On Thu, Aug 20, 2020 at 08:16:08PM +0200, Antony Antony wrote:
> XFRMA_SEC_CTX was not cloned from the old to the new.
> Migrate this attribute during XFRMA_MSG_MIGRATE
> 
> Signed-off-by: Antony Antony <antony.ant...@secunet.com>
> ---
>  net/xfrm/xfrm_state.c | 28 ++++++++++++++++++++++++++++
>  1 file changed, 28 insertions(+)
> 
> diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
> index 20a12c67a931..dbcb71b800b8 100644
> --- a/net/xfrm/xfrm_state.c
> +++ b/net/xfrm/xfrm_state.c
> @@ -1441,6 +1441,30 @@ int xfrm_state_add(struct xfrm_state *x)
>  EXPORT_SYMBOL(xfrm_state_add);
>  
>  #ifdef CONFIG_XFRM_MIGRATE
> +static inline bool clone_security(struct xfrm_state *x, struct xfrm_sec_ctx 
> *security)
> +{
> +     struct xfrm_user_sec_ctx *uctx;
> +     int size = sizeof(*uctx) + security->ctx_len;
> +     int err;
> +
> +     uctx = kmalloc(size, GFP_KERNEL);
> +     if (!uctx)
> +             return true;
> +
> +     uctx->exttype = XFRMA_SEC_CTX;
> +     uctx->len = size;
> +     uctx->ctx_doi = security->ctx_doi;
> +     uctx->ctx_alg = security->ctx_alg;
> +     uctx->ctx_len = security->ctx_len;
> +     memcpy(uctx + 1, security->ctx_str, security->ctx_len);
> +     err = security_xfrm_state_alloc(x, uctx);
> +     kfree(uctx);
> +     if (err)
> +             return true;

Returning 'true' on memory allocation errors is a bit odd,
please return -ENOMEM instead.

Reply via email to