<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git, branch v4.4.239</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=v4.4.239</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=v4.4.239'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2020-10-14T07:46:23+00:00</updated>
<entry>
<title>Linux 4.4.239</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@linuxfoundation.org</email>
</author>
<published>2020-10-14T07:46:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=08e290674368862e4e5af76418ca5b0db7392030'/>
<id>urn:sha1:08e290674368862e4e5af76418ca5b0db7392030</id>
<content type='text'>
Tested-by: Jon Hunter &lt;jonathanh@nvidia.com&gt;
Tested-by: Guenter Roeck &lt;linux@roeck-us.net&gt;
Tested-by: Pavel Machek  (CIP) &lt;pavel@denx.de&gt;
Tested-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;
Link: https://lore.kernel.org/r/20201012132628.130632267@linuxfoundation.org
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Anant Thazhemadam</name>
<email>anant.thazhemadam@gmail.com</email>
</author>
<published>2020-10-05T13:29:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=b2ae876677d710731f5fd310cb1ed3ac17635383'/>
<id>urn:sha1:b2ae876677d710731f5fd310cb1ed3ac17635383</id>
<content type='text'>
commit f45a4248ea4cc13ed50618ff066849f9587226b2 upstream.

When get_registers() fails in set_ethernet_addr(),the uninitialized
value of node_id gets copied over as the address.
So, check the return value of get_registers().

If get_registers() executed successfully (i.e., it returns
sizeof(node_id)), copy over the MAC address using ether_addr_copy()
(instead of using memcpy()).

Else, if get_registers() failed instead, a randomly generated MAC
address is set as the MAC address instead.

Reported-by: syzbot+abbc768b560c84d92fd3@syzkaller.appspotmail.com
Tested-by: syzbot+abbc768b560c84d92fd3@syzkaller.appspotmail.com
Acked-by: Petko Manolov &lt;petkan@nucleusys.com&gt;
Signed-off-by: Anant Thazhemadam &lt;anant.thazhemadam@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>rxrpc: Fix server keyring leak</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2020-10-02T13:04:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=e5e3293bd5a022b2c0d95123e753bd931f702f3f'/>
<id>urn:sha1:e5e3293bd5a022b2c0d95123e753bd931f702f3f</id>
<content type='text'>
[ Upstream commit 38b1dc47a35ba14c3f4472138ea56d014c2d609b ]

If someone calls setsockopt() twice to set a server key keyring, the first
keyring is leaked.

Fix it to return an error instead if the server key keyring is already set.

Fixes: 17926a79320a ("[AF_RXRPC]: Provide secure RxRPC sockets for use by userspace and kernel both")
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>rxrpc: Downgrade the BUG() for unsupported token type in rxrpc_read()</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2020-09-08T21:09:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=74c09469251b97f0885db64c81c691f891e45c3f'/>
<id>urn:sha1:74c09469251b97f0885db64c81c691f891e45c3f</id>
<content type='text'>
[ Upstream commit 9a059cd5ca7d9c5c4ca5a6e755cf72f230176b6a ]

If rxrpc_read() (which allows KEYCTL_READ to read a key), sees a token of a
type it doesn't recognise, it can BUG in a couple of places, which is
unnecessary as it can easily get back to userspace.

Fix this to print an error message instead.

Fixes: 99455153d067 ("RxRPC: Parse security index 5 keys (Kerberos 5)")
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>rxrpc: Fix rxkad token xdr encoding</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Marc Dionne</name>
<email>marc.dionne@auristor.com</email>
</author>
<published>2020-09-04T17:01:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=bccdc2fd68a6d067e113332b9c2db5ca064a2916'/>
<id>urn:sha1:bccdc2fd68a6d067e113332b9c2db5ca064a2916</id>
<content type='text'>
[ Upstream commit 56305118e05b2db8d0395bba640ac9a3aee92624 ]

The session key should be encoded with just the 8 data bytes and
no length; ENCODE_DATA precedes it with a 4 byte length, which
confuses some existing tools that try to parse this format.

Add an ENCODE_BYTES macro that does not include a length, and use
it for the key.  Also adjust the expected length.

Note that commit 774521f353e1d ("rxrpc: Fix an assertion in
rxrpc_read()") had fixed a BUG by changing the length rather than
fixing the encoding.  The original length was correct.

