[ 051/149] rtnetlink: Fix VF IFLA policy

From: Greg KH
Date: Fri Mar 30 2012 - 18:25:30 EST

3.2-stable review patch. If anyone has any objections, please let me know.


From: Greg Rose <gregory.v.rose@xxxxxxxxx>

commit 48752f6513012a1b078da08b145d5c40a644f058 upstream.

Add VF spoof check to IFLA policy. The original patch I submitted to
add the spoof checking feature to rtnl failed to add the proper policy
rule that identifies the data type and len. This patch corrects that
oversight. No bugs have been reported against this but it may cause
some problem for the netlink message parsing that uses the policy

Signed-off-by: Greg Rose <gregory.v.rose@xxxxxxxxx>
Tested-by: Sibai Li <sibai.li@xxxxxxxxx>
Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@xxxxxxxxx>
Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>

net/core/rtnetlink.c | 2 ++
1 file changed, 2 insertions(+)

--- a/net/core/rtnetlink.c
+++ b/net/core/rtnetlink.c
@@ -1116,6 +1116,8 @@ static const struct nla_policy ifla_vf_p
.len = sizeof(struct ifla_vf_vlan) },
.len = sizeof(struct ifla_vf_tx_rate) },
+ .len = sizeof(struct ifla_vf_spoofchk) },

static const struct nla_policy ifla_port_policy[IFLA_PORT_MAX+1] = {

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/