All of lore.kernel.org
 help / color / mirror / Atom feed
* Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
@ 2021-06-29  4:48 Davis
  2021-06-29 17:26 ` Felix Fietkau
  0 siblings, 1 reply; 9+ messages in thread
From: Davis @ 2021-06-29  4:48 UTC (permalink / raw)
  To: linux-wireless, netdev

Greetings!

Could it be possible that
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.13&id=a8c4d76a8dd4fb9666fc8919a703d85fb8f44ed8
or at least its backport to 4.4 has the potential for memory
corruption due to incorrect pointer calculation?
Shouldn't the line:
  struct ethhdr *ehdr = (void *)skb_mac_header(skb);
be:
  struct ethhdr *ehdr = (struct ethhdr *) skb->data;

Later ehdr->h_dest is referenced, read and (when not equal to expected
value) written:
  if (unlikely(skb->protocol == sdata->control_port_protocol &&
      !ether_addr_equal(ehdr->h_dest, sdata->vif.addr)))
    ether_addr_copy(ehdr->h_dest, sdata->vif.addr);

In my case after cherry-picking
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.4.273&id=e3d4030498c304d7c36bccc6acdedacf55402387
to 4.4 kernel of an ARM device occasional memory corruption was observed.

To investigate this issue logging was added - the pointer calculation
was expressed as:
  struct ethhdr *ehdr = (void *)skb_mac_header(skb);
  struct ethhdr *ehdr2 = (struct ethhdr *) skb->data;
and memory writing was replaced by logging:
  if (unlikely(skb->protocol == sdata->control_port_protocol &&
      (!ether_addr_equal(ehdr->h_dest, sdata->vif.addr) ||
!ether_addr_equal(ehdr2->h_dest, sdata->vif.addr))))
    printk(KERN_ERR "Matching1: %u, matching2: %u, addr1: %px, addr2:
%px", !ether_addr_equal(ehdr->h_dest, sdata->vif.addr),
!ether_addr_equal(ehdr2->h_dest, sdata->vif.addr), ehdr->h_dest,
ehdr2->h_dest);

During normal use of wifi (in residential environment) logging was
triggered several times, in all cases matching1 was 1 and matching2
was 0.
This makes me think that normal control frames were received and
correctly validated by !ether_addr_equal(ehdr2->h_dest,
sdata->vif.addr), however !ether_addr_equal(ehdr->h_dest,
sdata->vif.addr) was checking incorrect buffer and identified the
frames as malformed/correctable.
This also explains memory corruption - offset difference between both
buffers (addr1 and addr2) was close to 64 KB in all cases, virtually
always a random memory location (around 64 KB away from the correct
buffer) will belong to something else, will have a value that differs
from the expected MAC address and will get overwritten by the
cherry-picked code.

Br,
Davis

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-06-29  4:48 Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames" Davis
@ 2021-06-29 17:26 ` Felix Fietkau
  2021-06-29 17:49   ` Greg Kroah-Hartman
  0 siblings, 1 reply; 9+ messages in thread
From: Felix Fietkau @ 2021-06-29 17:26 UTC (permalink / raw)
  To: Davis, linux-wireless, netdev; +Cc: Greg Kroah-Hartman, Johannes Berg


