1. 07 3月, 2017 1 次提交
  2. 04 2月, 2017 1 次提交
  3. 30 1月, 2017 1 次提交
  4. 25 1月, 2017 1 次提交
    • L
      netfilter: nft_log: restrict the log prefix length to 127 · 5ce6b04c
      Liping Zhang 提交于
      First, log prefix will be truncated to NF_LOG_PREFIXLEN-1, i.e. 127,
      at nf_log_packet(), so the extra part is useless.
      
      Second, after adding a log rule with a very very long prefix, we will
      fail to dump the nft rules after this _special_ one, but acctually,
      they do exist. For example:
        # name_65000=$(printf "%0.sQ" {1..65000})
        # nft add rule filter output log prefix "$name_65000"
        # nft add rule filter output counter
        # nft add rule filter output counter
        # nft list chain filter output
        table ip filter {
            chain output {
                type filter hook output priority 0; policy accept;
            }
        }
      
      So now, restrict the log prefix length to NF_LOG_PREFIXLEN-1.
      
      Fixes: 96518518 ("netfilter: add nftables")
      Signed-off-by: NLiping Zhang <zlpnobody@gmail.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      5ce6b04c
  5. 17 1月, 2017 1 次提交
    • D
      bpf: rework prog_digest into prog_tag · f1f7714e
      Daniel Borkmann 提交于
      Commit 7bd509e3 ("bpf: add prog_digest and expose it via
      fdinfo/netlink") was recently discussed, partially due to
      admittedly suboptimal name of "prog_digest" in combination
      with sha1 hash usage, thus inevitably and rightfully concerns
      about its security in terms of collision resistance were
      raised with regards to use-cases.
      
      The intended use cases are for debugging resp. introspection
      only for providing a stable "tag" over the instruction sequence
      that both kernel and user space can calculate independently.
      It's not usable at all for making a security relevant decision.
      So collisions where two different instruction sequences generate
      the same tag can happen, but ideally at a rather low rate. The
      "tag" will be dumped in hex and is short enough to introspect
      in tracepoints or kallsyms output along with other data such
      as stack trace, etc. Thus, this patch performs a rename into
      prog_tag and truncates the tag to a short output (64 bits) to
      make it obvious it's not collision-free.
      
      Should in future a hash or facility be needed with a security
      relevant focus, then we can think about requirements, constraints,
      etc that would fit to that situation. For now, rework the exposed
      parts for the current use cases as long as nothing has been
      released yet. Tested on x86_64 and s390x.
      
      Fixes: 7bd509e3 ("bpf: add prog_digest and expose it via fdinfo/netlink")
      Signed-off-by: NDaniel Borkmann <daniel@iogearbox.net>
      Acked-by: NAlexei Starovoitov <ast@kernel.org>
      Cc: Andy Lutomirski <luto@kernel.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      f1f7714e
  6. 16 1月, 2017 1 次提交
  7. 11 1月, 2017 2 次提交
  8. 02 1月, 2017 1 次提交
  9. 21 12月, 2016 1 次提交
    • H
      [media] cec: fix report_current_latency · f3854973
      Hans Verkuil 提交于
      In the (very) small print of the REPORT_CURRENT_LATENCY message there is a
      line that says that the last byte of the message (audio out delay) is only
      present if the 'audio out compensated' value is 3.
      
      I missed this, and so if this message was sent with a total length of 6 (i.e.
      without the audio out delay byte), then it was rejected by the framework
      since a minimum length of 7 was expected.
      
      Fix this minimum length check and update the wrappers in cec-funcs.h to do
      the right thing based on the message length.
      Signed-off-by: NHans Verkuil <hans.verkuil@cisco.com>
      Signed-off-by: NMauro Carvalho Chehab <mchehab@s-opensource.com>
      f3854973
  10. 16 12月, 2016 4 次提交
  11. 13 12月, 2016 1 次提交
  12. 12 12月, 2016 1 次提交
  13. 11 12月, 2016 2 次提交
  14. 09 12月, 2016 4 次提交
  15. 07 12月, 2016 12 次提交
  16. 06 12月, 2016 4 次提交
  17. 05 12月, 2016 1 次提交
  18. 04 12月, 2016 1 次提交