From patchwork Thu Nov 16 10:00:38 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steffen Klassert X-Patchwork-Id: 838472 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3ycxbb32cSz9t62 for ; Thu, 16 Nov 2017 21:01:31 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934073AbdKPKB2 (ORCPT ); Thu, 16 Nov 2017 05:01:28 -0500 Received: from a.mx.secunet.com ([62.96.220.36]:60110 "EHLO a.mx.secunet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932257AbdKPKAz (ORCPT ); Thu, 16 Nov 2017 05:00:55 -0500 Received: from localhost (localhost [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id CDC482006E; Thu, 16 Nov 2017 11:00:54 +0100 (CET) X-Virus-Scanned: by secunet Received: from a.mx.secunet.com ([127.0.0.1]) by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gJg1YN2zxb6i; Thu, 16 Nov 2017 11:00:49 +0100 (CET) Received: from mail-essen-01.secunet.de (mail-essen-01.secunet.de [10.53.40.204]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by a.mx.secunet.com (Postfix) with ESMTPS id 94BEE2006F; Thu, 16 Nov 2017 11:00:49 +0100 (CET) Received: from gauss2.secunet.de (10.182.7.193) by mail-essen-01.secunet.de (10.53.40.204) with Microsoft SMTP Server id 14.3.361.1; Thu, 16 Nov 2017 11:00:48 +0100 Received: by gauss2.secunet.de (Postfix, from userid 1000) id BAE38140349; Thu, 16 Nov 2017 11:00:48 +0100 (CET) From: Steffen Klassert To: David Miller CC: Herbert Xu , Steffen Klassert , Subject: pull request (net): ipsec 2017-11-16 Date: Thu, 16 Nov 2017 11:00:38 +0100 Message-ID: <1510826440-19452-1-git-send-email-steffen.klassert@secunet.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 X-G-Data-MailSecurity-for-Exchange-State: 0 X-G-Data-MailSecurity-for-Exchange-Error: 0 X-G-Data-MailSecurity-for-Exchange-Sender: 23 X-G-Data-MailSecurity-for-Exchange-Server: d65e63f7-5c15-413f-8f63-c0d707471c93 X-EXCLAIMER-MD-CONFIG: 2c86f778-e09b-4440-8b15-867914633a10 X-G-Data-MailSecurity-for-Exchange-Guid: 64DBF41D-6B35-423B-AAF3-A6E0838F81BA Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org 1) Copy policy family in clone_policy, otherwise this can trigger a BUG_ON in af_key. From Herbert Xu. 2) Revert "xfrm: Fix stack-out-of-bounds read in xfrm_state_find." This added a regression with transport mode when no addresses are configured on the policy template. Both patches are stable candidates. Please pull or let me know if there are problems. Thanks! The following changes since commit b39545684a90ef3374abc0969d64c7bc540d128d: Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net (2017-11-11 09:10:39 -0800) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git master for you to fetch changes up to 94802151894d482e82c324edf2c658f8e6b96508: Revert "xfrm: Fix stack-out-of-bounds read in xfrm_state_find." (2017-11-15 06:42:28 +0100) ---------------------------------------------------------------- Herbert Xu (1): xfrm: Copy policy family in clone_policy Steffen Klassert (1): Revert "xfrm: Fix stack-out-of-bounds read in xfrm_state_find." net/xfrm/xfrm_policy.c | 30 +++++++++++++++++++----------- 1 file changed, 19 insertions(+), 11 deletions(-)