Hi,

On 2021-06-29 06:48, Davis wrote:
> Greetings!
> 
> Could it be possible that
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.13&id=a8c4d76a8dd4fb9666fc8919a703d85fb8f44ed8
> or at least its backport to 4.4 has the potential for memory
> corruption due to incorrect pointer calculation?
> Shouldn't the line:
>   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
> be:
>   struct ethhdr *ehdr = (struct ethhdr *) skb->data;
> 
> Later ehdr->h_dest is referenced, read and (when not equal to expected
> value) written:
>   if (unlikely(skb->protocol == sdata->control_port_protocol &&
>       !ether_addr_equal(ehdr->h_dest, sdata->vif.addr)))
>     ether_addr_copy(ehdr->h_dest, sdata->vif.addr);
> 
> In my case after cherry-picking
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.4.273&id=e3d4030498c304d7c36bccc6acdedacf55402387
> to 4.4 kernel of an ARM device occasional memory corruption was observed.
> 
> To investigate this issue logging was added - the pointer calculation
> was expressed as:
>   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
>   struct ethhdr *ehdr2 = (struct ethhdr *) skb->data;
> and memory writing was replaced by logging:
>   if (unlikely(skb->protocol == sdata->control_port_protocol &&
>       (!ether_addr_equal(ehdr->h_dest, sdata->vif.addr) ||
> !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr))))
>     printk(KERN_ERR "Matching1: %u, matching2: %u, addr1: %px, addr2:
> %px", !ether_addr_equal(ehdr->h_dest, sdata->vif.addr),
> !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr), ehdr->h_dest,
> ehdr2->h_dest);
> 
> During normal use of wifi (in residential environment) logging was
> triggered several times, in all cases matching1 was 1 and matching2
> was 0.
> This makes me think that normal control frames were received and
> correctly validated by !ether_addr_equal(ehdr2->h_dest,
> sdata->vif.addr), however !ether_addr_equal(ehdr->h_dest,
> sdata->vif.addr) was checking incorrect buffer and identified the
> frames as malformed/correctable.
> This also explains memory corruption - offset difference between both
> buffers (addr1 and addr2) was close to 64 KB in all cases, virtually
> always a random memory location (around 64 KB away from the correct
> buffer) will belong to something else, will have a value that differs
> from the expected MAC address and will get overwritten by the
> cherry-picked code.
It seems that the 4.4 backport is broken. The problem is the fact that
skb_mac_header is called before eth_type_trans(). This means that the
mac header offset still has the default value of (u16)-1, resulting in
the 64 KB memory offset that you observed.

I think that for 4.4, the code should be changed to use skb->data
instead of skb_mac_header. 4.9 looks broken in the same way.
5.4 seems fine, so newer kernels should be fine as well.

- Felix

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-06-29 17:26 ` Felix Fietkau
@ 2021-06-29 17:49   ` Greg Kroah-Hartman
  2021-06-30 18:01     ` Felix Fietkau
  0 siblings, 1 reply; 9+ messages in thread
From: Greg Kroah-Hartman @ 2021-06-29 17:49 UTC (permalink / raw)
  To: Felix Fietkau; +Cc: Davis, linux-wireless, netdev, Johannes Berg

On Tue, Jun 29, 2021 at 07:26:03PM +0200, Felix Fietkau wrote:
> 
> Hi,
> 
> On 2021-06-29 06:48, Davis wrote:
> > Greetings!
> > 
> > Could it be possible that
> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.13&id=a8c4d76a8dd4fb9666fc8919a703d85fb8f44ed8
> > or at least its backport to 4.4 has the potential for memory
> > corruption due to incorrect pointer calculation?
> > Shouldn't the line:
> >   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
> > be:
> >   struct ethhdr *ehdr = (struct ethhdr *) skb->data;
> > 
> > Later ehdr->h_dest is referenced, read and (when not equal to expected
> > value) written:
> >   if (unlikely(skb->protocol == sdata->control_port_protocol &&
> >       !ether_addr_equal(ehdr->h_dest, sdata->vif.addr)))
> >     ether_addr_copy(ehdr->h_dest, sdata->vif.addr);
> > 
> > In my case after cherry-picking
> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.4.273&id=e3d4030498c304d7c36bccc6acdedacf55402387
> > to 4.4 kernel of an ARM device occasional memory corruption was observed.
> > 
> > To investigate this issue logging was added - the pointer calculation
> > was expressed as:
> >   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
> >   struct ethhdr *ehdr2 = (struct ethhdr *) skb->data;
> > and memory writing was replaced by logging:
> >   if (unlikely(skb->protocol == sdata->control_port_protocol &&
> >       (!ether_addr_equal(ehdr->h_dest, sdata->vif.addr) ||
> > !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr))))
> >     printk(KERN_ERR "Matching1: %u, matching2: %u, addr1: %px, addr2:
> > %px", !ether_addr_equal(ehdr->h_dest, sdata->vif.addr),
> > !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr), ehdr->h_dest,
> > ehdr2->h_dest);
> > 
> > During normal use of wifi (in residential environment) logging was
> > triggered several times, in all cases matching1 was 1 and matching2
> > was 0.
> > This makes me think that normal control frames were received and
> > correctly validated by !ether_addr_equal(ehdr2->h_dest,
> > sdata->vif.addr), however !ether_addr_equal(ehdr->h_dest,
> > sdata->vif.addr) was checking incorrect buffer and identified the
> > frames as malformed/correctable.
> > This also explains memory corruption - offset difference between both
> > buffers (addr1 and addr2) was close to 64 KB in all cases, virtually
> > always a random memory location (around 64 KB away from the correct
> > buffer) will belong to something else, will have a value that differs
> > from the expected MAC address and will get overwritten by the
> > cherry-picked code.
> It seems that the 4.4 backport is broken. The problem is the fact that
> skb_mac_header is called before eth_type_trans(). This means that the
> mac header offset still has the default value of (u16)-1, resulting in
> the 64 KB memory offset that you observed.
> 
> I think that for 4.4, the code should be changed to use skb->data
> instead of skb_mac_header. 4.9 looks broken in the same way.
> 5.4 seems fine, so newer kernels should be fine as well.

