diff options
Diffstat (limited to '1512_af_key-initialize-satype-in-key_notify_policy_flush.patch')
-rw-r--r-- | 1512_af_key-initialize-satype-in-key_notify_policy_flush.patch | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/1512_af_key-initialize-satype-in-key_notify_policy_flush.patch b/1512_af_key-initialize-satype-in-key_notify_policy_flush.patch new file mode 100644 index 00000000..a28fbc48 --- /dev/null +++ b/1512_af_key-initialize-satype-in-key_notify_policy_flush.patch @@ -0,0 +1,29 @@ +From 85dfb745ee40232876663ae206cba35f24ab2a40 Mon Sep 17 00:00:00 2001 +From: Nicolas Dichtel <nicolas.dichtel@6wind.com> +Date: Mon, 18 Feb 2013 16:24:20 +0100 +Subject: [PATCH] af_key: initialize satype in key_notify_policy_flush() + +This field was left uninitialized. Some user daemons perform check against this +field. + +Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> +Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com> +--- + net/key/af_key.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/net/key/af_key.c b/net/key/af_key.c +index 9ef7985..d5a4a79 100644 +--- a/net/key/af_key.c ++++ b/net/key/af_key.c +@@ -2694,6 +2694,7 @@ static int key_notify_policy_flush(const struct km_event *c) + hdr->sadb_msg_pid = c->portid; + hdr->sadb_msg_version = PF_KEY_V2; + hdr->sadb_msg_errno = (uint8_t) 0; ++ hdr->sadb_msg_satype = SADB_SATYPE_UNSPEC; + hdr->sadb_msg_len = (sizeof(struct sadb_msg) / sizeof(uint64_t)); + pfkey_broadcast(skb_out, GFP_ATOMIC, BROADCAST_ALL, NULL, c->net); + return 0; +-- +1.8.2.1 + |