12 Sep, 2019

3 commits


06 Sep, 2019

1 commit

  • commit f070ef2ac66716357066b683fb0baf55f8191a2e upstream.

    Jonathan Looney reported that a malicious peer can force a sender
    to fragment its retransmit queue into tiny skbs, inflating memory
    usage and/or overflow 32bit counters.

    TCP allows an application to queue up to sk_sndbuf bytes,
    so we need to give some allowance for non malicious splitting
    of retransmit queue.

    A new SNMP counter is added to monitor how many times TCP
    did not allow to split an skb if the allowance was exceeded.

    Note that this counter might increase in the case applications
    use SO_SNDBUF socket option to lower sk_sndbuf.

    CVE-2019-11478 : tcp_fragment, prevent fragmenting a packet when the
    socket is already using more than half the allowed space

    Signed-off-by: Eric Dumazet
    Reported-by: Jonathan Looney
    Acked-by: Neal Cardwell
    Acked-by: Yuchung Cheng
    Reviewed-by: Tyler Hicks
    Cc: Bruce Curtis
    Cc: Jonathan Lemon
    Signed-off-by: David S. Miller
    Signed-off-by: Greg Kroah-Hartman
    (cherry picked from commit ec83921899a571ad70d582934ee9e3e07f478848)

    Eric Dumazet
     

10 Jun, 2019

1 commit

  • In order to support the new ASRC in i.MX815, we update the
    user api file mxc_asrc.h.

    The reason is that the new ASRC support more sample width, and
    support endianness, sign, float format, iec958 format setting,
    All these type can be expressed by snd_pcm_format_t type.

    So we use the in(out)put_format to instead the in(out)put_word_width.

    Signed-off-by: Shengjiu Wang
    Reviewed-by: Daniel Baluta
    Reviewed-by: Viorel Suman
    (cherry picked from commit b95c32c4d4b51e3e55e1e28269a0e8bce0a04f98)

    Shengjiu Wang
     

20 May, 2019

1 commit


26 Apr, 2019

1 commit


18 Apr, 2019

33 commits