]> git.pld-linux.org Git - packages/kernel.git/blobdiff - kernel-small_fixes.patch
- 4.14.194
[packages/kernel.git] / kernel-small_fixes.patch
index 48bb4ab577ae414e747a6dcd9f463c76bdcbbf24..a227229931d63172b9dc579d98a0799465ecca09 100644 (file)
                                exit
                        fi
                done
-
-diff --git a/drivers/net/ethernet/realtek/r8169.c b/drivers/net/ethernet/realtek/r8169.c
-index 7a0c800..ec5ebbb 100644
---- a/drivers/net/ethernet/realtek/r8169.c
-+++ b/drivers/net/ethernet/realtek/r8169.c
-@@ -6927,6 +6927,14 @@ rtl_init_one(struct pci_dev *pdev, const
-       for (i = 0; i < ETH_ALEN; i++)
-               dev->dev_addr[i] = RTL_R8(MAC0 + i);
-+      if (!is_valid_ether_addr(dev->dev_addr)) {
-+              /* Report it and use a random ethernet address instead */
-+              netdev_err(dev, "Invalid MAC address: %pM\n", dev->dev_addr);
-+              random_ether_addr(dev->dev_addr);
-+              netdev_info(dev, "Using random MAC address: %pM\n",
-+                              dev->dev_addr);
-+      }
-+
-       SET_ETHTOOL_OPS(dev, &rtl8169_ethtool_ops);
-       dev->watchdog_timeo = RTL8169_TX_TIMEOUT;
-commit 8efb88340e29293e05f6b498b60596884c05a8a8
-Author: J. Bruce Fields <bfields@redhat.com>
-Date:   Mon Jul 8 13:44:45 2013 -0400
-
-    svcrpc: fix failures to handle -1 uid's
-    
-    As of f025adf191924e3a75ce80e130afcd2485b53bb8 "sunrpc: Properly decode
-    kuids and kgids in RPC_AUTH_UNIX credentials" any rpc containing a -1
-    (0xffff) uid or gid would fail with a badcred error.
-    
-    Commit afe3c3fd5392b2f0066930abc5dbd3f4b14a0f13 "svcrpc: fix failures to
-    handle -1 uid's and gid's" fixed part of the problem, but overlooked the
-    gid upcall--the kernel can request supplementary gid's for the -1 uid,
-    but mountd's attempt write a response will get -EINVAL.
-    
-    Symptoms were nfsd failing to reply to the first attempt to use a newly
-    negotiated krb5 context.
-    
-    Reported-by: Sven Geggus <lists@fuchsschwanzdomain.de>
-    Tested-by: Sven Geggus <lists@fuchsschwanzdomain.de>
-    Signed-off-by: J. Bruce Fields <bfields@redhat.com>
-
-diff --git a/net/sunrpc/svcauth_unix.c b/net/sunrpc/svcauth_unix.c
-index a98853d..621ca7b 100644
---- a/net/sunrpc/svcauth_unix.c
-+++ b/net/sunrpc/svcauth_unix.c
-@@ -493,8 +493,6 @@ static int unix_gid_parse(struct cache_detail *cd,
-       if (rv)
-               return -EINVAL;
-       uid = make_kuid(&init_user_ns, id);
--      if (!uid_valid(uid))
--              return -EINVAL;
-       ug.uid = uid;
+--- linux-4.14/security/selinux/include/classmap.h     2017-11-12 19:46:13.000000000 +0100
++++ linux-4.20/security/selinux/include/classmap.h     2018-12-24 00:55:59.000000000 +0100
+@@ -238,9 +238,11 @@
+         { "access", NULL } },
+       { "infiniband_endport",
+         { "manage_subnet", NULL } },
++      { "xdp_socket",
++        { COMMON_SOCK_PERMS, NULL } },
+       { NULL }
+   };
  
-       expiry = get_expiry(&mesg);
+-#if PF_MAX > 44
++#if PF_MAX > 45
+ #error New address family defined, please update secclass_map.
+ #endif
This page took 0.048582 seconds and 4 git commands to generate.