lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230216185912.804993-1-kuba@kernel.org>
Date:   Thu, 16 Feb 2023 10:59:12 -0800
From:   Jakub Kicinski <kuba@...nel.org>
To:     torvalds@...ux-foundation.org
Cc:     kuba@...nel.org, davem@...emloft.net, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org, pabeni@...hat.com
Subject: [PULL] Networking for v6.2 final

Hi Linus!

Slightly smaller PR than usual, probably because all sub-trees
have backed off and haven't submitted their changes.
None of the fixes here are particularly scary and no outstanding
regressions. In an ideal world the "current release" sections
would be empty at this stage but that never happens.


The following changes since commit 35674e787518768626d3a0ffce1c13a7eeed922d:

  Merge tag 'net-6.2-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2023-02-09 09:17:38 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-6.2-final

for you to fetch changes up to b20b8aec6ffc07bb547966b356780cd344f20f5b:

  devlink: Fix netdev notifier chain corruption (2023-02-16 11:53:47 +0100)

----------------------------------------------------------------
Fixes from the main networking tree only.

Current release - regressions:

  - fix unwanted sign extension in netdev_stats_to_stats64()

Current release - new code bugs:

 - initialize net->notrefcnt_tracker earlier

 - devlink: fix netdev notifier chain corruption

 - nfp: make sure mbox accesses in IPsec code are atomic

 - ice: fix check for weight and priority of a scheduling node

Previous releases - regressions:

 - ice: xsk: fix cleaning of XDP_TX frame, prevent inf loop

 - igb: fix I2C bit banging config with external thermal sensor

Previous releases - always broken:

 - sched: tcindex: update imperfect hash filters respecting rcu

 - mpls: fix stale pointer if allocation fails during device rename

 - dccp/tcp: avoid negative sk_forward_alloc by ipv6_pinfo.pktoptions

 - remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues()

 - af_key: fix heap information leak

 - ipv6: fix socket connection with DSCP (correct interpretation
   of the tclass field vs fib rule matching)

 - tipc: fix kernel warning when sending SYN message

 - vmxnet3: read RSS information from the correct descriptor (eop)

Signed-off-by: Jakub Kicinski <kuba@...nel.org>

----------------------------------------------------------------
Corinna Vinschen (1):
      igb: conditionalize I2C bit banging on external thermal sensor support

Cristian Ciocaltea (1):
      net: stmmac: Restrict warning on disabling DMA store and fwd mode

Eric Dumazet (2):
      net: initialize net->notrefcnt_tracker earlier
      net: use a bounce buffer for copying skb->mark

Felix Riemann (1):
      net: Fix unwanted sign extension in netdev_stats_to_stats64()

Guillaume Nault (3):
      ipv6: Fix datagram socket connection with DSCP.
      ipv6: Fix tcp socket connection with DSCP.
      selftests: fib_rule_tests: Test UDP and TCP connections with DSCP rules.

Hangyu Hua (1):
      net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()

Hyunwoo Kim (1):
      af_key: Fix heap information leak

Ido Schimmel (1):
      devlink: Fix netdev notifier chain corruption

Jakub Kicinski (6):
      Merge branch 'nfp-fix-schedule-in-atomic-context-when-offloading-sa'
      Merge branch 'ipv6-fix-socket-connection-with-dscp-fib-rules'
      Merge branch 'sk-sk_forward_alloc-fixes'
      Merge branch '100GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue
      net: mpls: fix stale pointer if allocation fails during device rename
      Merge branch '10GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue

Jason Xing (3):
      ixgbe: allow to increase MTU to 3K with XDP enabled
      i40e: add double of VLAN header when computing the max MTU
      ixgbe: add double of VLAN header when computing the max MTU

Jesse Brandeburg (1):
      ice: fix lost multicast packets in promisc mode

Johannes Zink (1):
      net: stmmac: fix order of dwmac5 FlexPPS parametrization sequence

Kuniyuki Iwashima (2):
      dccp/tcp: Avoid negative sk_forward_alloc by ipv6_pinfo.pktoptions.
      net: Remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues().

