1. 22 8月, 2023 2 次提交
  2. 21 8月, 2023 10 次提交
  3. 17 8月, 2023 15 次提交
  4. 16 8月, 2023 5 次提交
  5. 15 8月, 2023 7 次提交
    • J
      net: nfc: Fix use-after-free in local_cleanup() · 4c9c3297
      Jisoo Jang 提交于
      stable inclusion
      from stable-v5.10.166
      commit ad1baab3a5c03692d22ce446f38596a126377f6a
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7TH9O
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ad1baab3a5c03692d22ce446f38596a126377f6a
      
      --------------------------------
      
      [ Upstream commit 4bb4db7f ]
      
      Fix a use-after-free that occurs in kfree_skb() called from
      local_cleanup(). This could happen when killing nfc daemon (e.g. neard)
      after detaching an nfc device.
      When detaching an nfc device, local_cleanup() called from
      nfc_llcp_unregister_device() frees local->rx_pending and decreases
      local->ref by kref_put() in nfc_llcp_local_put().
      In the terminating process, nfc daemon releases all sockets and it leads
      to decreasing local->ref. After the last release of local->ref,
      local_cleanup() called from local_release() frees local->rx_pending
      again, which leads to the bug.
      
      Setting local->rx_pending to NULL in local_cleanup() could prevent
      use-after-free when local_cleanup() is called twice.
      
      Found by a modified version of syzkaller.
      
      BUG: KASAN: use-after-free in kfree_skb()
      
      Call Trace:
      dump_stack_lvl (lib/dump_stack.c:106)
      print_address_description.constprop.0.cold (mm/kasan/report.c:306)
      kasan_check_range (mm/kasan/generic.c:189)
      kfree_skb (net/core/skbuff.c:955)
      local_cleanup (net/nfc/llcp_core.c:159)
      nfc_llcp_local_put.part.0 (net/nfc/llcp_core.c:172)
      nfc_llcp_local_put (net/nfc/llcp_core.c:181)
      llcp_sock_destruct (net/nfc/llcp_sock.c:959)
      __sk_destruct (net/core/sock.c:2133)
      sk_destruct (net/core/sock.c:2181)
      __sk_free (net/core/sock.c:2192)
      sk_free (net/core/sock.c:2203)
      llcp_sock_release (net/nfc/llcp_sock.c:646)
      __sock_release (net/socket.c:650)
      sock_close (net/socket.c:1365)
      __fput (fs/file_table.c:306)
      task_work_run (kernel/task_work.c:179)
      ptrace_notify (kernel/signal.c:2354)
      syscall_exit_to_user_mode_prepare (kernel/entry/common.c:278)
      syscall_exit_to_user_mode (kernel/entry/common.c:296)
      do_syscall_64 (arch/x86/entry/common.c:86)
      entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:106)
      
      Allocated by task 4719:
      kasan_save_stack (mm/kasan/common.c:45)
      __kasan_slab_alloc (mm/kasan/common.c:325)
      slab_post_alloc_hook (mm/slab.h:766)
      kmem_cache_alloc_node (mm/slub.c:3497)
      __alloc_skb (net/core/skbuff.c:552)
      pn533_recv_response (drivers/nfc/pn533/usb.c:65)
      __usb_hcd_giveback_urb (drivers/usb/core/hcd.c:1671)
      usb_giveback_urb_bh (drivers/usb/core/hcd.c:1704)
      tasklet_action_common.isra.0 (kernel/softirq.c:797)
      __do_softirq (kernel/softirq.c:571)
      
