<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/net/netlink, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2019-05-03T16:56:20+00:00</updated>
<entry>
<title>netlink: fix uninit-value in netlink_sendmsg</title>
<updated>2019-05-03T16:56:20+00:00</updated>
<author>
<name>Eric Dumazet</name>
<email>edumazet@google.com</email>
</author>
<published>2018-04-07T20:42:37+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=1df1f4c9f020c5fd2e71af6880fefe70645f7e8c'/>
<id>urn:sha1:1df1f4c9f020c5fd2e71af6880fefe70645f7e8c</id>
<content type='text'>
commit 6091f09c2f79730d895149bcfe3d66140288cd0e upstream.

syzbot reported :

BUG: KMSAN: uninit-value in ffs arch/x86/include/asm/bitops.h:432 [inline]
BUG: KMSAN: uninit-value in netlink_sendmsg+0xb26/0x1310 net/netlink/af_netlink.c:1851

Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Change-Id: I65447ae00ea872c090e506fee72b9e5f2171748b
Signed-off-by: Eric Dumazet &lt;edumazet@google.com&gt;
Reported-by: syzbot &lt;syzkaller@googlegroups.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Ben Hutchings &lt;ben@decadent.org.uk&gt;
</content>
</entry>
<entry>
<title>netlink: make sure nladdr has correct size in netlink_connect()</title>
<updated>2019-05-03T16:54:38+00:00</updated>
<author>
<name>Alexander Potapenko</name>
<email>glider@google.com</email>
</author>
<published>2018-03-23T12:49:02+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=9ba0856e417bf35ceda80c95ca8f193e7fa2843c'/>
<id>urn:sha1:9ba0856e417bf35ceda80c95ca8f193e7fa2843c</id>
<content type='text'>
commit 7880287981b60a6808f39f297bb66936e8bdf57a upstream.

KMSAN reports use of uninitialized memory in the case when |alen| is
smaller than sizeof(struct sockaddr_nl), and therefore |nladdr| isn't
fully copied from the userspace.

Change-Id: I86efa7b5e35e21ef51da3a3d18d834421cb37895
Signed-off-by: Alexander Potapenko &lt;glider@google.com&gt;
Fixes: 1da177e4c3f41524 ("Linux-2.6.12-rc2")
Reviewed-by: Eric Dumazet &lt;edumazet@google.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Ben Hutchings &lt;ben@decadent.org.uk&gt;
</content>
</entry>
<entry>
<title>net: Fix permission check in netlink_connect()</title>
<updated>2019-05-03T16:54:26+00:00</updated>
<author>
<name>Mike Pecovnik</name>
<email>mike.pecovnik@gmail.com</email>
</author>
<published>2014-02-24T20:11:16+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=35bbd572fe8f5cbdae2208968c68f6a9177f9fcd'/>
<id>urn:sha1:35bbd572fe8f5cbdae2208968c68f6a9177f9fcd</id>
<content type='text'>
netlink_sendmsg() was changed to prevent non-root processes from sending
messages with dst_pid != 0.
netlink_connect() however still only checks if nladdr-&gt;nl_groups is set.
This patch modifies netlink_connect() to check for the same condition.

Change-Id: I3179755947077de1d2a92a7573fbdac65314e6dc
Signed-off-by: Mike Pecovnik &lt;mike.pecovnik@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Replace &lt;asm/uaccess.h&gt; with &lt;linux/uaccess.h&gt; globally</title>
<updated>2018-11-29T16:49:05+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2016-12-24T19:46:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8588b01909e0145e5e84f5fe0a5353bd194f205c'/>
<id>urn:sha1:8588b01909e0145e5e84f5fe0a5353bd194f205c</id>
<content type='text'>
This was entirely automated, using the script by Al:

  PATT='^[[:blank:]]*#[[:blank:]]*include[[:blank:]]*&lt;asm/uaccess.h&gt;'
  sed -i -e "s!$PATT!#include &lt;linux/uaccess.h&gt;!" \
        $(git grep -l "$PATT"|grep -v ^include/linux/uaccess.h)

to do the replacement at the end of the merge window.

Requested-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Moyster &lt;oysterized@gmail.com&gt;
</content>
</entry>
<entry>
<title>BACKPORT: netlink: add a start callback for starting a netlink dump</title>
<updated>2018-04-13T12:50:23+00:00</updated>
<author>
<name>Tom Herbert</name>
<email>tom@herbertland.com</email>
</author>
<published>2015-12-15T23:41:37+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=39977a83d4d8cd5e8b22ca9111a4b05851c4c418'/>
<id>urn:sha1:39977a83d4d8cd5e8b22ca9111a4b05851c4c418</id>
<content type='text'>
commit fc9e50f5a5a4e1fa9ba2756f745a13e693cf6a06 upstream.

The start callback allows the caller to set up a context for the
dump callbacks. Presumably, the context can then be destroyed in
the done callback.

