+++ /dev/null
-From 8006aff15516a170640239c5a8e6696c0ba18d8e Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Marek=20Beh=C3=BAn?= <kabel@kernel.org>
-Date: Tue, 22 Apr 2025 11:57:18 +0200
-Subject: crypto: atmel-sha204a - Set hwrng quality to lowest possible
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-From: Marek Behún <kabel@kernel.org>
-
-commit 8006aff15516a170640239c5a8e6696c0ba18d8e upstream.
-
-According to the review by Bill Cox [1], the Atmel SHA204A random number
-generator produces random numbers with very low entropy.
-
-Set the lowest possible entropy for this chip just to be safe.
-
-[1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-
-Fixes: da001fb651b00e1d ("crypto: atmel-i2c - add support for SHA204A random number generator")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Marek Behún <kabel@kernel.org>
-Acked-by: Ard Biesheuvel <ardb@kernel.org>
-Reviewed-by: Linus Walleij <linus.walleij@linaro.org>
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/crypto/atmel-sha204a.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/drivers/crypto/atmel-sha204a.c
-+++ b/drivers/crypto/atmel-sha204a.c
-@@ -109,6 +109,12 @@ static int atmel_sha204a_probe(struct i2
- i2c_priv->hwrng.read = atmel_sha204a_rng_read;
- i2c_priv->hwrng.quality = 1024;
-
-+ /*
-+ * According to review by Bill Cox [1], this HWRNG has very low entropy.
-+ * [1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-+ */
-+ i2c_priv->hwrng.quality = 1;
-+
- ret = devm_hwrng_register(&client->dev, &i2c_priv->hwrng);
- if (ret)
- dev_warn(&client->dev, "failed to register RNG (%d)\n", ret);
net_sched-hfsc-fix-a-potential-uaf-in-hfsc_dequeue-t.patch
iommu-amd-return-an-error-if-vcpu-affinity-is-set-fo.patch
virtio_console-fix-missing-byte-order-handling-for-cols-and-rows.patch
-crypto-atmel-sha204a-set-hwrng-quality-to-lowest-possible.patch
kvm-svm-allocate-ir-data-using-atomic-allocation.patch
mcb-fix-a-double-free-bug-in-chameleon_parse_gdd.patch
usb-storage-quirk-for-adata-portable-hdd-ch94.patch
+++ /dev/null
-From 8006aff15516a170640239c5a8e6696c0ba18d8e Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Marek=20Beh=C3=BAn?= <kabel@kernel.org>
-Date: Tue, 22 Apr 2025 11:57:18 +0200
-Subject: crypto: atmel-sha204a - Set hwrng quality to lowest possible
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-From: Marek Behún <kabel@kernel.org>
-
-commit 8006aff15516a170640239c5a8e6696c0ba18d8e upstream.
-
-According to the review by Bill Cox [1], the Atmel SHA204A random number
-generator produces random numbers with very low entropy.
-
-Set the lowest possible entropy for this chip just to be safe.
-
-[1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-
-Fixes: da001fb651b00e1d ("crypto: atmel-i2c - add support for SHA204A random number generator")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Marek Behún <kabel@kernel.org>
-Acked-by: Ard Biesheuvel <ardb@kernel.org>
-Reviewed-by: Linus Walleij <linus.walleij@linaro.org>
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/crypto/atmel-sha204a.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/drivers/crypto/atmel-sha204a.c
-+++ b/drivers/crypto/atmel-sha204a.c
-@@ -109,6 +109,12 @@ static int atmel_sha204a_probe(struct i2
- i2c_priv->hwrng.read = atmel_sha204a_rng_read;
- i2c_priv->hwrng.quality = 1024;
-
-+ /*
-+ * According to review by Bill Cox [1], this HWRNG has very low entropy.
