[<prev] [next>] [day] [month] [year] [list]
Message-ID: <lsq.1591898928.276150302@decadent.org.uk>
Date: Thu, 11 Jun 2020 19:35:15 +0100
From: Ben Hutchings <ben@...adent.org.uk>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, Jiri Slaby <jslaby@...e.cz>,
stable@...r.kernel.org
Cc: lwn@....net
Subject: Linux 3.16.85
I'm announcing the release of the 3.16.85 kernel. This is probably
the last release in the 3.16 stable series, unless some critical fix
comes up later this month.
All users of the 3.16 kernel series should upgrade.
The updated 3.16.y git tree can be found at:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.16.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git
The diff from 3.16.84 is attached to this message.
Ben.
------------
Documentation/ABI/testing/sysfs-devices-system-cpu | 1 +
.../special-register-buffer-data-sampling.rst | 149 ++++
Documentation/kernel-parameters.txt | 20 +
Makefile | 2 +-
arch/x86/include/asm/acpi.h | 2 +-
arch/x86/include/asm/cpu_device_id.h | 27 +
arch/x86/include/asm/cpufeatures.h | 2 +
arch/x86/include/asm/processor.h | 2 +-
arch/x86/include/uapi/asm/msr-index.h | 4 +
arch/x86/kernel/amd_nb.c | 2 +-
arch/x86/kernel/asm-offsets_32.c | 2 +-
arch/x86/kernel/cpu/amd.c | 28 +-
arch/x86/kernel/cpu/bugs.c | 106 +++
arch/x86/kernel/cpu/centaur.c | 4 +-
arch/x86/kernel/cpu/common.c | 62 +-
arch/x86/kernel/cpu/cpu.h | 1 +
arch/x86/kernel/cpu/cyrix.c | 2 +-
arch/x86/kernel/cpu/intel.c | 18 +-
arch/x86/kernel/cpu/match.c | 7 +-
arch/x86/kernel/cpu/microcode/intel.c | 4 +-
arch/x86/kernel/cpu/mtrr/generic.c | 2 +-
arch/x86/kernel/cpu/mtrr/main.c | 4 +-
arch/x86/kernel/cpu/perf_event_intel.c | 2 +-
arch/x86/kernel/cpu/perf_event_intel_lbr.c | 2 +-
arch/x86/kernel/cpu/perf_event_p6.c | 2 +-
arch/x86/kernel/cpu/proc.c | 4 +-
arch/x86/kernel/head_32.S | 4 +-
arch/x86/kernel/mpparse.c | 2 +-
drivers/base/cpu.c | 8 +
drivers/char/hw_random/via-rng.c | 2 +-
drivers/char/random.c | 3 -
drivers/cpufreq/acpi-cpufreq.c | 2 +-
drivers/cpufreq/longhaul.c | 6 +-
drivers/cpufreq/p4-clockmod.c | 2 +-
drivers/cpufreq/powernow-k7.c | 2 +-
drivers/cpufreq/speedstep-centrino.c | 4 +-
drivers/cpufreq/speedstep-lib.c | 6 +-
drivers/crypto/padlock-aes.c | 2 +-
drivers/edac/amd64_edac.c | 2 +-
drivers/edac/mce_amd.c | 2 +-
drivers/hwmon/coretemp.c | 6 +-
drivers/hwmon/hwmon-vid.c | 2 +-
drivers/hwmon/k10temp.c | 2 +-
drivers/hwmon/k8temp.c | 2 +-
drivers/message/fusion/mptctl.c | 215 ++----
drivers/net/can/slcan.c | 4 +
drivers/net/slip/slip.c | 4 +
drivers/net/wireless/mwifiex/scan.c | 7 +
drivers/net/wireless/mwifiex/wmm.c | 4 +
drivers/scsi/sg.c | 758 +++++++++++----------
drivers/usb/core/message.c | 53 +-
drivers/usb/gadget/configfs.c | 3 +
drivers/video/fbdev/geode/video_gx.c | 2 +-
fs/binfmt_elf.c | 2 +-
fs/exec.c | 2 +-
fs/ext4/block_validity.c | 57 ++
fs/ext4/ext4.h | 19 +-
fs/ext4/extents.c | 13 +-
fs/ext4/inode.c | 5 +
include/linux/mod_devicetable.h | 6 +
include/linux/sched.h | 4 +-
include/scsi/sg.h | 1 -
kernel/signal.c | 2 +-
net/core/net-sysfs.c | 39 +-
security/selinux/hooks.c | 70 +-
65 files changed, 1102 insertions(+), 688 deletions(-)
Akinobu Mita (1):
sg: prevent integer overflow when converting from sectors to bytes
Alan Stern (1):
USB: core: Fix free-while-in-use bug in the USB S-Glibrary
Alexander Potapenko (1):
fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
Ben Hutchings (3):
scsi: sg: Change next_cmd_len handling to mirror upstream
scsi: sg: Re-fix off by one in sg_fill_request_table()
Linux 3.16.85
Colin Ian King (1):
ext4: unsigned int compared against zero
Dan Carpenter (3):
scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo()
scsi: mptfusion: Fix double fetch bug in ioctl
scsi: sg: off by one in sg_ioctl()
David Mosberger (2):
drivers: usb: core: Don't disable irqs in usb_sg_wait() during URB submit.
