diff options
author | fernando@oss.ntt.co <fernando@oss.ntt.co> | 2008-10-23 06:27:19 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-10-31 08:06:03 +0100 |
commit | a432226614c5616e3cfd211e0acffa0acfb4770c (patch) | |
tree | 2189d97e001e8ad9173ec40c27f6a28ab109db2f /mm | |
parent | net: Really remove all of LOOPBACK_TSO code. (diff) | |
download | linux-a432226614c5616e3cfd211e0acffa0acfb4770c.tar.xz linux-a432226614c5616e3cfd211e0acffa0acfb4770c.zip |
xfrm: do not leak ESRCH to user space
I noticed that, under certain conditions, ESRCH can be leaked from the
xfrm layer to user space through sys_connect. In particular, this seems
to happen reliably when the kernel fails to resolve a template either
because the AF_KEY receive buffer being used by racoon is full or
because the SA entry we are trying to use is in XFRM_STATE_EXPIRED
state.
However, since this could be a transient issue it could be argued that
EAGAIN would be more appropriate. Besides this error code is not even
documented in the man page for sys_connect (as of man-pages 3.07).
Signed-off-by: Fernando Luis Vazquez Cao <fernando@oss.ntt.co.jp>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions