Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net
Pull networking fixes from Jakub Kicinski: "One more set of fixes from the networking tree: - add missing input validation in nl80211_del_key(), preventing out-of-bounds access - last minute fix / improvement of a MRP netlink (uAPI) interface introduced in 5.9 (current) release - fix "unresolved symbol" build error under CONFIG_NET w/o CONFIG_INET due to missing tcp_timewait_sock and inet_timewait_sock BTF. - fix 32 bit sub-register bounds tracking in the bpf verifier for OR case - tcp: fix receive window update in tcp_add_backlog() - openvswitch: handle DNAT tuple collision in conntrack-related code - r8169: wait for potential PHY reset to finish after applying a FW file, avoiding unexpected PHY behaviour and failures later on - mscc: fix tail dropping watermarks for Ocelot switches - avoid use-after-free in macsec code after a call to the GRO layer - avoid use-after-free in sctp error paths - add a device id for Cellient MPL200 WWAN card - rxrpc fixes: - fix the xdr encoding of the contents read from an rxrpc key - fix a BUG() for a unsupported encoding type. - fix missing _bh lock annotations. - fix acceptance handling for an incoming call where the incoming call is encrypted. - the server token keyring isn't network namespaced - it belongs to the server, so there's no need. Namespacing it means that request_key() fails to find it. - fix a leak of the server keyring" * git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (21 commits) net: usb: qmi_wwan: add Cellient MPL200 card macsec: avoid use-after-free in macsec_handle_frame() r8169: consider that PHY reset may still be in progress after applying firmware openvswitch: handle DNAT tuple collision sctp: fix sctp_auth_init_hmacs() error path bridge: Netlink interface fix. net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() bpf: Fix scalar32_min_max_or bounds tracking tcp: fix receive window update in tcp_add_backlog() net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails mptcp: more DATA FIN fixes net: mscc: ocelot: warn when encoding an out-of-bounds watermark value net: mscc: ocelot: divide watermark value by 60 when writing to SYS_ATOP net: qrtr: ns: Fix the incorrect usage of rcu_read_lock() rxrpc: Fix server keyring leak rxrpc: The server keyring isn't network-namespaced rxrpc: Fix accept on a connection that need securing rxrpc: Fix some missing _bh annotations on locking conn->state_lock rxrpc: Downgrade the BUG() for unsupported token type in rxrpc_read() rxrpc: Fix rxkad token xdr encoding ...
Showing
- drivers/net/dsa/ocelot/felix_vsc9959.c 2 additions, 0 deletionsdrivers/net/dsa/ocelot/felix_vsc9959.c
- drivers/net/dsa/ocelot/seville_vsc9953.c 2 additions, 0 deletionsdrivers/net/dsa/ocelot/seville_vsc9953.c
- drivers/net/ethernet/mscc/ocelot.c 6 additions, 6 deletionsdrivers/net/ethernet/mscc/ocelot.c
- drivers/net/ethernet/mscc/ocelot_vsc7514.c 2 additions, 0 deletionsdrivers/net/ethernet/mscc/ocelot_vsc7514.c
- drivers/net/ethernet/realtek/r8169_main.c 7 additions, 0 deletionsdrivers/net/ethernet/realtek/r8169_main.c
- drivers/net/macsec.c 3 additions, 1 deletiondrivers/net/macsec.c
- drivers/net/usb/qmi_wwan.c 1 addition, 0 deletionsdrivers/net/usb/qmi_wwan.c
- drivers/net/usb/rtl8150.c 12 additions, 4 deletionsdrivers/net/usb/rtl8150.c
- include/uapi/linux/rxrpc.h 1 addition, 1 deletioninclude/uapi/linux/rxrpc.h
- kernel/bpf/verifier.c 4 additions, 4 deletionskernel/bpf/verifier.c
- net/bridge/br_netlink.c 11 additions, 15 deletionsnet/bridge/br_netlink.c
- net/core/filter.c 6 additions, 0 deletionsnet/core/filter.c
- net/ipv4/tcp_ipv4.c 3 additions, 3 deletionsnet/ipv4/tcp_ipv4.c
- net/mptcp/options.c 5 additions, 5 deletionsnet/mptcp/options.c
- net/mptcp/subflow.c 1 addition, 1 deletionnet/mptcp/subflow.c
- net/openvswitch/conntrack.c 13 additions, 9 deletionsnet/openvswitch/conntrack.c
- net/qrtr/ns.c 64 additions, 12 deletionsnet/qrtr/ns.c
- net/rxrpc/ar-internal.h 2 additions, 5 deletionsnet/rxrpc/ar-internal.h
- net/rxrpc/call_accept.c 38 additions, 225 deletionsnet/rxrpc/call_accept.c
- net/rxrpc/call_object.c 1 addition, 4 deletionsnet/rxrpc/call_object.c
Loading
Please register or sign in to comment