Signed-off-by: Tom Herbert &lt;tom@herbertland.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Cc: Guenter Roeck &lt;linux@roeck-us.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
(cherry picked from commit 142afbc6b2f33832f332ce5b561aa817edfff0b4)

Change-Id: Ibaaffde651e76be2defeaa081ae56ca9e8f93602
</content>
</entry>
<entry>
<title>UPSTREAM: genetlink: fix usage of NLM_F_EXCL or NLM_F_REPLACE</title>
<updated>2018-04-13T12:47:21+00:00</updated>
<author>
<name>Pablo Neira</name>
<email>pablo@netfilter.org</email>
</author>
<published>2013-07-29T10:30:04+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=9fb6012d26b2d4335a3a3d19ec73a8a1c5a09de6'/>
<id>urn:sha1:9fb6012d26b2d4335a3a3d19ec73a8a1c5a09de6</id>
<content type='text'>
Currently, it is not possible to use neither NLM_F_EXCL nor
NLM_F_REPLACE from genetlink. This is due to this checking in
genl_family_rcv_msg:

	if (nlh-&gt;nlmsg_flags &amp; NLM_F_DUMP)

NLM_F_DUMP is NLM_F_MATCH|NLM_F_ROOT. Thus, if NLM_F_EXCL or
NLM_F_REPLACE flag is set, genetlink believes that you're
requesting a dump and it calls the .dumpit callback.

The solution that I propose is to refine this checking to
make it stricter:

	if ((nlh-&gt;nlmsg_flags &amp; NLM_F_DUMP) == NLM_F_DUMP)

And given the combination NLM_F_REPLACE and NLM_F_EXCL does
not make sense to me, it removes the ambiguity.

There was a patch that tried to fix this some time ago (0ab03c2
netlink: test for all flags of the NLM_F_DUMP composite) but it
tried to resolve this ambiguity in *all* existing netlink subsystems,
not only genetlink. That patch was reverted since it broke iproute2,
which is using NLM_F_ROOT to request the dump of the routing cache.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
(cherry picked from commit e1ee3673a83cc02b6b5e43c9e647d8dd5e1c4e26)

Change-Id: I1e7dfdfb1accfd22a171eb9a9a993e5b191dd27f
</content>
</entry>
<entry>
<title>netlink: Queue the kernel socket after setting the flag.</title>
<updated>2017-04-16T13:03:37+00:00</updated>
<author>
<name>Vinay Krishna Eranna</name>
<email>veran@codeaurora.org</email>
</author>
<published>2014-06-26T16:09:03+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=7891c2f91f978a98e669d24c486b2b25aa72b226'/>
<id>urn:sha1:7891c2f91f978a98e669d24c486b2b25aa72b226</id>
<content type='text'>
Queueing the socket after setting the NETLINK_KERNEL_SOCKET on the
kernel socket.

This change is required in-order to avoid the BUG check which is
caused due to race condition between setting this flag and a
message from the app space for this kernel netlink sock.

Change-Id: I19a8edf2fe009a3020b194684a6172654f8f257a
CRs-Fixed: 681815
Signed-off-by: Vinay Krishna Eranna &lt;veran@codeaurora.org&gt;
</content>
</entry>
<entry>
<title>netlink: Fix dump skb leak/double free</title>
<updated>2017-04-13T10:35:36+00:00</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2016-05-16T09:28:16+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=c0cc863130b945a47410b97d617c278748aa9b0b'/>
<id>urn:sha1:c0cc863130b945a47410b97d617c278748aa9b0b</id>
<content type='text'>
When we free cb-&gt;skb after a dump, we do it after releasing the
lock.  This means that a new dump could have started in the time
being and we'll end up freeing their skb instead of ours.

This patch saves the skb and module before we unlock so we free
the right memory.

Change-Id: Icdf8adc86b334c32d2f820b5b203989b294fb19f
Fixes: 16b304f3404f ("netlink: Eliminate kmalloc in netlink dump operation.")
Reported-by: Baozeng Ding &lt;sploving1@gmail.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Acked-by: Cong Wang &lt;xiyou.wangcong@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netlink: Eliminate kmalloc in netlink dump operation.</title>
<updated>2017-04-13T10:35:36+00:00</updated>
<author>
<name>Pravin B Shelar</name>
<email>pshelar@nicira.com</email>
</author>
<published>2013-08-15T22:31:06+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=db41e4e1c30d890f95b5747a55f570ef9b077666'/>
<id>urn:sha1:db41e4e1c30d890f95b5747a55f570ef9b077666</id>
<content type='text'>
Following patch stores struct netlink_callback in netlink_sock
to avoid allocating and freeing it on every netlink dump msg.
Only one dump operation is allowed for a given socket at a time
therefore we can safely convert cb pointer to cb struct inside
netlink_sock.

Change-Id: I376b6feef396010e3ebd98673a30518b62af9425
Signed-off-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>random: sprinkle e/f/prandom in places that deplete entropy often</title>
<updated>2016-09-10T10:06:52+00:00</updated>
<author>
<name>imoseyon</name>
<email>imoseyon@gmail.com</email>
</author>
<published>2014-12-14T18:36:51+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e9c9fff8d3d4e053157db364ae4840882ab30eac'/>
<id>urn:sha1:e9c9fff8d3d4e053157db364ae4840882ab30eac</id>
<content type='text'>
</content>
</entry>
</feed>