Thanks for looking into this, can you submit a patch to fix this up in
the older kernel trees?

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-06-29 17:49   ` Greg Kroah-Hartman
@ 2021-06-30 18:01     ` Felix Fietkau
  2021-07-01 20:54       ` Davis Mosenkovs
  0 siblings, 1 reply; 9+ messages in thread
From: Felix Fietkau @ 2021-06-30 18:01 UTC (permalink / raw)
  To: Greg Kroah-Hartman; +Cc: Davis, linux-wireless, netdev, Johannes Berg

On 2021-06-29 19:49, Greg Kroah-Hartman wrote:
> On Tue, Jun 29, 2021 at 07:26:03PM +0200, Felix Fietkau wrote:
>> 
>> Hi,
>> 
>> On 2021-06-29 06:48, Davis wrote:
>> > Greetings!
>> > 
>> > Could it be possible that
>> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.13&id=a8c4d76a8dd4fb9666fc8919a703d85fb8f44ed8
>> > or at least its backport to 4.4 has the potential for memory
>> > corruption due to incorrect pointer calculation?
>> > Shouldn't the line:
>> >   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
>> > be:
>> >   struct ethhdr *ehdr = (struct ethhdr *) skb->data;
>> > 
>> > Later ehdr->h_dest is referenced, read and (when not equal to expected
>> > value) written:
>> >   if (unlikely(skb->protocol == sdata->control_port_protocol &&
>> >       !ether_addr_equal(ehdr->h_dest, sdata->vif.addr)))
>> >     ether_addr_copy(ehdr->h_dest, sdata->vif.addr);
>> > 
>> > In my case after cherry-picking
>> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.4.273&id=e3d4030498c304d7c36bccc6acdedacf55402387
>> > to 4.4 kernel of an ARM device occasional memory corruption was observed.
>> > 
>> > To investigate this issue logging was added - the pointer calculation
>> > was expressed as:
>> >   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
>> >   struct ethhdr *ehdr2 = (struct ethhdr *) skb->data;
>> > and memory writing was replaced by logging:
>> >   if (unlikely(skb->protocol == sdata->control_port_protocol &&
>> >       (!ether_addr_equal(ehdr->h_dest, sdata->vif.addr) ||
>> > !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr))))
>> >     printk(KERN_ERR "Matching1: %u, matching2: %u, addr1: %px, addr2:
>> > %px", !ether_addr_equal(ehdr->h_dest, sdata->vif.addr),
>> > !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr), ehdr->h_dest,
>> > ehdr2->h_dest);
>> > 
>> > During normal use of wifi (in residential environment) logging was
>> > triggered several times, in all cases matching1 was 1 and matching2
>> > was 0.
>> > This makes me think that normal control frames were received and
>> > correctly validated by !ether_addr_equal(ehdr2->h_dest,
>> > sdata->vif.addr), however !ether_addr_equal(ehdr->h_dest,
>> > sdata->vif.addr) was checking incorrect buffer and identified the
>> > frames as malformed/correctable.
>> > This also explains memory corruption - offset difference between both
>> > buffers (addr1 and addr2) was close to 64 KB in all cases, virtually
>> > always a random memory location (around 64 KB away from the correct
>> > buffer) will belong to something else, will have a value that differs
>> > from the expected MAC address and will get overwritten by the
>> > cherry-picked code.
>> It seems that the 4.4 backport is broken. The problem is the fact that
>> skb_mac_header is called before eth_type_trans(). This means that the
>> mac header offset still has the default value of (u16)-1, resulting in
>> the 64 KB memory offset that you observed.
>> 
>> I think that for 4.4, the code should be changed to use skb->data
>> instead of skb_mac_header. 4.9 looks broken in the same way.
>> 5.4 seems fine, so newer kernels should be fine as well.
> 
> Thanks for looking into this, can you submit a patch to fix this up in
> the older kernel trees?
Sorry, I don't have time to prepare and test the patches at the moment.