      Freed by task 1901:
      kasan_save_stack (mm/kasan/common.c:45)
      kasan_set_track (mm/kasan/common.c:52)
      kasan_save_free_info (mm/kasan/genericdd.c:518)
      __kasan_slab_free (mm/kasan/common.c:236)
      kmem_cache_free (mm/slub.c:3809)
      kfree_skbmem (net/core/skbuff.c:874)
      kfree_skb (net/core/skbuff.c:931)
      local_cleanup (net/nfc/llcp_core.c:159)
      nfc_llcp_unregister_device (net/nfc/llcp_core.c:1617)
      nfc_unregister_device (net/nfc/core.c:1179)
      pn53x_unregister_nfc (drivers/nfc/pn533/pn533.c:2846)
      pn533_usb_disconnect (drivers/nfc/pn533/usb.c:579)
      usb_unbind_interface (drivers/usb/core/driver.c:458)
      device_release_driver_internal (drivers/base/dd.c:1279)
      bus_remove_device (drivers/base/bus.c:529)
      device_del (drivers/base/core.c:3665)
      usb_disable_device (drivers/usb/core/message.c:1420)
      usb_disconnect (drivers/usb/core.c:2261)
      hub_event (drivers/usb/core/hub.c:5833)
      process_one_work (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:212 include/trace/events/workqueue.h:108 kernel/workqueue.c:2281)
      worker_thread (include/linux/list.h:282 kernel/workqueue.c:2423)
      kthread (kernel/kthread.c:319)
      ret_from_fork (arch/x86/entry/entry_64.S:301)
      
      Fixes: 3536da06 ("NFC: llcp: Clean local timers and works when removing a device")
      Signed-off-by: NJisoo Jang <jisoo.jang@yonsei.ac.kr>
      Link: https://lore.kernel.org/r/20230111131914.3338838-1-jisoo.jang@yonsei.ac.krSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      Signed-off-by: NSasha Levin <sashal@kernel.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      4c9c3297
    • E
      Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()" · a303201f
      Eric Dumazet 提交于
      stable inclusion
      from stable-v5.10.165
      commit 71e5cd1018d345e649e63f74a56c1897f99db7e9
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7T7G4
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=71e5cd1018d345e649e63f74a56c1897f99db7e9
      
      --------------------------------
      
      commit 80f8a66d upstream.
      
      This reverts commit 13e5afd3.
      
      ieee80211_if_free() is already called from free_netdev(ndev)
      because ndev->priv_destructor == ieee80211_if_free
      
      syzbot reported:
      
      general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN
      KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
      CPU: 0 PID: 10041 Comm: syz-executor.0 Not tainted 6.2.0-rc2-syzkaller-00388-g55b98837 #0
      Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
      RIP: 0010:pcpu_get_page_chunk mm/percpu.c:262 [inline]
      RIP: 0010:pcpu_chunk_addr_search mm/percpu.c:1619 [inline]
      RIP: 0010:free_percpu mm/percpu.c:2271 [inline]
      RIP: 0010:free_percpu+0x186/0x10f0 mm/percpu.c:2254
      Code: 80 3c 02 00 0f 85 f5 0e 00 00 48 8b 3b 48 01 ef e8 cf b3 0b 00 48 ba 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 3b 0e 00 00 48 8b 58 20 48 b8 00 00 00 00 00 fc
      RSP: 0018:ffffc90004ba7068 EFLAGS: 00010002
      RAX: 0000000000000000 RBX: ffff88823ffe2b80 RCX: 0000000000000004
      RDX: dffffc0000000000 RSI: ffffffff81c1f4e7 RDI: 0000000000000020
      RBP: ffffe8fffe8fc220 R08: 0000000000000005 R09: 0000000000000000
      R10: 0000000000000000 R11: 1ffffffff2179ab2 R12: ffff8880b983d000
      R13: 0000000000000003 R14: 0000607f450fc220 R15: ffff88823ffe2988
      FS: 00007fcb349de700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
      CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      CR2: 0000001b32220000 CR3: 000000004914f000 CR4: 00000000003506f0
      DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
      DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
      Call Trace:
      <TASK>
      netdev_run_todo+0x6bf/0x1100 net/core/dev.c:10352
      ieee80211_register_hw+0x2663/0x4040 net/mac80211/main.c:1411
      mac80211_hwsim_new_radio+0x2537/0x4d80 drivers/net/wireless/mac80211_hwsim.c:4583
      hwsim_new_radio_nl+0xa09/0x10f0 drivers/net/wireless/mac80211_hwsim.c:5176
      genl_family_rcv_msg_doit.isra.0+0x1e6/0x2d0 net/netlink/genetlink.c:968
      genl_family_rcv_msg net/netlink/genetlink.c:1048 [inline]
      genl_rcv_msg+0x4ff/0x7e0 net/netlink/genetlink.c:1065
      netlink_rcv_skb+0x165/0x440 net/netlink/af_netlink.c:2564
      genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
      netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
      netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1356
      netlink_sendmsg+0x91b/0xe10 net/netlink/af_netlink.c:1932
      sock_sendmsg_nosec net/socket.c:714 [inline]
      sock_sendmsg+0xd3/0x120 net/socket.c:734
      ____sys_sendmsg+0x712/0x8c0 net/socket.c:2476
      ___sys_sendmsg+0x110/0x1b0 net/socket.c:2530
      __sys_sendmsg+0xf7/0x1c0 net/socket.c:2559
      do_syscall_x64 arch/x86/entry/common.c:50 [inline]
      do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
      entry_SYSCALL_64_after_hwframe+0x63/0xcd
      Reported-by: Nsyzbot <syzkaller@googlegroups.com>
      Fixes: 13e5afd3 ("wifi: mac80211: fix memory leak in ieee80211_if_add()")
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Cc: Zhengchao Shao <shaozhengchao@huawei.com>
      Cc: Johannes Berg <johannes.berg@intel.com>
      Signed-off-by: NKalle Valo <kvalo@kernel.org>
      Link: https://lore.kernel.org/r/20230113124326.3533978-1-edumazet@google.comSigned-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      a303201f
    • A
      wifi: mac80211: sdata can be NULL during AMPDU start · 288bc91a
      Alexander Wetzel 提交于
      stable inclusion
      from stable-v5.10.165
      commit 187523fa7c2d4c780f775cb869216865c4a909ef
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7T7G4
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=187523fa7c2d4c780f775cb869216865c4a909ef
      
      --------------------------------
      
      commit 69403bad upstream.
      
      ieee80211_tx_ba_session_handle_start() may get NULL for sdata when a
      deauthentication is ongoing.
      
      Here a trace triggering the race with the hostapd test
      multi_ap_fronthaul_on_ap:
      
      (gdb) list *drv_ampdu_action+0x46
      0x8b16 is in drv_ampdu_action (net/mac80211/driver-ops.c:396).
      391             int ret = -EOPNOTSUPP;
      392
      393             might_sleep();
      394
      395             sdata = get_bss_sdata(sdata);
      396             if (!check_sdata_in_driver(sdata))
      397                     return -EIO;
      398
      399             trace_drv_ampdu_action(local, sdata, params);
      400
      
      wlan0: moving STA 02:00:00:00:03:00 to state 3
      wlan0: associated
      wlan0: deauthenticating from 02:00:00:00:03:00 by local choice (Reason: 3=DEAUTH_LEAVING)
      wlan3.sta1: Open BA session requested for 02:00:00:00:00:00 tid 0
      wlan3.sta1: dropped frame to 02:00:00:00:00:00 (unauthorized port)
      wlan0: moving STA 02:00:00:00:03:00 to state 2
      wlan0: moving STA 02:00:00:00:03:00 to state 1
      wlan0: Removed STA 02:00:00:00:03:00
      wlan0: Destroyed STA 02:00:00:00:03:00
      BUG: unable to handle page fault for address: fffffffffffffb48
      PGD 11814067 P4D 11814067 PUD 11816067 PMD 0
      Oops: 0000 [#1] PREEMPT SMP PTI
      CPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted: G        W          6.1.0-rc8-wt+ #59
      Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
      Workqueue: phy3 ieee80211_ba_session_work [mac80211]
      RIP: 0010:drv_ampdu_action+0x46/0x280 [mac80211]
      Code: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 eb 10 0e 00 00 <8b> 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85
      RSP: 0018:ffffc900025ebd20 EFLAGS: 00010287
      RAX: 0000000000000000 RBX: fffffffffffff1f0 RCX: ffff888102228240
      RDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40
      RBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001
      R10: 0000000000000001 R11: 0000000000000000 R12: ffff888118c18ec0
      R13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8
      FS:  0000000000000000(0000) GS:ffff88817a600000(0000) knlGS:0000000000000000
      CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      CR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0
      Call Trace:
       <TASK>
       ieee80211_tx_ba_session_handle_start+0xd0/0x190 [mac80211]
       ieee80211_ba_session_work+0xff/0x2e0 [mac80211]
       process_one_work+0x29f/0x620
       worker_thread+0x4d/0x3d0
       ? process_one_work+0x620/0x620
       kthread+0xfb/0x120
       ? kthread_complete_and_exit+0x20/0x20
       ret_from_fork+0x22/0x30
       </TASK>
      Signed-off-by: NAlexander Wetzel <alexander@wetzel-home.de>
      Link: https://lore.kernel.org/r/20221230121850.218810-2-alexander@wetzel-home.de
      Cc: stable@vger.kernel.org
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      288bc91a
    • D
      net/ethtool/ioctl: return -EOPNOTSUPP if we have no phy stats · 7d2bd999
      Daniil Tatianin 提交于
      stable inclusion
      from stable-v5.10.165
      commit 0040e48492f375a63ab68df35be4d228e64b41c8
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7T7G4
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0040e48492f375a63ab68df35be4d228e64b41c8
      
