Ksawlii
efd33de913
Revert "inet: inet_defrag: prevent sk release while still in use"
...
This reverts commit d2e0105e54
.
2024-11-24 00:23:32 +01:00
Ksawlii
22d62756d2
Revert "can: j1939: use correct function name in comment"
...
This reverts commit e047f1591f
.
2024-11-24 00:23:30 +01:00
Ksawlii
606c44293e
Revert "netfilter: nf_tables: elements with timeout below CONFIG_HZ never expire"
...
This reverts commit 059c9b20b2
.
2024-11-24 00:23:30 +01:00
Ksawlii
3d470f12ae
Revert "netfilter: nf_tables: reject element expiration with no timeout"
...
This reverts commit 197d946a75
.
2024-11-24 00:23:30 +01:00
Ksawlii
3befe6b341
Revert "netfilter: nf_tables: reject expiration higher than timeout"
...
This reverts commit a2a76b8cc5
.
2024-11-24 00:23:30 +01:00
Ksawlii
8b8bebf286
Revert "wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan()"
...
This reverts commit 26dc7df8fb
.
2024-11-24 00:23:30 +01:00
Ksawlii
0584d5a0f0
Revert "wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors"
...
This reverts commit d7f5363ee0
.
2024-11-24 00:23:30 +01:00
Ksawlii
6bafde029d
Revert "wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()"
...
This reverts commit 25eb51c765
.
2024-11-24 00:23:30 +01:00
Ksawlii
b7f3288f98
Revert "sock_map: Add a cond_resched() in sock_hash_free()"
...
This reverts commit 566ecb4ff1
.
2024-11-24 00:23:30 +01:00
Ksawlii
3d5ca7967a
Revert "can: bcm: Clear bo->bcm_proc_read after remove_proc_entry()."
...
This reverts commit 3821422714
.
2024-11-24 00:23:30 +01:00
Ksawlii
2f223066b5
Revert "net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input"
...
This reverts commit 1fd10eb1db
.
2024-11-24 00:23:29 +01:00
Ksawlii
268646e083
Revert "net: tipc: avoid possible garbage value"
...
This reverts commit 4360ab4ee6
.
2024-11-24 00:23:28 +01:00
Ksawlii
fffb3a7453
Revert "netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()"
...
This reverts commit 103bb84d43
.
2024-11-24 00:23:18 +01:00
Ksawlii
4da99c6b03
Revert "net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL"
...
This reverts commit c457c95e8c
.
2024-11-24 00:23:18 +01:00
Ksawlii
8c89e5a8e9
Revert "net: qrtr: Update packets cloning when broadcasting"
...
This reverts commit 4e47049a3b
.
2024-11-24 00:23:18 +01:00
Ksawlii
34b5adf14b
Revert "netfilter: nf_tables: Keep deleted flowtable hooks until after RCU"
...
This reverts commit 9dff7ecbaa
.
2024-11-24 00:23:18 +01:00
Ksawlii
dfba2abdca
Revert "netfilter: ctnetlink: compile ctnetlink_label_size with CONFIG_NF_CONNTRACK_EVENTS"
...
This reverts commit 0184a94a2d
.
2024-11-24 00:23:18 +01:00
Ksawlii
ad9cd009c0
Revert "mptcp: fix sometimes-uninitialized warning"
...
This reverts commit 4f36f19902
.
2024-11-24 00:23:17 +01:00
Ksawlii
179c4ebbc2
Revert "netfilter: nf_tables: prevent nf_skb_duplicated corruption"
...
This reverts commit ec98d49424
.
2024-11-24 00:23:12 +01:00
Ksawlii
839e4817e0
Revert "net: avoid potential underflow in qdisc_pkt_len_init() with UFO"
...
This reverts commit 43c718d118
.
2024-11-24 00:23:12 +01:00
Ksawlii
26d0ee6612
Revert "net: add more sanity checks to qdisc_pkt_len_init()"
...
This reverts commit db458c02bc
.
2024-11-24 00:23:12 +01:00
Ksawlii
31a84aa710
Revert "ipv4: ip_gre: Fix drops of small packets in ipgre_xmit"
...
This reverts commit ae49cd62cc
.
2024-11-24 00:23:12 +01:00
Ksawlii
5bdee7aa98
Revert "sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start"
...
This reverts commit cf4a4858f8
.
2024-11-24 00:23:12 +01:00
Ksawlii
090bd5a30c
Revert "Bluetooth: L2CAP: Fix not validating setsockopt user input"
...
This reverts commit 34810f683b
.
2024-11-24 00:23:11 +01:00
Ksawlii
33e3696215
Revert "net: sched: consistently use rcu_replace_pointer() in taprio_change()"
...
This reverts commit 35c0601a6a
.
2024-11-24 00:23:10 +01:00
Ksawlii
a3f4468004
Revert "tipc: guard against string buffer overrun"
...
This reverts commit ff9d241811
.
2024-11-24 00:23:08 +01:00
Ksawlii
ffd61b39ca
Revert "ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR)."
...
This reverts commit 1d847a620b
.
2024-11-24 00:23:08 +01:00
Ksawlii
fb80fb4dc3
Revert "ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family"
...
This reverts commit c6e6595d5c
.
2024-11-24 00:23:08 +01:00
Ksawlii
13049ca517
Revert "tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process"
...
This reverts commit 5b2e4aef3f
.
