mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-16 09:26:58 +02:00
Merge pull request #1682 from flatcar-linux/kai/revert-ipsec-change
sys-kernel: Revert change to forbid using xfrm id 0
This commit is contained in:
commit
a0378f9338
@ -0,0 +1 @@
|
||||
- Reverted the Linux kernel change to forbid xfrm id 0 for IPSec state because it broke Cilium ([Flatcar#626](https://github.com/flatcar-linux/Flatcar/issues/626), [PR#1682](https://github.com/flatcar-linux/coreos-overlay/pull/1682))
|
@ -36,4 +36,5 @@ UNIPATCH_LIST="
|
||||
${PATCH_DIR}/z0002-tools-objtool-Makefile-Don-t-fail-on-fallthrough-wit.patch \
|
||||
${PATCH_DIR}/z0003-PCI-hv-Make-the-code-arch-neutral-by-adding-arch-spe.patch \
|
||||
${PATCH_DIR}/z0004-PCI-hv-Add-arm64-Hyper-V-vPCI-support.patch \
|
||||
${PATCH_DIR}/z0005-Revert-xfrm-state-and-policy-should-fail-if-XFRMA_IF.patch \
|
||||
"
|
||||
|
@ -0,0 +1,67 @@
|
||||
From 509a0cc7c909899d76b2d7b0afd0124966358515 Mon Sep 17 00:00:00 2001
|
||||
From: Kai Lueke <kailuke@microsoft.com>
|
||||
Date: Mon, 28 Feb 2022 19:40:26 +0100
|
||||
Subject: [PATCH 2/2] Revert "xfrm: state and policy should fail if XFRMA_IF_ID
|
||||
0"
|
||||
|
||||
This reverts commit 68ac0f3810e76a853b5f7b90601a05c3048b8b54 because it
|
||||
breaks userspace (e.g., Cilium is affected because it used id 0 for the
|
||||
dummy state https://github.com/cilium/cilium/pull/18789).
|
||||
|
||||
Signed-off-by: Kai Lueke <kailuke@microsoft.com>
|
||||
---
|
||||
net/xfrm/xfrm_user.c | 21 +++------------------
|
||||
1 file changed, 3 insertions(+), 18 deletions(-)
|
||||
|
||||
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
|
||||
index 8cd6c8129004..be89a8ac54a4 100644
|
||||
--- a/net/xfrm/xfrm_user.c
|
||||
+++ b/net/xfrm/xfrm_user.c
|
||||
@@ -630,13 +630,8 @@ static struct xfrm_state *xfrm_state_construct(struct net *net,
|
||||
|
||||
xfrm_smark_init(attrs, &x->props.smark);
|
||||
|
||||
- if (attrs[XFRMA_IF_ID]) {
|
||||
+ if (attrs[XFRMA_IF_ID])
|
||||
x->if_id = nla_get_u32(attrs[XFRMA_IF_ID]);
|
||||
- if (!x->if_id) {
|
||||
- err = -EINVAL;
|
||||
- goto error;
|
||||
- }
|
||||
- }
|
||||
|
||||
err = __xfrm_init_state(x, false, attrs[XFRMA_OFFLOAD_DEV]);
|
||||
if (err)
|
||||
@@ -1432,13 +1427,8 @@ static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
|
||||
|
||||
mark = xfrm_mark_get(attrs, &m);
|
||||
|
||||
- if (attrs[XFRMA_IF_ID]) {
|
||||
+ if (attrs[XFRMA_IF_ID])
|
||||
if_id = nla_get_u32(attrs[XFRMA_IF_ID]);
|
||||
- if (!if_id) {
|
||||
- err = -EINVAL;
|
||||
- goto out_noput;
|
||||
- }
|
||||
- }
|
||||
|
||||
if (p->info.seq) {
|
||||
x = xfrm_find_acq_byseq(net, mark, p->info.seq);
|
||||
@@ -1751,13 +1741,8 @@ static struct xfrm_policy *xfrm_policy_construct(struct net *net, struct xfrm_us
|
||||
|
||||
xfrm_mark_get(attrs, &xp->mark);
|
||||
|
||||
- if (attrs[XFRMA_IF_ID]) {
|
||||
+ if (attrs[XFRMA_IF_ID])
|
||||
xp->if_id = nla_get_u32(attrs[XFRMA_IF_ID]);
|
||||
- if (!xp->if_id) {
|
||||
- err = -EINVAL;
|
||||
- goto error;
|
||||
- }
|
||||
- }
|
||||
|
||||
return xp;
|
||||
error:
|
||||
--
|
||||
2.35.1
|
||||
|
Loading…
Reference in New Issue
Block a user