Fixes: 99455153d067 ("RxRPC: Parse security index 5 keys (Kerberos 5)")
Signed-off-by: Marc Dionne &lt;marc.dionne@auristor.com&gt;
Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>bonding: set dev-&gt;needed_headroom in bond_setup_by_slave()</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Eric Dumazet</name>
<email>edumazet@google.com</email>
</author>
<published>2020-09-25T13:38:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=aaf8fe791e1618a171bd36c39225e3ec8e478abb'/>
<id>urn:sha1:aaf8fe791e1618a171bd36c39225e3ec8e478abb</id>
<content type='text'>
[ Upstream commit f32f19339596b214c208c0dba716f4b6cc4f6958 ]

syzbot managed to crash a host by creating a bond
with a GRE device.

For non Ethernet device, bonding calls bond_setup_by_slave()
instead of ether_setup(), and unfortunately dev-&gt;needed_headroom
was not copied from the new added member.

[  171.243095] skbuff: skb_under_panic: text:ffffffffa184b9ea len:116 put:20 head:ffff883f84012dc0 data:ffff883f84012dbc tail:0x70 end:0xd00 dev:bond0
[  171.243111] ------------[ cut here ]------------
[  171.243112] kernel BUG at net/core/skbuff.c:112!
[  171.243117] invalid opcode: 0000 [#1] SMP KASAN PTI
[  171.243469] gsmi: Log Shutdown Reason 0x03
[  171.243505] Call Trace:
[  171.243506]  &lt;IRQ&gt;
[  171.243512]  [&lt;ffffffffa171be59&gt;] skb_push+0x49/0x50
[  171.243516]  [&lt;ffffffffa184b9ea&gt;] ipgre_header+0x2a/0xf0
[  171.243520]  [&lt;ffffffffa17452d7&gt;] neigh_connected_output+0xb7/0x100
[  171.243524]  [&lt;ffffffffa186f1d3&gt;] ip6_finish_output2+0x383/0x490
[  171.243528]  [&lt;ffffffffa186ede2&gt;] __ip6_finish_output+0xa2/0x110
[  171.243531]  [&lt;ffffffffa186acbc&gt;] ip6_finish_output+0x2c/0xa0
[  171.243534]  [&lt;ffffffffa186abe9&gt;] ip6_output+0x69/0x110
[  171.243537]  [&lt;ffffffffa186ac90&gt;] ? ip6_output+0x110/0x110
[  171.243541]  [&lt;ffffffffa189d952&gt;] mld_sendpack+0x1b2/0x2d0
[  171.243544]  [&lt;ffffffffa189d290&gt;] ? mld_send_report+0xf0/0xf0
[  171.243548]  [&lt;ffffffffa189c797&gt;] mld_ifc_timer_expire+0x2d7/0x3b0
[  171.243551]  [&lt;ffffffffa189c4c0&gt;] ? mld_gq_timer_expire+0x50/0x50
[  171.243556]  [&lt;ffffffffa0fea270&gt;] call_timer_fn+0x30/0x130
[  171.243559]  [&lt;ffffffffa0fea17c&gt;] expire_timers+0x4c/0x110
[  171.243563]  [&lt;ffffffffa0fea0e3&gt;] __run_timers+0x213/0x260
[  171.243566]  [&lt;ffffffffa0fecb7d&gt;] ? ktime_get+0x3d/0xa0
[  171.243570]  [&lt;ffffffffa0ff9c4e&gt;] ? clockevents_program_event+0x7e/0xe0
[  171.243574]  [&lt;ffffffffa0f7e5d5&gt;] ? sched_clock_cpu+0x15/0x190
[  171.243577]  [&lt;ffffffffa0fe973d&gt;] run_timer_softirq+0x1d/0x40
[  171.243581]  [&lt;ffffffffa1c00152&gt;] __do_softirq+0x152/0x2f0
[  171.243585]  [&lt;ffffffffa0f44e1f&gt;] irq_exit+0x9f/0xb0
[  171.243588]  [&lt;ffffffffa1a02e1d&gt;] smp_apic_timer_interrupt+0xfd/0x1a0
[  171.243591]  [&lt;ffffffffa1a01ea6&gt;] apic_timer_interrupt+0x86/0x90

Fixes: f5184d267c1a ("net: Allow netdevices to specify needed head/tailroom")
Signed-off-by: Eric Dumazet &lt;edumazet@google.com&gt;
Reported-by: syzbot &lt;syzkaller@googlegroups.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>xfrm: Use correct address family in xfrm_state_find</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2020-09-25T04:42:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=d4fc45e32b8d181183d02ddee803b85f83be7267'/>
<id>urn:sha1:d4fc45e32b8d181183d02ddee803b85f83be7267</id>
<content type='text'>
[ Upstream commit e94ee171349db84c7cfdc5fefbebe414054d0924 ]

The struct flowi must never be interpreted by itself as its size
depends on the address family.  Therefore it must always be grouped
with its original family value.

