diff options
author | 2020-11-02 16:14:45 +0000 | |
---|---|---|
committer | 2020-11-09 07:34:56 +0100 | |
commit | dbd7ae5154d5fff7e84a9f3010bb06499017ef29 (patch) | |
tree | 35183e43eb4bd53618964f00349bf74134ee9f87 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | net: marvell: prestera: fix compilation with CONFIG_BRIDGE=m (diff) | |
download | linux-dev-dbd7ae5154d5fff7e84a9f3010bb06499017ef29.tar.xz linux-dev-dbd7ae5154d5fff7e84a9f3010bb06499017ef29.zip |
xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
xfrm_xlate32() translates 64-bit message provided by kernel to be sent
for 32-bit listener (acknowledge or monitor). Translator code doesn't
expect XFRMA_UNSPEC attribute as it doesn't know its payload.
Kernel never attaches such attribute, but a user can.
I've searched if any opensource does it and the answer is no.
Nothing on github and google finds only tfcproject that has such code
commented-out.
What will happen if a user sends a netlink message with XFRMA_UNSPEC
attribute? Ipsec code ignores this attribute. But if there is a
monitor-process or 32-bit user requested ack - kernel will try to
translate such message and will hit WARN_ONCE() in xfrm_xlate64_attr().
Deal with XFRMA_UNSPEC by copying the attribute payload with
xfrm_nla_cpy(). In result, the default switch-case in xfrm_xlate64_attr()
becomes an unused code. Leave those 3 lines in case a new xfrm attribute
will be added.
Fixes: 5461fc0c8d9f ("xfrm/compat: Add 64=>32-bit messages translator")
Reported-by: syzbot+a7e701c8385bd8543074@syzkaller.appspotmail.com
Signed-off-by: Dmitry Safonov <dima@arista.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions