Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp1007318ybj; Fri, 20 Sep 2019 03:39:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqyDFcAk9YgIOIdYlNV1Rf22LBUQ2TrewP705AwY4+WTjnM++C9MIseIRIPGyxg/A8DvlHcY X-Received: by 2002:a50:9384:: with SMTP id o4mr21090604eda.8.1568975965961; Fri, 20 Sep 2019 03:39:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568975965; cv=none; d=google.com; s=arc-20160816; b=JtqCU+sz+wYiT2DqQaACHHmBFQyGxmzoDNqGinj2T05QtKmeV/NnqxMUx/gcrOjYP8 IwmGGOjC9iujPqBzm81NSVZcYOOmG0gus3mB74aMydYccy5w1xEoamJyBiXb4DxBccWR 3znsZ8A2hUVw5Wdly66Zb0xIKqn/w/sVzPc18MPEG3W8tvheU8cFmzSGOEGPuMTfBnOE MRUqSmI0zLU5N+jUsUSYLu7dxozed+imN0smDzPG3QUXEYfhmkFPWILQ9VWk0raXTO4R QaoNe/zYjKuIQoOOEBdwV4EQniquT4swqRkgTL2eTXnPI9R3SSh8z+QBigM46TplBCGC tlzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NQlahAWE8NzfPZM9BCwjN+MiPVwkBVkYTiYk7YGEHGs=; b=uOFTlB1o9DdbhcTb3B8DcOIgrSZ1gFNw4DBA/gzyO8iybQG18FUeb3HqChSYfbJSJq eFImIyJM9CKfwIO+610W5O1vbal8/XViZDk8fL+qKyiXJup4x5hIHUiVCdTLla6OKYpt bNXYt7oRJiEOZ1D61Ey4NB/x3QL+IdjSRelgvx8CJlwWmeZOiac3ubKwHal86Oyk2WjT pK8zYqXACvNdOj3jwwV/5eO0TVFywNrRqSs/jmXbhYybQXfb7f7/3AC8kV/U1YOiQHqa Fhu99Hmz3JGWrxI5gWyE8zh9sEAJuS9rCjAm11v1Q6oxED2qb1wyXsWxd8HO6K+Hvs39 KVuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=USMpj5Kh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f1si821367eje.338.2019.09.20.03.39.00; Fri, 20 Sep 2019 03:39:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=USMpj5Kh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393735AbfISWNO (ORCPT + 99 others); Thu, 19 Sep 2019 18:13:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:52250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393719AbfISWNK (ORCPT ); Thu, 19 Sep 2019 18:13:10 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B362C21907; Thu, 19 Sep 2019 22:13:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568931190; bh=Gp/qNwM84RkpxRbHnSlX6RTzB2CnRAFH6erNUbPZOR0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=USMpj5Kh52OrIg1braDCN6IAJH9/SmP7LrxuKrQjcxl1JbtNHjtRkbWO/r+j4OK1A OiR5fWetHnaPypDVgZBjj05xarWu6QEUqksQRlJDKAORKTnKWOcFGuETA9aQzRokzM aXW7nB2VmLRlxDtLSvkAOXI7RoEf/FlP1aEhZIXY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pablo Neira Ayuso , Sasha Levin Subject: [PATCH 4.19 34/79] netfilter: nft_flow_offload: missing netlink attribute policy Date: Fri, 20 Sep 2019 00:03:19 +0200 Message-Id: <20190919214810.768461442@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190919214807.612593061@linuxfoundation.org> References: <20190919214807.612593061@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pablo Neira Ayuso [ Upstream commit 14c415862c0630e01712a4eeaf6159a2b1b6d2a4 ] The netlink attribute policy for NFTA_FLOW_TABLE_NAME is missing. Fixes: a3c90f7a2323 ("netfilter: nf_tables: flow offload expression") Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin --- net/netfilter/nft_flow_offload.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/net/netfilter/nft_flow_offload.c b/net/netfilter/nft_flow_offload.c index 69decbe2c9884..1ef8cb789c41a 100644 --- a/net/netfilter/nft_flow_offload.c +++ b/net/netfilter/nft_flow_offload.c @@ -149,6 +149,11 @@ static int nft_flow_offload_validate(const struct nft_ctx *ctx, return nft_chain_validate_hooks(ctx->chain, hook_mask); } +static const struct nla_policy nft_flow_offload_policy[NFTA_FLOW_MAX + 1] = { + [NFTA_FLOW_TABLE_NAME] = { .type = NLA_STRING, + .len = NFT_NAME_MAXLEN - 1 }, +}; + static int nft_flow_offload_init(const struct nft_ctx *ctx, const struct nft_expr *expr, const struct nlattr * const tb[]) @@ -207,6 +212,7 @@ static const struct nft_expr_ops nft_flow_offload_ops = { static struct nft_expr_type nft_flow_offload_type __read_mostly = { .name = "flow_offload", .ops = &nft_flow_offload_ops, + .policy = nft_flow_offload_policy, .maxattr = NFTA_FLOW_MAX, .owner = THIS_MODULE, }; -- 2.20.1