1. 22 2月, 2015 1 次提交
  2. 21 2月, 2015 6 次提交
  3. 20 2月, 2015 1 次提交
  4. 18 2月, 2015 1 次提交
    • G
      net: dsa: Set valid phy interface type · 19334920
      Guenter Roeck 提交于
      If the phy interface mode is not found in devicetree, or if devicetree
      is not configured, of_get_phy_mode returns -ENODEV. The current code
      sets the phy interface mode to the return value from of_get_phy_mode
      without checking if it is valid.
      
      This invalid phy interface mode is passed as parameter to of_phy_connect
      or to phy_connect_direct. This sets the phy interface mode to the invalid
      value, which in turn causes problems for any code using phydev->interface.
      
      Fixes: b31f65fb ("net: dsa: slave: Fix autoneg for phys on switch MDIO bus")
      Fixes: 0d8bcdd3 ("net: dsa: allow for more complex PHY setups")
      Cc: Florian Fainelli <f.fainelli@gmail.com>
      Cc: Andrew Lunn <andrew@lunn.ch>
      Signed-off-by: NGuenter Roeck <linux@roeck-us.net>
      Acked-by: NFlorian Fainelli <f.fainelli@gmail.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      19334920
  5. 17 2月, 2015 3 次提交
    • E
      netfilter: xt_socket: fix a stack corruption bug · 78296c97
      Eric Dumazet 提交于
      As soon as extract_icmp6_fields() returns, its local storage (automatic
      variables) is deallocated and can be overwritten.
      
      Lets add an additional parameter to make sure storage is valid long
      enough.
      
      While we are at it, adds some const qualifiers.
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Fixes: b64c9256 ("tproxy: added IPv6 support to the socket match")
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      78296c97
    • F
      netfilter: xt_recent: don't reject rule if new hitcount exceeds table max · cef9ed86
      Florian Westphal 提交于
      given:
      -A INPUT -m recent --update --seconds 30 --hitcount 4
      and
      iptables-save > foo
      
      then
      iptables-restore < foo
      
      will fail with:
      kernel: xt_recent: hitcount (4) is larger than packets to be remembered (4) for table DEFAULT
      
      Even when the check is fixed, the restore won't work if the hitcount is
      increased to e.g. 6, since by the time checkentry runs it will find the
      'old' incarnation of the table.
      
      We can avoid this by increasing the maximum threshold silently; we only
      have to rm all the current entries of the table (these entries would
      not have enough room to handle the increased hitcount).
      
      This even makes (not-very-useful)
      -A INPUT -m recent --update --seconds 30 --hitcount 4
      -A INPUT -m recent --update --seconds 30 --hitcount 42
      work.
      
      Fixes: abc86d0f (netfilter: xt_recent: relax ip_pkt_list_tot restrictions)
      Tracked-down-by: NChris Vine <chris@cvine.freeserve.co.uk>
      Signed-off-by: NFlorian Westphal <fw@strlen.de>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      cef9ed86
    • P
      netfilter: nft_compat: fix module refcount underflow · 520aa741
      Pablo Neira Ayuso 提交于
      Feb 12 18:20:42 nfdev kernel: ------------[ cut here ]------------
      Feb 12 18:20:42 nfdev kernel: WARNING: CPU: 4 PID: 4359 at kernel/module.c:963 module_put+0x9b/0xba()
      Feb 12 18:20:42 nfdev kernel: CPU: 4 PID: 4359 Comm: ebtables-compat Tainted: G        W      3.19.0-rc6+ #43
      [...]
      Feb 12 18:20:42 nfdev kernel: Call Trace:
      Feb 12 18:20:42 nfdev kernel: [<ffffffff815fd911>] dump_stack+0x4c/0x65
      Feb 12 18:20:42 nfdev kernel: [<ffffffff8103e6f7>] warn_slowpath_common+0x9c/0xb6
      Feb 12 18:20:42 nfdev kernel: [<ffffffff8109919f>] ? module_put+0x9b/0xba
      Feb 12 18:20:42 nfdev kernel: [<ffffffff8103e726>] warn_slowpath_null+0x15/0x17
      Feb 12 18:20:42 nfdev kernel: [<ffffffff8109919f>] module_put+0x9b/0xba
      Feb 12 18:20:42 nfdev kernel: [<ffffffff813ecf7c>] nft_match_destroy+0x45/0x4c
      Feb 12 18:20:42 nfdev kernel: [<ffffffff813e683f>] nf_tables_rule_destroy+0x28/0x70
      Reported-by: NArturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      Tested-by: NArturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
      520aa741
  6. 16 2月, 2015 1 次提交
  7. 15 2月, 2015 4 次提交
  8. 14 2月, 2015 1 次提交
  9. 13 2月, 2015 3 次提交
  10. 12 2月, 2015 12 次提交
  11. 11 2月, 2015 1 次提交
  12. 10 2月, 2015 6 次提交