drivers: usb: core: Minimize irq disabling in usb_sg_cancel()
Douglas Gilbert (1):
sg: O_EXCL and other lock handling
Eric Dumazet (1):
net-sysfs: fix netdev_queue_add_kobject() breakage
Eric W. Biederman (1):
signal: Extend exec_id to 64bits
Hannes Reinecke (8):
scsi: sg: protect accesses to 'reserved' page array
scsi: sg: reset 'res_in_use' after unlinking reserved array
scsi: sg: remove 'save_scat_len'
scsi: sg: use standard lists for sg_requests
scsi: sg: factor out sg_fill_request_table()
scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE
scsi: sg: disable SET_FORCE_LOW_DMA
scsi: sg: close race condition in sg_remove_sfp_usercontext()
Jason A. Donenfeld (1):
random: always use batched entropy for get_random_u{32,64}
Jia Zhang (1):
x86/cpu: Rename cpu_data.x86_mask to cpu_data.x86_stepping
Johannes Thumshirn (5):
scsi: sg: check for valid direction before starting the request
scsi: sg: fix SG_DXFER_FROM_DEV transfers
scsi: sg: fix static checker warning in sg_is_valid_dxfer
scsi: sg: only check for dxfer_len greater than 256M
scsi: sg: don't return bogus Sg_requests
Josh Poimboeuf (1):
x86/speculation: Add Ivy Bridge to affected list
Jouni Hogander (7):
slcan: Fix memory leak in error path
can: slcan: Fix use-after-free Read in slcan_open
slip: Fix memory leak in slip_open error path
slip: Fix use-after-free Read in slip_open
net-sysfs: Fix reference count leak in rx|netdev_queue_add_kobject
net-sysfs: Call dev_hold always in netdev_queue_add_kobject
net-sysfs: Call dev_hold always in rx_queue_add_kobject
Kyungtae Kim (1):
USB: gadget: fix illegal array access in binding with UDC
Li Bin (1):
scsi: sg: add sg_remove_request in sg_common_write
Marek Milkovic (1):
selinux: Print 'sclass' as string when unrecognized netlink message occurs
Mark Gross (4):
x86/cpu: Add a steppings field to struct x86_cpu_id
x86/cpu: Add 'table' argument to cpu_matches()
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
x86/speculation: Add SRBDS vulnerability and mitigation documentation
Oliver Hartkopp (1):
slcan: not call free_netdev before rtnl_unlock in slcan_open
Paul Moore (1):
selinux: properly handle multiple messages in selinux_netlink_send()
Qing Xu (2):
mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
Richard Guy Briggs (2):
selinux: cleanup error reporting in selinux_nlmsg_perm()
selinux: convert WARN_ONCE() to printk() in selinux_nlmsg_perm()
Shijie Luo (1):
ext4: add cond_resched() to ext4_protect_reserved_inode
Tahsin Erdogan (1):
ext4: Make checks for metadata_csum feature safer
Theodore Ts'o (3):
ext4: protect journal inode's blocks using block_validity
ext4: fix block validity checks for journal inodes using indirect blocks
ext4: don't perform block validity checks on the journal inode
Todd Poynor (2):
scsi: sg: protect against races between mmap() and SG_SET_RESERVED_SIZE
scsi: sg: recheck MMAP_IO request length with lock held
Tony Battersby (1):
scsi: sg: fix minor memory leak in error path
Vladis Dronov (1):
selinux: rate-limit netlink message warnings in selinux_nlmsg_perm()
Wu Bo (1):
scsi: sg: add sg_remove_request in sg_write
yangerkun (1):
slip: not call free_netdev before rtnl_unlock in slip_open
View attachment "linux-3.16.85.patch" of type "text/x-diff" (135727 bytes)
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists