1. 23 6月, 2021 3 次提交
  2. 01 6月, 2021 1 次提交
  3. 19 4月, 2021 2 次提交
  4. 08 4月, 2021 1 次提交
  5. 21 1月, 2021 1 次提交
  6. 03 10月, 2020 1 次提交
  7. 28 9月, 2020 3 次提交
  8. 27 8月, 2020 1 次提交
  9. 31 7月, 2020 1 次提交
  10. 27 5月, 2020 1 次提交
  11. 29 4月, 2020 2 次提交
  12. 24 4月, 2020 2 次提交
  13. 23 4月, 2020 1 次提交
  14. 14 4月, 2020 1 次提交
    • T
      mac80211_hwsim: Use kstrndup() in place of kasprintf() · 7ea86204
      Tuomas Tynkkynen 提交于
      syzbot reports a warning:
      
      precision 33020 too large
      WARNING: CPU: 0 PID: 9618 at lib/vsprintf.c:2471 set_precision+0x150/0x180 lib/vsprintf.c:2471
       vsnprintf+0xa7b/0x19a0 lib/vsprintf.c:2547
       kvasprintf+0xb2/0x170 lib/kasprintf.c:22
       kasprintf+0xbb/0xf0 lib/kasprintf.c:59
       hwsim_del_radio_nl+0x63a/0x7e0 drivers/net/wireless/mac80211_hwsim.c:3625
       genl_family_rcv_msg_doit net/netlink/genetlink.c:672 [inline]
       ...
       entry_SYSCALL_64_after_hwframe+0x49/0xbe
      
      Thus it seems that kasprintf() with "%.*s" format can not be used for
      duplicating a string with arbitrary length. Replace it with kstrndup().
      
      Note that later this string is limited to NL80211_WIPHY_NAME_MAXLEN == 64,
      but the code is simpler this way.
      
      Reported-by: syzbot+6693adf1698864d21734@syzkaller.appspotmail.com
      Reported-by: syzbot+a4aee3f42d7584d76761@syzkaller.appspotmail.com
      Cc: stable@kernel.org
      Signed-off-by: NTuomas Tynkkynen <tuomas.tynkkynen@iki.fi>
      Link: https://lore.kernel.org/r/20200410123257.14559-1-tuomas.tynkkynen@iki.fi
      [johannes: add note about length limit]
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      7ea86204
  15. 20 3月, 2020 1 次提交
  16. 24 2月, 2020 1 次提交
  17. 15 1月, 2020 2 次提交
  18. 08 11月, 2019 1 次提交
  19. 11 10月, 2019 2 次提交
  20. 04 10月, 2019 2 次提交
  21. 02 10月, 2019 1 次提交
    • F
      netfilter: drop bridge nf reset from nf_reset · 895b5c9f
      Florian Westphal 提交于
      commit 174e2381
      ("sk_buff: drop all skb extensions on free and skb scrubbing") made napi
      recycle always drop skb extensions.  The additional skb_ext_del() that is
      performed via nf_reset on napi skb recycle is not needed anymore.
      
      Most nf_reset() calls in the stack are there so queued skb won't block
      'rmmod nf_conntrack' indefinitely.
      
      This removes the skb_ext_del from nf_reset, and renames it to a more
      fitting nf_reset_ct().
      
      In a few selected places, add a call to skb_ext_reset to make sure that
      no active extensions remain.
      
      I am submitting this for "net", because we're still early in the release
      cycle.  The patch applies to net-next too, but I think the rename causes
      needless divergence between those trees.
      Suggested-by: NEric Dumazet <edumazet@google.com>
      Signed-off-by: NFlorian Westphal <fw@strlen.de>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      895b5c9f
  22. 11 9月, 2019 1 次提交
  23. 31 7月, 2019 1 次提交
  24. 29 7月, 2019 1 次提交
  25. 26 7月, 2019 3 次提交
  26. 22 6月, 2019 1 次提交
  27. 19 6月, 2019 1 次提交
  28. 14 6月, 2019 1 次提交
    • J
      nl80211: require and validate vendor command policy · 901bb989
      Johannes Berg 提交于
      Require that each vendor command give a policy of its sub-attributes
      in NL80211_ATTR_VENDOR_DATA, and then (stricly) check the contents,
      including the NLA_F_NESTED flag that we couldn't check on the outer
      layer because there we don't know yet.
      
      It is possible to use VENDOR_CMD_RAW_DATA for raw data, but then no
      nested data can be given (NLA_F_NESTED flag must be clear) and the
      data is just passed as is to the command.
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      901bb989