Larysa Zaremba (1):
      ice: xsk: Fix cleaning of XDP_TX frames

Michael Chan (1):
      bnxt_en: Fix mqprio and XDP ring checking logic

Michal Wilczynski (1):
      ice: Fix check for weight and priority of a scheduling node

Miko Larsson (1):
      net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path

Miroslav Lichvar (1):
      igb: Fix PPS input and output using 3rd and 4th SDP

Natalia Petrova (1):
      i40e: Add checking for null for nlmsg_find_attr()

Pedro Tammela (3):
      net/sched: tcindex: update imperfect hash filters respecting rcu
      net/sched: act_ctinfo: use percpu stats
      net/sched: tcindex: search key must be 16 bits

Pietro Borrello (1):
      sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list

Rafał Miłecki (1):
      net: bgmac: fix BCM5358 support by setting correct flags

Ronak Doshi (1):
      vmxnet3: move rss code block under eop descriptor

Siddharth Vadapalli (1):
      net: ethernet: ti: am65-cpsw: Add RX DMA Channel Teardown Quirk

Tung Nguyen (1):
      tipc: fix kernel warning when sending SYN message

Yinjun Zhang (2):
      nfp: fix incorrect use of mbox in IPsec code
      nfp: fix schedule in atomic context when offloading sa

 drivers/net/ethernet/broadcom/bgmac-bcma.c         |   6 +-
 drivers/net/ethernet/broadcom/bnxt/bnxt.c          |   8 +-
 drivers/net/ethernet/intel/i40e/i40e_main.c        |   4 +-
 drivers/net/ethernet/intel/ice/ice_devlink.c       |   4 +-
 drivers/net/ethernet/intel/ice/ice_main.c          |  26 +++++
 drivers/net/ethernet/intel/ice/ice_xsk.c           |  15 ++-
 drivers/net/ethernet/intel/igb/igb_main.c          |  54 ++++++---
 drivers/net/ethernet/intel/ixgbe/ixgbe.h           |   2 +
 drivers/net/ethernet/intel/ixgbe/ixgbe_main.c      |  28 +++--
 drivers/net/ethernet/netronome/nfp/crypto/ipsec.c  |  39 ++++---
 drivers/net/ethernet/netronome/nfp/nfp_net.h       |  25 +++-
 .../net/ethernet/netronome/nfp/nfp_net_common.c    | 108 ++++++++---------
 drivers/net/ethernet/netronome/nfp/nfp_net_ctrl.h  |   1 -
 drivers/net/ethernet/stmicro/stmmac/dwmac5.c       |   3 +-
 .../net/ethernet/stmicro/stmmac/stmmac_platform.c  |   2 +-
 drivers/net/ethernet/ti/am65-cpsw-nuss.c           |  12 +-
 drivers/net/ethernet/ti/am65-cpsw-nuss.h           |   1 +
 drivers/net/usb/kalmia.c                           |   8 +-
 drivers/net/vmxnet3/vmxnet3_drv.c                  |  50 ++++----
 include/linux/netdevice.h                          |   2 -
 include/net/sock.h                                 |  13 +++
 net/caif/caif_socket.c                             |   1 +
 net/core/dev.c                                     |  10 +-
 net/core/devlink.c                                 |   5 +-
 net/core/net_namespace.c                           |  10 +-
 net/core/stream.c                                  |   1 -
 net/dccp/ipv6.c                                    |   7 +-
 net/ipv6/datagram.c                                |   2 +-
 net/ipv6/tcp_ipv6.c                                |  11 +-
 net/key/af_key.c                                   |   2 +-
 net/mpls/af_mpls.c                                 |   4 +
 net/openvswitch/meter.c                            |   4 +-
 net/sched/act_ctinfo.c                             |   6 +-
 net/sched/cls_tcindex.c                            |  34 +++++-
 net/sctp/diag.c                                    |   4 +-
 net/socket.c                                       |   9 +-
 net/tipc/socket.c                                  |   2 +
 tools/testing/selftests/net/fib_rule_tests.sh      | 128 ++++++++++++++++++++-
 tools/testing/selftests/net/nettest.c              |  51 +++++++-
 39 files changed, 508 insertions(+), 194 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