Commit graph

722 commits

Author SHA1 Message Date
Ksawlii
22d62756d2 Revert "can: j1939: use correct function name in comment"
This reverts commit e047f1591f.
2024-11-24 00:23:30 +01:00
Ksawlii
606c44293e Revert "netfilter: nf_tables: elements with timeout below CONFIG_HZ never expire"
This reverts commit 059c9b20b2.
2024-11-24 00:23:30 +01:00
Ksawlii
3d470f12ae Revert "netfilter: nf_tables: reject element expiration with no timeout"
This reverts commit 197d946a75.
2024-11-24 00:23:30 +01:00
Ksawlii
3befe6b341 Revert "netfilter: nf_tables: reject expiration higher than timeout"
This reverts commit a2a76b8cc5.
2024-11-24 00:23:30 +01:00
Ksawlii
8b8bebf286 Revert "wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan()"
This reverts commit 26dc7df8fb.
2024-11-24 00:23:30 +01:00
Ksawlii
0584d5a0f0 Revert "wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors"
This reverts commit d7f5363ee0.
2024-11-24 00:23:30 +01:00
Ksawlii
6bafde029d Revert "wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()"
This reverts commit 25eb51c765.
2024-11-24 00:23:30 +01:00
Ksawlii
b7f3288f98 Revert "sock_map: Add a cond_resched() in sock_hash_free()"
This reverts commit 566ecb4ff1.
2024-11-24 00:23:30 +01:00
Ksawlii
3d5ca7967a Revert "can: bcm: Clear bo->bcm_proc_read after remove_proc_entry()."
This reverts commit 3821422714.
2024-11-24 00:23:30 +01:00
Ksawlii
2f223066b5 Revert "net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input"
This reverts commit 1fd10eb1db.
2024-11-24 00:23:29 +01:00
Ksawlii
268646e083 Revert "net: tipc: avoid possible garbage value"
This reverts commit 4360ab4ee6.
2024-11-24 00:23:28 +01:00
Ksawlii
fffb3a7453 Revert "netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()"
This reverts commit 103bb84d43.
2024-11-24 00:23:18 +01:00
Ksawlii
4da99c6b03 Revert "net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL"
This reverts commit c457c95e8c.
2024-11-24 00:23:18 +01:00
Ksawlii
8c89e5a8e9 Revert "net: qrtr: Update packets cloning when broadcasting"
This reverts commit 4e47049a3b.
2024-11-24 00:23:18 +01:00
Ksawlii
34b5adf14b Revert "netfilter: nf_tables: Keep deleted flowtable hooks until after RCU"
This reverts commit 9dff7ecbaa.
2024-11-24 00:23:18 +01:00
Ksawlii
dfba2abdca Revert "netfilter: ctnetlink: compile ctnetlink_label_size with CONFIG_NF_CONNTRACK_EVENTS"
This reverts commit 0184a94a2d.
2024-11-24 00:23:18 +01:00
Ksawlii
ad9cd009c0 Revert "mptcp: fix sometimes-uninitialized warning"
This reverts commit 4f36f19902.
2024-11-24 00:23:17 +01:00
Ksawlii
179c4ebbc2 Revert "netfilter: nf_tables: prevent nf_skb_duplicated corruption"
This reverts commit ec98d49424.
2024-11-24 00:23:12 +01:00
Ksawlii
839e4817e0 Revert "net: avoid potential underflow in qdisc_pkt_len_init() with UFO"
This reverts commit 43c718d118.
2024-11-24 00:23:12 +01:00
Ksawlii
26d0ee6612 Revert "net: add more sanity checks to qdisc_pkt_len_init()"
This reverts commit db458c02bc.
2024-11-24 00:23:12 +01:00
Ksawlii
31a84aa710 Revert "ipv4: ip_gre: Fix drops of small packets in ipgre_xmit"
This reverts commit ae49cd62cc.
2024-11-24 00:23:12 +01:00
Ksawlii
5bdee7aa98 Revert "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start"
This reverts commit cf4a4858f8.
2024-11-24 00:23:12 +01:00
Ksawlii
090bd5a30c Revert "Bluetooth: L2CAP: Fix not validating setsockopt user input"
This reverts commit 34810f683b.
2024-11-24 00:23:11 +01:00
Ksawlii
33e3696215 Revert "net: sched: consistently use rcu_replace_pointer() in taprio_change()"
This reverts commit 35c0601a6a.
2024-11-24 00:23:10 +01:00
Ksawlii
a3f4468004 Revert "tipc: guard against string buffer overrun"
This reverts commit ff9d241811.
2024-11-24 00:23:08 +01:00
Ksawlii
ffd61b39ca Revert "ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR)."
This reverts commit 1d847a620b.
2024-11-24 00:23:08 +01:00
Ksawlii
fb80fb4dc3 Revert "ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family"
This reverts commit c6e6595d5c.
2024-11-24 00:23:08 +01:00
Ksawlii
13049ca517 Revert "tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process"
This reverts commit 5b2e4aef3f.
2024-11-24 00:23:07 +01:00
Ksawlii
5cb636f7a4 Revert "tcp: fix to allow timestamp undo if no retransmits were sent"
This reverts commit 0295a863b0.
2024-11-24 00:22:57 +01:00
Ksawlii
15d63378f5 Revert "tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe"
This reverts commit 67a88846ee.
2024-11-24 00:22:57 +01:00
Ksawlii
e804fa0001 Revert "netfilter: br_netfilter: fix panic with metadata_dst skb"
This reverts commit 61d2ade0cb.
2024-11-24 00:22:57 +01:00
Ksawlii
6a3d675362 Revert "Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change"
This reverts commit 727f05fda3.
2024-11-24 00:22:57 +01:00
Ksawlii
aa7000ca5b Revert "net/sched: accept TCA_STAB only for root qdisc"
This reverts commit 7ce031a5e7.
2024-11-24 00:22:56 +01:00
Ksawlii
bc50bf1f95 Revert "sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start"
This reverts commit 31c0dc7bbd.
2024-11-24 00:22:56 +01:00
Ksawlii
2fcfdbccc6 Revert "netfilter: rpfilter/fib: Populate flowic_l3mdev field"
This reverts commit 8c380d140f.
2024-11-24 00:22:56 +01:00
Ksawlii
174cc7adb2 Revert "netfilter: rpfilter/fib: Set ->flowic_uid correctly for user namespaces."
This reverts commit 748f8d93da.
2024-11-24 00:22:56 +01:00
Ksawlii
482f814c0a Revert "netfilter: fib: check correct rtable in vrf setups"
This reverts commit 12f2bab817.
2024-11-24 00:22:56 +01:00
Ksawlii
41a84ba01c Revert "net: Fix an unsafe loop on the list"
This reverts commit eddd768153.
2024-11-24 00:22:55 +01:00
Ksawlii
6a7d749ef9 Revert "xfrm: Pass flowi_oif or l3mdev as oif to xfrm_dst_lookup"
This reverts commit 40dbfea1fd.
2024-11-24 00:22:55 +01:00
Ksawlii
7b92e2530c Revert "net: seg6: fix seg6_lookup_any_nexthop() to handle VRFs using flowi_l3mdev"
This reverts commit f379de3e94.
2024-11-24 00:22:54 +01:00
Ksawlii
810bfe7bd4 Revert "netfilter: ip6t_rpfilter: Fix regression with VRF interfaces"
This reverts commit f26c3ffddf.
2024-11-24 00:22:54 +01:00
Ksawlii
bfa37c9cf0 Revert "wifi: mac80211: fix potential key use-after-free"
This reverts commit e5e07ee6ec.
2024-11-24 00:22:53 +01:00
Ksawlii
cafb5ebf44 Revert "Bluetooth: Remove debugfs directory on module init failure"
This reverts commit 66a71e8659.
2024-11-24 00:22:52 +01:00
Ksawlii
d22ac47288 Revert "mptcp: track and update contiguous data status"
This reverts commit dcd9060576.
2024-11-24 00:22:51 +01:00
Ksawlii
f17b8dfeea Revert "mptcp: handle consistently DSS corruption"
This reverts commit 3f4af240b0.
2024-11-24 00:22:51 +01:00
Ksawlii
6236b4ccaf Revert "tcp: fix mptcp DSS corruption due to large pmtu xmit"
This reverts commit cce6ef7552.
2024-11-24 00:22:51 +01:00
Johannes Berg
a2b08af2ca mac80211: always have ieee80211_sta_restart()
commit 3fa5a0f5b0d69e31c6476cd81afeca3cc25a4927 upstream.

