lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20230216185912.804993-1-kuba@kernel.org> Date: Thu, 16 Feb 2023 10:59:12 -0800 From: Jakub Kicinski <kuba@...nel.org> To: torvalds@...ux-foundation.org Cc: kuba@...nel.org, davem@...emloft.net, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, pabeni@...hat.com Subject: [PULL] Networking for v6.2 final Hi Linus! Slightly smaller PR than usual, probably because all sub-trees have backed off and haven't submitted their changes. None of the fixes here are particularly scary and no outstanding regressions. In an ideal world the "current release" sections would be empty at this stage but that never happens. The following changes since commit 35674e787518768626d3a0ffce1c13a7eeed922d: Merge tag 'net-6.2-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2023-02-09 09:17:38 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-6.2-final for you to fetch changes up to b20b8aec6ffc07bb547966b356780cd344f20f5b: devlink: Fix netdev notifier chain corruption (2023-02-16 11:53:47 +0100) ---------------------------------------------------------------- Fixes from the main networking tree only. Current release - regressions: - fix unwanted sign extension in netdev_stats_to_stats64() Current release - new code bugs: - initialize net->notrefcnt_tracker earlier - devlink: fix netdev notifier chain corruption - nfp: make sure mbox accesses in IPsec code are atomic - ice: fix check for weight and priority of a scheduling node Previous releases - regressions: - ice: xsk: fix cleaning of XDP_TX frame, prevent inf loop - igb: fix I2C bit banging config with external thermal sensor Previous releases - always broken: - sched: tcindex: update imperfect hash filters respecting rcu - mpls: fix stale pointer if allocation fails during device rename - dccp/tcp: avoid negative sk_forward_alloc by ipv6_pinfo.pktoptions - remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues() - af_key: fix heap information leak - ipv6: fix socket connection with DSCP (correct interpretation of the tclass field vs fib rule matching) - tipc: fix kernel warning when sending SYN message - vmxnet3: read RSS information from the correct descriptor (eop) Signed-off-by: Jakub Kicinski <kuba@...nel.org> ---------------------------------------------------------------- Corinna Vinschen (1): igb: conditionalize I2C bit banging on external thermal sensor support Cristian Ciocaltea (1): net: stmmac: Restrict warning on disabling DMA store and fwd mode Eric Dumazet (2): net: initialize net->notrefcnt_tracker earlier net: use a bounce buffer for copying skb->mark Felix Riemann (1): net: Fix unwanted sign extension in netdev_stats_to_stats64() Guillaume Nault (3): ipv6: Fix datagram socket connection with DSCP. ipv6: Fix tcp socket connection with DSCP. selftests: fib_rule_tests: Test UDP and TCP connections with DSCP rules. Hangyu Hua (1): net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() Hyunwoo Kim (1): af_key: Fix heap information leak Ido Schimmel (1): devlink: Fix netdev notifier chain corruption Jakub Kicinski (6): Merge branch 'nfp-fix-schedule-in-atomic-context-when-offloading-sa' Merge branch 'ipv6-fix-socket-connection-with-dscp-fib-rules' Merge branch 'sk-sk_forward_alloc-fixes' Merge branch '100GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue net: mpls: fix stale pointer if allocation fails during device rename Merge branch '10GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue Jason Xing (3): ixgbe: allow to increase MTU to 3K with XDP enabled i40e: add double of VLAN header when computing the max MTU ixgbe: add double of VLAN header when computing the max MTU Jesse Brandeburg (1): ice: fix lost multicast packets in promisc mode Johannes Zink (1): net: stmmac: fix order of dwmac5 FlexPPS parametrization sequence Kuniyuki Iwashima (2): dccp/tcp: Avoid negative sk_forward_alloc by ipv6_pinfo.pktoptions. net: Remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues(). Larysa Zaremba (1): ice: xsk: Fix cleaning of XDP_TX frames Michael Chan (1): bnxt_en: Fix mqprio and XDP ring checking logic Michal Wilczynski (1): ice: Fix check for weight and priority of a scheduling node Miko Larsson (1): net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path Miroslav Lichvar (1): igb: Fix PPS input and output using 3rd and 4th SDP Natalia Petrova (1): i40e: Add checking for null for nlmsg_find_attr() Pedro Tammela (3): net/sched: tcindex: update imperfect hash filters respecting rcu net/sched: act_ctinfo: use percpu stats net/sched: tcindex: search key must be 16 bits Pietro Borrello (1): sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list Rafał Miłecki (1): net: bgmac: fix BCM5358 support by setting correct flags Ronak Doshi (1): vmxnet3: move rss code block under eop descriptor Siddharth Vadapalli (1): net: ethernet: ti: am65-cpsw: Add RX DMA Channel Teardown Quirk Tung Nguyen (1): tipc: fix kernel warning when sending SYN message Yinjun Zhang (2): nfp: fix incorrect use of mbox in IPsec code nfp: fix schedule in atomic context when offloading sa drivers/net/ethernet/broadcom/bgmac-bcma.c | 6 +- drivers/net/ethernet/broadcom/bnxt/bnxt.c | 8 +- drivers/net/ethernet/intel/i40e/i40e_main.c | 4 +- drivers/net/ethernet/intel/ice/ice_devlink.c | 4 +- drivers/net/ethernet/intel/ice/ice_main.c | 26 +++++ drivers/net/ethernet/intel/ice/ice_xsk.c | 15 ++- drivers/net/ethernet/intel/igb/igb_main.c | 54 ++++++--- drivers/net/ethernet/intel/ixgbe/ixgbe.h | 2 + drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | 28 +++-- drivers/net/ethernet/netronome/nfp/crypto/ipsec.c | 39 ++++--- drivers/net/ethernet/netronome/nfp/nfp_net.h | 25 +++- .../net/ethernet/netronome/nfp/nfp_net_common.c | 108 ++++++++--------- drivers/net/ethernet/netronome/nfp/nfp_net_ctrl.h | 1 - drivers/net/ethernet/stmicro/stmmac/dwmac5.c | 3 +- .../net/ethernet/stmicro/stmmac/stmmac_platform.c | 2 +- drivers/net/ethernet/ti/am65-cpsw-nuss.c | 12 +- drivers/net/ethernet/ti/am65-cpsw-nuss.h | 1 + drivers/net/usb/kalmia.c | 8 +- drivers/net/vmxnet3/vmxnet3_drv.c | 50 ++++---- include/linux/netdevice.h | 2 - include/net/sock.h | 13 +++ net/caif/caif_socket.c | 1 + net/core/dev.c | 10 +- net/core/devlink.c | 5 +- net/core/net_namespace.c | 10 +- net/core/stream.c | 1 - net/dccp/ipv6.c | 7 +- net/ipv6/datagram.c | 2 +- net/ipv6/tcp_ipv6.c | 11 +- net/key/af_key.c | 2 +- net/mpls/af_mpls.c | 4 + net/openvswitch/meter.c | 4 +- net/sched/act_ctinfo.c | 6 +- net/sched/cls_tcindex.c | 34 +++++- net/sctp/diag.c | 4 +- net/socket.c | 9 +- net/tipc/socket.c | 2 + tools/testing/selftests/net/fib_rule_tests.sh | 128 ++++++++++++++++++++- tools/testing/selftests/net/nettest.c | 51 +++++++- 39 files changed, 508 insertions(+), 194 deletions(-)
Powered by blists - more mailing lists