                 |   2 +-
 arch/sh/mm/mmap.c                       |   4 +-
 arch/sparc/kernel/sys_sparc_64.c        |   4 +-
 arch/sparc/mm/hugetlbpage.c             |   2 +-
 arch/tile/mm/hugetlbpage.c              |   2 +-
 arch/x86/include/asm/kvm_emulate.h      |   1 +
 arch/x86/kernel/sys_x86_64.c            |   4 +-
 arch/x86/kvm/emulate.c                  |   1 +
 arch/x86/kvm/x86.c                      |  53 +++++------
 arch/x86/mm/hugetlbpage.c               |   2 +-
 arch/xtensa/kernel/syscall.c            |   2 +-
 drivers/gpu/drm/vmwgfx/vmwgfx_surface.c |   3 +
 drivers/regulator/core.c                |   2 +
 fs/hugetlbfs/inode.c                    |   2 +-
 fs/proc/task_mmu.c                      |   4 -
 include/linux/mm.h                      |  53 +++++------
 mm/gup.c                                |   5 -
 mm/memory.c                             |  38 --------
 mm/mmap.c                               | 160 +++++++++++++++++++-------------
 net/rxrpc/ar-key.c                      |  64 +++++++------
 27 files changed, 220 insertions(+), 224 deletions(-)

-- 
Ben Hutchings
Absolutum obsoletum. (If it works, it's out of date.) - Stafford Beer

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