- Felix

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-06-30 18:01     ` Felix Fietkau
@ 2021-07-01 20:54       ` Davis Mosenkovs
  2021-07-02  6:54         ` Johannes Berg
  0 siblings, 1 reply; 9+ messages in thread
From: Davis Mosenkovs @ 2021-07-01 20:54 UTC (permalink / raw)
  To: Felix Fietkau; +Cc: Greg Kroah-Hartman, linux-wireless, netdev, Johannes Berg

On 2021-06-30 at 21:01 Felix Fietkau (<nbd@nbd.name>) wrote:
>
> On 2021-06-29 19:49, Greg Kroah-Hartman wrote:
> > On Tue, Jun 29, 2021 at 07:26:03PM +0200, Felix Fietkau wrote:
> >>
> >> Hi,
> >>
> >> On 2021-06-29 06:48, Davis wrote:
> >> > Greetings!
> >> >
> >> > Could it be possible that
> >> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.13&id=a8c4d76a8dd4fb9666fc8919a703d85fb8f44ed8
> >> > or at least its backport to 4.4 has the potential for memory
> >> > corruption due to incorrect pointer calculation?
> >> > Shouldn't the line:
> >> >   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
> >> > be:
> >> >   struct ethhdr *ehdr = (struct ethhdr *) skb->data;
> >> >
> >> > Later ehdr->h_dest is referenced, read and (when not equal to expected
> >> > value) written:
> >> >   if (unlikely(skb->protocol == sdata->control_port_protocol &&
> >> >       !ether_addr_equal(ehdr->h_dest, sdata->vif.addr)))
> >> >     ether_addr_copy(ehdr->h_dest, sdata->vif.addr);
> >> >
> >> > In my case after cherry-picking
> >> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.4.273&id=e3d4030498c304d7c36bccc6acdedacf55402387
> >> > to 4.4 kernel of an ARM device occasional memory corruption was observed.
> >> >
> >> > To investigate this issue logging was added - the pointer calculation
> >> > was expressed as:
> >> >   struct ethhdr *ehdr = (void *)skb_mac_header(skb);
> >> >   struct ethhdr *ehdr2 = (struct ethhdr *) skb->data;
> >> > and memory writing was replaced by logging:
> >> >   if (unlikely(skb->protocol == sdata->control_port_protocol &&
> >> >       (!ether_addr_equal(ehdr->h_dest, sdata->vif.addr) ||
> >> > !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr))))
> >> >     printk(KERN_ERR "Matching1: %u, matching2: %u, addr1: %px, addr2:
> >> > %px", !ether_addr_equal(ehdr->h_dest, sdata->vif.addr),
> >> > !ether_addr_equal(ehdr2->h_dest, sdata->vif.addr), ehdr->h_dest,
> >> > ehdr2->h_dest);
> >> >
> >> > During normal use of wifi (in residential environment) logging was
> >> > triggered several times, in all cases matching1 was 1 and matching2
> >> > was 0.
> >> > This makes me think that normal control frames were received and
> >> > correctly validated by !ether_addr_equal(ehdr2->h_dest,
> >> > sdata->vif.addr), however !ether_addr_equal(ehdr->h_dest,
> >> > sdata->vif.addr) was checking incorrect buffer and identified the
> >> > frames as malformed/correctable.
> >> > This also explains memory corruption - offset difference between both
> >> > buffers (addr1 and addr2) was close to 64 KB in all cases, virtually
> >> > always a random memory location (around 64 KB away from the correct
> >> > buffer) will belong to something else, will have a value that differs
> >> > from the expected MAC address and will get overwritten by the
> >> > cherry-picked code.
> >> It seems that the 4.4 backport is broken. The problem is the fact that
> >> skb_mac_header is called before eth_type_trans(). This means that the
> >> mac header offset still has the default value of (u16)-1, resulting in
> >> the 64 KB memory offset that you observed.
> >>
> >> I think that for 4.4, the code should be changed to use skb->data
> >> instead of skb_mac_header. 4.9 looks broken in the same way.
> >> 5.4 seems fine, so newer kernels should be fine as well.
> >
> > Thanks for looking into this, can you submit a patch to fix this up in
> > the older kernel trees?
> Sorry, I don't have time to prepare and test the patches at the moment.
>
> - Felix
If testing procedure mentioned in my first email is sufficient (and
using skb->data is the correct solution in kernel trees where current
code doesn't work properly), I can make and test the patches.
Should I do that?