      --------------------------------
      
      [ Upstream commit 9deb1e9f ]
      
      It's not very useful to copy back an empty ethtool_stats struct and
      return 0 if we didn't actually have any stats. This also allows for
      further simplification of this function in the future commits.
      Signed-off-by: NDaniil Tatianin <d-tatianin@yandex-team.ru>
      Reviewed-by: NAndrew Lunn <andrew@lunn.ch>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      Signed-off-by: NSasha Levin <sashal@kernel.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      7d2bd999
    • I
      net/sched: act_mpls: Fix warning during failed attribute validation · ec007970
      Ido Schimmel 提交于
      stable inclusion
      from stable-v5.10.164
      commit 453277feb41c2235cf2c0de9209eef962c401457
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7T7G4
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=453277feb41c2235cf2c0de9209eef962c401457
      
      --------------------------------
      
      [ Upstream commit 9e17f992 ]
      
      The 'TCA_MPLS_LABEL' attribute is of 'NLA_U32' type, but has a
      validation type of 'NLA_VALIDATE_FUNCTION'. This is an invalid
      combination according to the comment above 'struct nla_policy':
      
      "
      Meaning of `validate' field, use via NLA_POLICY_VALIDATE_FN:
         NLA_BINARY           Validation function called for the attribute.
         All other            Unused - but note that it's a union
      "
      
      This can trigger the warning [1] in nla_get_range_unsigned() when
      validation of the attribute fails. Despite being of 'NLA_U32' type, the
      associated 'min'/'max' fields in the policy are negative as they are
      aliased by the 'validate' field.
      
      Fix by changing the attribute type to 'NLA_BINARY' which is consistent
      with the above comment and all other users of NLA_POLICY_VALIDATE_FN().
      As a result, move the length validation to the validation function.
      
      No regressions in MPLS tests:
      
       # ./tdc.py -f tc-tests/actions/mpls.json
       [...]
       # echo $?
       0
      
      [1]
      WARNING: CPU: 0 PID: 17743 at lib/nlattr.c:118
      nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
      Modules linked in:
      CPU: 0 PID: 17743 Comm: syz-executor.0 Not tainted 6.1.0-rc8 #3
      Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
      rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014
      RIP: 0010:nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
      [...]
      Call Trace:
       <TASK>
       __netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310
       netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411
       netlink_ack_tlv_fill net/netlink/af_netlink.c:2454 [inline]
       netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506
       netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546
       rtnetlink_rcv+0x18/0x20 net/core/rtnetlink.c:6109
       netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
       netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345
       netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921
       sock_sendmsg_nosec net/socket.c:714 [inline]
       sock_sendmsg net/socket.c:734 [inline]
       ____sys_sendmsg+0x38f/0x500 net/socket.c:2482
       ___sys_sendmsg net/socket.c:2536 [inline]
       __sys_sendmsg+0x197/0x230 net/socket.c:2565
       __do_sys_sendmsg net/socket.c:2574 [inline]
       __se_sys_sendmsg net/socket.c:2572 [inline]
       __x64_sys_sendmsg+0x42/0x50 net/socket.c:2572
       do_syscall_x64 arch/x86/entry/common.c:50 [inline]
       do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
       entry_SYSCALL_64_after_hwframe+0x63/0xcd
      