When CONFIG_PM isn't defined we don't have the function
ieee80211_sta_restart() compiled in, but we always need
it now for firmware restart. Move it out of the ifdef.

Fixes: 7d352ccf1e99 ("mac80211: Add support to trigger sta disconnect on hardware restart")
Link: https://lore.kernel.org/r/20220312221957.1fa96c72db51.I8ecaa5f9402fede0272161e0531ab930b97fba3e@changeid
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-23 23:22:06 +01:00
Felix Fietkau
2325aa9ece wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
commit 393b6bc174b0dd21bb2a36c13b36e62fc3474a23 upstream.

Avoid potentially crashing in the driver because of uninitialized private data

Fixes: 5b3dc42b1b0d ("mac80211: add support for driver tx power reporting")
Cc: stable@vger.kernel.org
Signed-off-by: Felix Fietkau <nbd@nbd.name>
Link: https://patch.msgid.link/20241002095630.22431-1-nbd@nbd.name
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-23 23:22:05 +01:00
Pablo Neira Ayuso
c5a5eb2636 netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
[ Upstream commit d5953d680f7e96208c29ce4139a0e38de87a57fe ]

If access to offset + length is larger than the skbuff length, then
skb_checksum() triggers BUG_ON().

skb_checksum() internally subtracts the length parameter while iterating
over skbuff, BUG_ON(len) at the end of it checks that the expected
length to be included in the checksum calculation is fully consumed.

Fixes: 7ec3f7b47b8d ("netfilter: nft_payload: add packet mangling support")
Reported-by: Slavin Liu <slavin-ayu@qq.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-23 23:22:04 +01:00
Benoît Monin
4454492a69 net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension
[ Upstream commit 04c20a9356f283da623903e81e7c6d5df7e4dc3c ]

As documented in skbuff.h, devices with NETIF_F_IPV6_CSUM capability
can only checksum TCP and UDP over IPv6 if the IP header does not
contains extension.

This is enforced for UDP packets emitted from user-space to an IPv6
address as they go through ip6_make_skb(), which calls
__ip6_append_data() where a check is done on the header size before
setting CHECKSUM_PARTIAL.

But the introduction of UDP encapsulation with fou6 added a code-path
where it is possible to get an skb with a partial UDP checksum and an
IPv6 header with extension:
* fou6 adds a UDP header with a partial checksum if the inner packet
does not contains a valid checksum.
* ip6_tunnel adds an IPv6 header with a destination option extension
header if encap_limit is non-zero (the default value is 4).

The thread linked below describes in more details how to reproduce the
problem with GRE-in-UDP tunnel.

Add a check on the network header size in skb_csum_hwoffload_help() to
make sure no IPv6 packet with extension header is handed to a network
device with NETIF_F_IPV6_CSUM capability.

Link: https://lore.kernel.org/netdev/26548921.1r3eYUQgxm@benoit.monin/T/#u
Fixes: aa3463d65e7b ("fou: Add encap ops for IPv6 tunnels")
Signed-off-by: Benoît Monin <benoit.monin@gmx.fr>
Reviewed-by: Willem de Bruijn <willemb@google.com>
Link: https://patch.msgid.link/5fbeecfc311ea182aa1d1c771725ab8b4cac515e.1729778144.git.benoit.monin@gmx.fr
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-23 23:22:04 +01:00