Br,
Davis

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-07-01 20:54       ` Davis Mosenkovs
@ 2021-07-02  6:54         ` Johannes Berg
  2021-07-09 19:48           ` Davis Mosenkovs
  0 siblings, 1 reply; 9+ messages in thread
From: Johannes Berg @ 2021-07-02  6:54 UTC (permalink / raw)
  To: Davis Mosenkovs, Felix Fietkau; +Cc: Greg Kroah-Hartman, linux-wireless, netdev

On Thu, 2021-07-01 at 23:54 +0300, Davis Mosenkovs wrote:
> 
> > > > It seems that the 4.4 backport is broken. The problem is the fact that
> > > > skb_mac_header is called before eth_type_trans(). This means that the
> > > > mac header offset still has the default value of (u16)-1, resulting in
> > > > the 64 KB memory offset that you observed.

Agree.

> > > > I think that for 4.4, the code should be changed to use skb->data
> > > > instead of skb_mac_header. 4.9 looks broken in the same way.
> > > > 5.4 seems fine, so newer kernels should be fine as well.

Also agree.

> > > Thanks for looking into this, can you submit a patch to fix this up in
> > > the older kernel trees?
> > Sorry, I don't have time to prepare and test the patches at the moment.
> > 
> If testing procedure mentioned in my first email is sufficient (and
> using skb->data is the correct solution in kernel trees where current
> code doesn't work properly), I can make and test the patches.
> Should I do that?

Yes, please do.

Thanks,
johannes


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-07-02  6:54         ` Johannes Berg
@ 2021-07-09 19:48           ` Davis Mosenkovs
  2021-07-10  6:33             ` Greg Kroah-Hartman
  0 siblings, 1 reply; 9+ messages in thread
From: Davis Mosenkovs @ 2021-07-09 19:48 UTC (permalink / raw)
  To: Johannes Berg; +Cc: Felix Fietkau, Greg Kroah-Hartman, linux-wireless, netdev

On 2021-07-02 at 09:54 Johannes Berg (<johannes@sipsolutions.net>) wrote:
>
> > If testing procedure mentioned in my first email is sufficient (and
> > using skb->data is the correct solution in kernel trees where current
> > code doesn't work properly), I can make and test the patches.
> > Should I do that?
>
> Yes, please do.
>
> Thanks,
> johannes
>
I have done the testing on kernel versions 4.4.274, 4.9.274, 4.14.238,
4.19.196, 5.4.130, 5.10.48, 5.12.15 and 5.13.1.
Only kernels 4.4.274, 4.9.274 and 4.14.238 are affected.
On kernels 4.19.196, 5.4.130, 5.10.48, 5.12.15 and 5.13.1 current code
works properly (and skb->data produces incorrect pointer when used
instead of skb_mac_header()).
I have submitted patches for the affected kernel versions:
https://lore.kernel.org/r/20210707213800.1087974-1-davis@mosenkovs.lv
https://lore.kernel.org/r/20210707213820.1088026-1-davis@mosenkovs.lv
https://lore.kernel.org/r/20210707213834.1088078-1-davis@mosenkovs.lv