2024-11-24 00:23:07 +01:00
Ksawlii
5cb636f7a4
Revert "tcp: fix to allow timestamp undo if no retransmits were sent"
...
This reverts commit 0295a863b0
.
2024-11-24 00:22:57 +01:00
Ksawlii
15d63378f5
Revert "tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe"
...
This reverts commit 67a88846ee
.
2024-11-24 00:22:57 +01:00
Ksawlii
e804fa0001
Revert "netfilter: br_netfilter: fix panic with metadata_dst skb"
...
This reverts commit 61d2ade0cb
.
2024-11-24 00:22:57 +01:00
Ksawlii
6a3d675362
Revert "Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change"
...
This reverts commit 727f05fda3
.
2024-11-24 00:22:57 +01:00
Ksawlii
aa7000ca5b
Revert "net/sched: accept TCA_STAB only for root qdisc"
...
This reverts commit 7ce031a5e7
.
2024-11-24 00:22:56 +01:00
Ksawlii
bc50bf1f95
Revert "sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start"
...
This reverts commit 31c0dc7bbd
.
2024-11-24 00:22:56 +01:00
Ksawlii
2fcfdbccc6
Revert "netfilter: rpfilter/fib: Populate flowic_l3mdev field"
...
This reverts commit 8c380d140f
.
2024-11-24 00:22:56 +01:00
Ksawlii
174cc7adb2
Revert "netfilter: rpfilter/fib: Set ->flowic_uid correctly for user namespaces."
...
This reverts commit 748f8d93da
.
2024-11-24 00:22:56 +01:00
Ksawlii
482f814c0a
Revert "netfilter: fib: check correct rtable in vrf setups"
...
This reverts commit 12f2bab817
.
2024-11-24 00:22:56 +01:00
Ksawlii
41a84ba01c
Revert "net: Fix an unsafe loop on the list"
...
This reverts commit eddd768153
.
2024-11-24 00:22:55 +01:00
Ksawlii
6a7d749ef9
Revert "xfrm: Pass flowi_oif or l3mdev as oif to xfrm_dst_lookup"
...
This reverts commit 40dbfea1fd
.
2024-11-24 00:22:55 +01:00
Ksawlii
7b92e2530c
Revert "net: seg6: fix seg6_lookup_any_nexthop() to handle VRFs using flowi_l3mdev"
...
This reverts commit f379de3e94
.
2024-11-24 00:22:54 +01:00
Ksawlii
810bfe7bd4
Revert "netfilter: ip6t_rpfilter: Fix regression with VRF interfaces"
...
This reverts commit f26c3ffddf
.
2024-11-24 00:22:54 +01:00
Ksawlii
bfa37c9cf0
Revert "wifi: mac80211: fix potential key use-after-free"
...
This reverts commit e5e07ee6ec
.
2024-11-24 00:22:53 +01:00
Ksawlii
cafb5ebf44
Revert "Bluetooth: Remove debugfs directory on module init failure"
...
This reverts commit 66a71e8659
.
2024-11-24 00:22:52 +01:00
Ksawlii
d22ac47288
Revert "mptcp: track and update contiguous data status"
...
This reverts commit dcd9060576
.
2024-11-24 00:22:51 +01:00
Ksawlii
f17b8dfeea
Revert "mptcp: handle consistently DSS corruption"
...
This reverts commit 3f4af240b0
.
2024-11-24 00:22:51 +01:00
Ksawlii
6236b4ccaf
Revert "tcp: fix mptcp DSS corruption due to large pmtu xmit"
...
This reverts commit cce6ef7552
.
2024-11-24 00:22:51 +01:00
Johannes Berg
a2b08af2ca
mac80211: always have ieee80211_sta_restart()
...
commit 3fa5a0f5b0d69e31c6476cd81afeca3cc25a4927 upstream.
When CONFIG_PM isn't defined we don't have the function
ieee80211_sta_restart() compiled in, but we always need
it now for firmware restart. Move it out of the ifdef.
Fixes: 7d352ccf1e99 ("mac80211: Add support to trigger sta disconnect on hardware restart")
Link: https://lore.kernel.org/r/20220312221957.1fa96c72db51.I8ecaa5f9402fede0272161e0531ab930b97fba3e@changeid
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-23 23:22:06 +01:00
Felix Fietkau
2325aa9ece
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
...
commit 393b6bc174b0dd21bb2a36c13b36e62fc3474a23 upstream.
Avoid potentially crashing in the driver because of uninitialized private data
Fixes: 5b3dc42b1b0d ("mac80211: add support for driver tx power reporting")
Cc: stable@vger.kernel.org
Signed-off-by: Felix Fietkau <nbd@nbd.name>
Link: https://patch.msgid.link/20241002095630.22431-1-nbd@nbd.name
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-23 23:22:05 +01:00
Pablo Neira Ayuso
c5a5eb2636
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
...
[ Upstream commit d5953d680f7e96208c29ce4139a0e38de87a57fe ]
If access to offset + length is larger than the skbuff length, then
skb_checksum() triggers BUG_ON().
skb_checksum() internally subtracts the length parameter while iterating
over skbuff, BUG_ON(len) at the end of it checks that the expected
length to be included in the checksum calculation is fully consumed.
Fixes: 7ec3f7b47b8d ("netfilter: nft_payload: add packet mangling support")
Reported-by: Slavin Liu <slavin-ayu@qq.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-23 23:22:04 +01:00