In this particular instance, the original family value is lost in
the function xfrm_state_find.  Therefore we get a bogus read when
it's coupled with the wrong family which would occur with inter-
family xfrm states.

This patch fixes it by keeping the original family value.

Note that the same bug could potentially occur in LSM through
the xfrm_state_pol_flow_match hook.  I checked the current code
there and it seems to be safe for now as only secid is used which
is part of struct flowi_common.  But that API should be changed
so that so that we don't get new bugs in the future.  We could
do that by replacing fl with just secid or adding a family field.

Reported-by: syzbot+577fbac3145a6eb2e7a5@syzkaller.appspotmail.com
Fixes: 48b8d78315bf ("[XFRM]: State selection update to use inner...")
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>net: stmmac: removed enabling eee in EEE set callback</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Voon Weifeng</name>
<email>weifeng.voon@intel.com</email>
</author>
<published>2020-09-23T08:56:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=4c30fd07ca40da56760f2823f61246fa5d5f4247'/>
<id>urn:sha1:4c30fd07ca40da56760f2823f61246fa5d5f4247</id>
<content type='text'>
[ Upstream commit 7241c5a697479c7d0c5a96595822cdab750d41ae ]

EEE should be only be enabled during stmmac_mac_link_up() when the
link are up and being set up properly. set_eee should only do settings
configuration and disabling the eee.

Without this fix, turning on EEE using ethtool will return
"Operation not supported". This is due to the driver is in a dead loop
waiting for eee to be advertised in the for eee to be activated but the
driver will only configure the EEE advertisement after the eee is
activated.

Ethtool should only return "Operation not supported" if there is no EEE
capbility in the MAC controller.

Fixes: 8a7493e58ad6 ("net: stmmac: Fix a race in EEE enable callback")
Signed-off-by: Voon Weifeng &lt;weifeng.voon@intel.com&gt;
Acked-by: Mark Gross &lt;mgross@linux.intel.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>xfrm: clone whole liftime_cur structure in xfrm_do_migrate</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Antony Antony</name>
<email>antony.antony@secunet.com</email>
</author>
<published>2020-09-04T06:50:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=b932860a1168f2b99e63b30ed8c1ffb53915d2b7'/>
<id>urn:sha1:b932860a1168f2b99e63b30ed8c1ffb53915d2b7</id>
<content type='text'>
[ Upstream commit 8366685b2883e523f91e9816d7be371eb1144749 ]

When we clone state only add_time was cloned. It missed values like
bytes, packets.  Now clone the all members of the structure.

v1-&gt;v3:
 - use memcpy to copy the entire structure

Fixes: 80c9abaabf42 ("[XFRM]: Extension for dynamic update of endpoint address(es)")
Signed-off-by: Antony Antony &lt;antony.antony@secunet.com&gt;
Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
<entry>
<title>xfrm: clone XFRMA_REPLAY_ESN_VAL in xfrm_do_migrate</title>
<updated>2020-10-14T07:46:23+00:00</updated>
<author>
<name>Antony Antony</name>
<email>antony.antony@secunet.com</email>
</author>
<published>2020-09-04T06:49:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=62457d397b90697b3b805d2316becfa9fd25580e'/>
<id>urn:sha1:62457d397b90697b3b805d2316becfa9fd25580e</id>
<content type='text'>
[ Upstream commit 91a46c6d1b4fcbfa4773df9421b8ad3e58088101 ]

XFRMA_REPLAY_ESN_VAL was not cloned completely from the old to the new.
Migrate this attribute during XFRMA_MSG_MIGRATE

v1-&gt;v2:
 - move curleft cloning to a separate patch

Fixes: af2f464e326e ("xfrm: Assign esn pointers when cloning a state")
Signed-off-by: Antony Antony &lt;antony.antony@secunet.com&gt;
Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
</entry>
</feed>