      Link: https://lore.kernel.org/netdev/CAO4mrfdmjvRUNbDyP0R03_DrD_eFCLCguz6OxZ2TYRSv0K9gxA@mail.gmail.com/
      Fixes: 2a2ea508 ("net: sched: add mpls manipulation actions to TC")
      Reported-by: NWei Chen <harperchen1110@gmail.com>
      Tested-by: NWei Chen <harperchen1110@gmail.com>
      Signed-off-by: NIdo Schimmel <idosch@nvidia.com>
      Reviewed-by: NAlexander Duyck <alexanderduyck@fb.com>
      Link: https://lore.kernel.org/r/20230107171004.608436-1-idosch@nvidia.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      Signed-off-by: NSasha Levin <sashal@kernel.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      ec007970
    • T
      tipc: fix unexpected link reset due to discovery messages · cb194caf
      Tung Nguyen 提交于
      stable inclusion
      from stable-v5.10.164
      commit 0d0675bc33e655297562681200b06fafa5eb7ed8
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7T7G4
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0d0675bc33e655297562681200b06fafa5eb7ed8
      
      --------------------------------
      
      [ Upstream commit c244c092 ]
      
      This unexpected behavior is observed:
      
      node 1                    | node 2
      ------                    | ------
      link is established       | link is established
      reboot                    | link is reset
      up                        | send discovery message
      receive discovery message |
      link is established       | link is established
      send discovery message    |
                                | receive discovery message
                                | link is reset (unexpected)
                                | send reset message
      link is reset             |
      
      It is due to delayed re-discovery as described in function
      tipc_node_check_dest(): "this link endpoint has already reset
      and re-established contact with the peer, before receiving a
      discovery message from that node."
      
      However, commit 598411d7 has changed the condition for calling
      tipc_node_link_down() which was the acceptance of new media address.
      
      This commit fixes this by restoring the old and correct behavior.
      
      Fixes: 598411d7 ("tipc: make resetting of links non-atomic")
      Acked-by: NJon Maloy <jmaloy@redhat.com>
      Signed-off-by: NTung Nguyen <tung.q.nguyen@dektech.com.au>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      Signed-off-by: NSasha Levin <sashal@kernel.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      cb194caf
    • G
      netfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function. · 42984720
      Gavrilov Ilia 提交于
      stable inclusion
      from stable-v5.10.164
      commit 4e6a70fd840400e3a2e784a6673968a3eb2431c0
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I7T7G4
      
      Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=4e6a70fd840400e3a2e784a6673968a3eb2431c0
      
      --------------------------------
      
      commit 9ea4b476 upstream.
      
      When first_ip is 0, last_ip is 0xFFFFFFFF, and netmask is 31, the value of
      an arithmetic expression 2 << (netmask - mask_bits - 1) is subject
      to overflow due to a failure casting operands to a larger data type
      before performing the arithmetic.
      
      Note that it's harmless since the value will be checked at the next step.
      
      Found by InfoTeCS on behalf of Linux Verification Center
      (linuxtesting.org) with SVACE.
      
      Fixes: b9fed748 ("netfilter: ipset: Check and reject crazy /0 input parameters")
      Signed-off-by: NIlia.Gavrilov <Ilia.Gavrilov@infotecs.ru>
      Reviewed-by: NSimon Horman <simon.horman@corigine.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      Signed-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: Nsanglipeng <sanglipeng1@jd.com>
      42984720
  6. 14 8月, 2023 1 次提交