-+ * [1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-+ */
-+ i2c_priv->hwrng.quality = 1;
-+
- ret = devm_hwrng_register(&client->dev, &i2c_priv->hwrng);
- if (ret)
- dev_warn(&client->dev, "failed to register RNG (%d)\n", ret);
iommu-amd-return-an-error-if-vcpu-affinity-is-set-fo.patch
riscv-uprobes-add-missing-fence.i-after-building-the.patch
virtio_console-fix-missing-byte-order-handling-for-cols-and-rows.patch
-crypto-atmel-sha204a-set-hwrng-quality-to-lowest-possible.patch
-xen-netfront-handle-null-returned-by-xdp_convert_buff_to_frame.patch
net-selftests-initialize-tcp-header-and-skb-payload-with-zero.patch
net-phy-microchip-force-irq-polling-mode-for-lan88xx.patch
drm-amd-display-fix-gpu-reset-in-multidisplay-config.patch
+++ /dev/null
-From cc3628dcd851ddd8d418bf0c897024b4621ddc92 Mon Sep 17 00:00:00 2001
-From: Alexey Nepomnyashih <sdl@nppct.ru>
-Date: Thu, 17 Apr 2025 12:21:17 +0000
-Subject: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()
-
-From: Alexey Nepomnyashih <sdl@nppct.ru>
-
-commit cc3628dcd851ddd8d418bf0c897024b4621ddc92 upstream.
-
-The function xdp_convert_buff_to_frame() may return NULL if it fails
-to correctly convert the XDP buffer into an XDP frame due to memory
-constraints, internal errors, or invalid data. Failing to check for NULL
-may lead to a NULL pointer dereference if the result is used later in
-processing, potentially causing crashes, data corruption, or undefined
-behavior.
-
-On XDP redirect failure, the associated page must be released explicitly
-if it was previously retained via get_page(). Failing to do so may result
-in a memory leak, as the pages reference count is not decremented.
-
-Cc: stable@vger.kernel.org # v5.9+
-Fixes: 6c5aa6fc4def ("xen networking: add basic XDP support for xen-netfront")
-Signed-off-by: Alexey Nepomnyashih <sdl@nppct.ru>
-Link: https://patch.msgid.link/20250417122118.1009824-1-sdl@nppct.ru
-Signed-off-by: Jakub Kicinski <kuba@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/net/xen-netfront.c | 17 ++++++++++++-----
- 1 file changed, 12 insertions(+), 5 deletions(-)
-
---- a/drivers/net/xen-netfront.c
-+++ b/drivers/net/xen-netfront.c
-@@ -987,20 +987,27 @@ static u32 xennet_run_xdp(struct netfron
- act = bpf_prog_run_xdp(prog, xdp);
- switch (act) {
- case XDP_TX:
-- get_page(pdata);
- xdpf = xdp_convert_buff_to_frame(xdp);
-+ if (unlikely(!xdpf)) {
-+ trace_xdp_exception(queue->info->netdev, prog, act);
-+ break;
-+ }
-+ get_page(pdata);
- err = xennet_xdp_xmit(queue->info->netdev, 1, &xdpf, 0);
-- if (unlikely(!err))
-+ if (unlikely(err <= 0)) {
-+ if (err < 0)
-+ trace_xdp_exception(queue->info->netdev, prog, act);
- xdp_return_frame_rx_napi(xdpf);
-- else if (unlikely(err < 0))
-- trace_xdp_exception(queue->info->netdev, prog, act);
-+ }
- break;
- case XDP_REDIRECT:
- get_page(pdata);
- err = xdp_do_redirect(queue->info->netdev, xdp, prog);
- *need_xdp_flush = true;
-- if (unlikely(err))
-+ if (unlikely(err)) {
- trace_xdp_exception(queue->info->netdev, prog, act);
-+ xdp_return_buff(xdp);
-+ }
- break;
- case XDP_PASS:
- case XDP_DROP:
+++ /dev/null
-From 8006aff15516a170640239c5a8e6696c0ba18d8e Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Marek=20Beh=C3=BAn?= <kabel@kernel.org>
-Date: Tue, 22 Apr 2025 11:57:18 +0200
-Subject: crypto: atmel-sha204a - Set hwrng quality to lowest possible
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-From: Marek Behún <kabel@kernel.org>
-
-commit 8006aff15516a170640239c5a8e6696c0ba18d8e upstream.
-
-According to the review by Bill Cox [1], the Atmel SHA204A random number
-generator produces random numbers with very low entropy.