Best regards,
Davis

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-07-09 19:48           ` Davis Mosenkovs
@ 2021-07-10  6:33             ` Greg Kroah-Hartman
  2021-07-10 18:59               ` Davis Mosenkovs
  0 siblings, 1 reply; 9+ messages in thread
From: Greg Kroah-Hartman @ 2021-07-10  6:33 UTC (permalink / raw)
  To: Davis Mosenkovs; +Cc: Johannes Berg, Felix Fietkau, linux-wireless, netdev

On Fri, Jul 09, 2021 at 10:48:06PM +0300, Davis Mosenkovs wrote:
> On 2021-07-02 at 09:54 Johannes Berg (<johannes@sipsolutions.net>) wrote:
> >
> > > If testing procedure mentioned in my first email is sufficient (and
> > > using skb->data is the correct solution in kernel trees where current
> > > code doesn't work properly), I can make and test the patches.
> > > Should I do that?
> >
> > Yes, please do.
> >
> > Thanks,
> > johannes
> >
> I have done the testing on kernel versions 4.4.274, 4.9.274, 4.14.238,
> 4.19.196, 5.4.130, 5.10.48, 5.12.15 and 5.13.1.
> Only kernels 4.4.274, 4.9.274 and 4.14.238 are affected.
> On kernels 4.19.196, 5.4.130, 5.10.48, 5.12.15 and 5.13.1 current code
> works properly (and skb->data produces incorrect pointer when used
> instead of skb_mac_header()).
> I have submitted patches for the affected kernel versions:
> https://lore.kernel.org/r/20210707213800.1087974-1-davis@mosenkovs.lv
> https://lore.kernel.org/r/20210707213820.1088026-1-davis@mosenkovs.lv
> https://lore.kernel.org/r/20210707213834.1088078-1-davis@mosenkovs.lv

Please resend and cc: the stable@vger.kernel.org list so these can
actually be applied.

You have read:
    https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html
right?

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames"
  2021-07-10  6:33             ` Greg Kroah-Hartman
@ 2021-07-10 18:59               ` Davis Mosenkovs
  0 siblings, 0 replies; 9+ messages in thread
From: Davis Mosenkovs @ 2021-07-10 18:59 UTC (permalink / raw)
  To: Greg Kroah-Hartman; +Cc: Johannes Berg, Felix Fietkau, linux-wireless, netdev

On 2021-07-10 at 09:33 Greg Kroah-Hartman (<gregkh@linuxfoundation.org>) wrote:
>
>
> Please resend and cc: the stable@vger.kernel.org list so these can
> actually be applied.
>
> You have read:
>     https://www.kernel.org/doc/html/latest/process/stable-kernel-rules.html
> right?
>
> thanks,
>
> greg k-h
Thank you!
I have read the article, added cc: stable@vger.kernel.org to e-mail
headers and (with proper kernel versions) in sign-off area.
The new patches are:
https://lore.kernel.org/r/20210710183710.5687-1-davis@mosenkovs.lv
https://lore.kernel.org/r/20210710183745.5740-1-davis@mosenkovs.lv
https://lore.kernel.org/r/20210710183807.5792-1-davis@mosenkovs.lv

Best regards,
Davis

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2021-07-10 19:00 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-06-29  4:48 Posible memory corruption from "mac80211: do not accept/forward invalid EAPOL frames" Davis
2021-06-29 17:26 ` Felix Fietkau
2021-06-29 17:49   ` Greg Kroah-Hartman
2021-06-30 18:01     ` Felix Fietkau
2021-07-01 20:54       ` Davis Mosenkovs
2021-07-02  6:54         ` Johannes Berg
2021-07-09 19:48           ` Davis Mosenkovs
2021-07-10  6:33             ` Greg Kroah-Hartman
2021-07-10 18:59               ` Davis Mosenkovs

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.