Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp616519ybl; Fri, 24 Jan 2020 06:30:50 -0800 (PST) X-Google-Smtp-Source: APXvYqxhsKDKymFf6lDrReDPm/jk9/WpaUokMAU0K7XOcMt9yZAemPswwnov6YsG18xDyb/zJzOZ X-Received: by 2002:aca:cd92:: with SMTP id d140mr2146203oig.68.1579876250704; Fri, 24 Jan 2020 06:30:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579876250; cv=none; d=google.com; s=arc-20160816; b=jsVPQu9gcmyOC8tnuz3afjNvKt/RHwd7efYo8untGbl1iJwCntdHgfTtkQ6ztzYfUw lZbyPxM5iPm1uWLgfj2juKl2t8B1jWwDZ6VkxLSU7R9HMtp1qpfRi6cqLwz2qoYIyqtW zK9MVOiuLzDT4M5bWeeAVbmtDYBPnVh4HK6af1rm73mcom6Jr8V+cUXGuPS/B3I6ZW9T 8373drG6zdIdgwrDMpOmwM3QPh874vwU6wWilMs9WK5Jusj9cob0tBphiYYE2lXNf1yT WiylV75FrCeiC/iIs+N1Vb2xrOfUYRLDOWOeo5nMNKAIXAmnAJIKiRSaR0ULmNnP7u0z +XOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ta9cWRKU36lpW8sjFeScYLCkx/UnJqooMcrhL8VXNDM=; b=DtH6JLem2YWST8BIoJXb8zn1vqVBJ7NmoPqkA63uMMrqmEAYgXoAhg/4Xn9QZe4m0U kVzTxrCQnoJqhyaEoM+ELaOtVQilh+oXG+6XhuaMX78R0xH+ggElFqeN4z8MOa9tarbf AHBlSZyVqLf7d1m3CbFzlE5s/IM2u+ZHAFBEf/Q8aBJqRFGheNHPH/OihqJUg4fYngs1 3KXB1ZeGnUib/+g+jqlKASobqVvzbjOi5xq6arq+7BzdWQuBRXh1fpjcQ+Xjl7M/LTIK YPyNC27UJ3vfoPsgciXMbS9xvXar+e2v6Dd749Y/Z+yc7F/8gXQQuhwxbGDwoDYjaQmY xhnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kGX6F5hx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j16si2990183otq.23.2020.01.24.06.30.39; Fri, 24 Jan 2020 06:30:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kGX6F5hx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403968AbgAXL10 (ORCPT + 99 others); Fri, 24 Jan 2020 06:27:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:42782 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403964AbgAXL1V (ORCPT ); Fri, 24 Jan 2020 06:27:21 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 312462077C; Fri, 24 Jan 2020 11:27:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579865240; bh=JUlF0rsjF4RXVsxOlMbOpMgAL5iLIfl+/UmI6BBmOZQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kGX6F5hxc+iAS9at4MboKA878BYCaM1DeDybSxh0Kp0f4V2gZStUVE41HPpdTPmNt hqS1Wr6dNuIIP5MSDWsGgtGeC83iufY1Z4p95RAPoHGGevOi+PMcWWJjJso2+qJ40U 059jNWF7G+EiAF/sbmyvZFO/Ge+JL4agQvQFDMEE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolas Dichtel , Steffen Klassert , Sasha Levin Subject: [PATCH 4.19 479/639] xfrm interface: ifname may be wrong in logs Date: Fri, 24 Jan 2020 10:30:49 +0100 Message-Id: <20200124093148.189524185@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Dichtel [ Upstream commit e0aaa332e6a97dae57ad59cdb19e21f83c3d081c ] The ifname is copied when the interface is created, but is never updated later. In fact, this property is used only in one error message, where the netdevice pointer is available, thus let's use it. Fixes: f203b76d7809 ("xfrm: Add virtual xfrm interfaces") Signed-off-by: Nicolas Dichtel Signed-off-by: Steffen Klassert Signed-off-by: Sasha Levin --- include/net/xfrm.h | 1 - net/xfrm/xfrm_interface.c | 10 +--------- 2 files changed, 1 insertion(+), 10 deletions(-) diff --git a/include/net/xfrm.h b/include/net/xfrm.h index fb9b19a3b7496..48dc1ce2170d8 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h @@ -1054,7 +1054,6 @@ static inline void xfrm_dst_destroy(struct xfrm_dst *xdst) void xfrm_dst_ifdown(struct dst_entry *dst, struct net_device *dev); struct xfrm_if_parms { - char name[IFNAMSIZ]; /* name of XFRM device */ int link; /* ifindex of underlying L2 interface */ u32 if_id; /* interface identifyer */ }; diff --git a/net/xfrm/xfrm_interface.c b/net/xfrm/xfrm_interface.c index d6a3cdf7885c3..4ee512622e93d 100644 --- a/net/xfrm/xfrm_interface.c +++ b/net/xfrm/xfrm_interface.c @@ -145,8 +145,6 @@ static int xfrmi_create(struct net_device *dev) if (err < 0) goto out; - strcpy(xi->p.name, dev->name); - dev_hold(dev); xfrmi_link(xfrmn, xi); @@ -293,7 +291,7 @@ xfrmi_xmit2(struct sk_buff *skb, struct net_device *dev, struct flowi *fl) if (tdev == dev) { stats->collisions++; net_warn_ratelimited("%s: Local routing loop detected!\n", - xi->p.name); + dev->name); goto tx_err_dst_release; } @@ -648,12 +646,6 @@ static int xfrmi_newlink(struct net *src_net, struct net_device *dev, int err; xfrmi_netlink_parms(data, &p); - - if (!tb[IFLA_IFNAME]) - return -EINVAL; - - nla_strlcpy(p.name, tb[IFLA_IFNAME], IFNAMSIZ); - xi = xfrmi_locate(net, &p); if (xi) return -EEXIST; -- 2.20.1