-
-Set the lowest possible entropy for this chip just to be safe.
-
-[1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-
-Fixes: da001fb651b00e1d ("crypto: atmel-i2c - add support for SHA204A random number generator")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Marek Behún <kabel@kernel.org>
-Acked-by: Ard Biesheuvel <ardb@kernel.org>
-Reviewed-by: Linus Walleij <linus.walleij@linaro.org>
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/crypto/atmel-sha204a.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/drivers/crypto/atmel-sha204a.c
-+++ b/drivers/crypto/atmel-sha204a.c
-@@ -109,6 +109,12 @@ static int atmel_sha204a_probe(struct i2
- i2c_priv->hwrng.read = atmel_sha204a_rng_read;
- i2c_priv->hwrng.quality = 1024;
-
-+ /*
-+ * According to review by Bill Cox [1], this HWRNG has very low entropy.
-+ * [1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-+ */
-+ i2c_priv->hwrng.quality = 1;
-+
- ret = devm_hwrng_register(&client->dev, &i2c_priv->hwrng);
- if (ret)
- dev_warn(&client->dev, "failed to register RNG (%d)\n", ret);
net_sched-hfsc-fix-a-uaf-vulnerability-in-class-hand.patch
net_sched-hfsc-fix-a-potential-uaf-in-hfsc_dequeue-t.patch
virtio_console-fix-missing-byte-order-handling-for-cols-and-rows.patch
-crypto-atmel-sha204a-set-hwrng-quality-to-lowest-possible.patch
mcb-fix-a-double-free-bug-in-chameleon_parse_gdd.patch
usb-storage-quirk-for-adata-portable-hdd-ch94.patch
+++ /dev/null
-From 8006aff15516a170640239c5a8e6696c0ba18d8e Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Marek=20Beh=C3=BAn?= <kabel@kernel.org>
-Date: Tue, 22 Apr 2025 11:57:18 +0200
-Subject: crypto: atmel-sha204a - Set hwrng quality to lowest possible
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-From: Marek Behún <kabel@kernel.org>
-
-commit 8006aff15516a170640239c5a8e6696c0ba18d8e upstream.
-
-According to the review by Bill Cox [1], the Atmel SHA204A random number
-generator produces random numbers with very low entropy.
-
-Set the lowest possible entropy for this chip just to be safe.
-
-[1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-
-Fixes: da001fb651b00e1d ("crypto: atmel-i2c - add support for SHA204A random number generator")
-Cc: <stable@vger.kernel.org>
-Signed-off-by: Marek Behún <kabel@kernel.org>
-Acked-by: Ard Biesheuvel <ardb@kernel.org>
-Reviewed-by: Linus Walleij <linus.walleij@linaro.org>
-Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- drivers/crypto/atmel-sha204a.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/drivers/crypto/atmel-sha204a.c
-+++ b/drivers/crypto/atmel-sha204a.c
-@@ -109,6 +109,12 @@ static int atmel_sha204a_probe(struct i2
- i2c_priv->hwrng.read = atmel_sha204a_rng_read;
- i2c_priv->hwrng.quality = 1024;
-
-+ /*
-+ * According to review by Bill Cox [1], this HWRNG has very low entropy.
-+ * [1] https://www.metzdowd.com/pipermail/cryptography/2014-December/023858.html
-+ */
-+ i2c_priv->hwrng.quality = 1;
-+
- ret = devm_hwrng_register(&client->dev, &i2c_priv->hwrng);
- if (ret)
- dev_warn(&client->dev, "failed to register RNG (%d)\n", ret);
wifi-mac80211-export-ieee80211_purge_tx_queue-for-drivers.patch
wifi-rtw88-use-ieee80211_purge_tx_queue-to-purge-tx-skb.patch
virtio_console-fix-missing-byte-order-handling-for-cols-and-rows.patch
-crypto-atmel-sha204a-set-hwrng-quality-to-lowest-possible.patch
xen-netfront-handle-null-returned-by-xdp_convert_buff_to_frame.patch
net-selftests-initialize-tcp-header-and-skb-payload-with-zero.patch
net-phy-microchip-force-irq-polling-mode-for-lan88xx.patch