From 1cb9409df2c093aa6770afe57c88a288ea21c363 Mon Sep 17 00:00:00 2001 From: Zoltan HERPAI Date: Thu, 27 Oct 2016 15:47:09 +0200 Subject: generic/4.1: bump kernel to 4.1.35 Patch 610- is updated as check_entry helper was killed Patch 666- is updated (thanks to Stijn Tintel) Fixes CVE-2016-5195 (dirtycow) Compile-tested on brcm47xx and rb532 Signed-off-by: Zoltan HERPAI --- .../patches-4.1/103-packet_allow_empty_payload.patch | 17 ----------------- 1 file changed, 17 deletions(-) delete mode 100644 target/linux/generic/patches-4.1/103-packet_allow_empty_payload.patch (limited to 'target/linux/generic/patches-4.1/103-packet_allow_empty_payload.patch') diff --git a/target/linux/generic/patches-4.1/103-packet_allow_empty_payload.patch b/target/linux/generic/patches-4.1/103-packet_allow_empty_payload.patch deleted file mode 100644 index 2b9c4b00a2..0000000000 --- a/target/linux/generic/patches-4.1/103-packet_allow_empty_payload.patch +++ /dev/null @@ -1,17 +0,0 @@ -Fix a regression in the af_packet code that was breaking PPPoE - -pppd sends packets with only a header and no payload. - -Signed-off-by: Felix Fietkau - ---- a/net/packet/af_packet.c -+++ b/net/packet/af_packet.c -@@ -2112,7 +2112,7 @@ static void tpacket_destruct_skb(struct - static bool ll_header_truncated(const struct net_device *dev, int len) - { - /* net device doesn't like empty head */ -- if (unlikely(len <= dev->hard_header_len)) { -+ if (unlikely(len < dev->hard_header_len)) { - net_warn_ratelimited("%s: packet size is too short (%d <= %d)\n", - current->comm, len, dev->hard_header_len); - return true; -- cgit v1.2.3