Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4454210ybz; Tue, 28 Apr 2020 11:34:07 -0700 (PDT) X-Google-Smtp-Source: APiQypLdT2DxMnyqw6dP16lU1fs5ap7mRz0PHDugIRJo2OfYAK6IYGK3knRau+rt58JeTQLsxPbq X-Received: by 2002:a17:906:9518:: with SMTP id u24mr26151564ejx.320.1588098847358; Tue, 28 Apr 2020 11:34:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588098847; cv=none; d=google.com; s=arc-20160816; b=kwvevF52RucbfQ+4ozQqevs4oNrb7t96lo76T89SB19kYoHdtpY/LXiKRGtx0lKiaP uWFs3ECDppcZtzmq/sSCNWab+HQnMmwjQ8Ybi0OxvKnXjUmJ4pMT7oeIQj0W1q5NmyXt plxvKdixXOm6FYJOq2t3fYJSK0rZM4BOo48h+bWpZxo79EN9u1f20urocZVSQcytpn3t YxPUALZ6WmX3sCLUhq9gWc+84sqS/Ma8d7I1ZO/dAbXDEg4aMa2is8KaMLGI0KJySFZm q8b4XluWz8SNqc/GbjtPcQoMkNczIaiZYOLe1EI4MIp3dixAB63SzvOJMqtMF0tgqmA9 /K8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=HUYApr1F+H86bN+xeJKxyiDjFndQQEF2LgNebvTfBDU=; b=DwYPqIyCd5nko6WP9LhwjGFpPeGHKbZpLxl4O5zjbgkQ0c3KBL3KRJLTMezKDZnkfq OCMh0ShRSjIibuxCgu8/FOwVKYyOloGBK34BDaeoy/71B4O+fKjo9jLjL0uHCEKBfuwd f80fpHZrYCT3uQFLZVTpdOYAI4g8NxhZqZVXfw8grcriDbCxpfJLZs8SMJYNWfJQKOqy qu2WUoBnjmPhjDFNuVI5gcYbSYkUxvwlXf0ITjnj7jZwAYs5F8Ecs0TqmgEU9qsbZ9rX +wH9G1rIprSks+0SwaobMTahYlXmsJKpCQaB1MB3wB7/gUc+8IsKK7W77+87p4smG60q qYPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DGkelCfx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pv20si2179886ejb.295.2020.04.28.11.33.43; Tue, 28 Apr 2020 11:34:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DGkelCfx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729325AbgD1S3V (ORCPT + 99 others); Tue, 28 Apr 2020 14:29:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:42940 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729331AbgD1S3S (ORCPT ); Tue, 28 Apr 2020 14:29:18 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ED36D20B80; Tue, 28 Apr 2020 18:29:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588098558; bh=VCDnRq6KNn8pBZy4kFj3bnJQnDEccmaJeGcDMIiba5g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DGkelCfxd5ZXDgOnIIhOh2isyVDeyyqPwhH7VnbEonqXECrWuQCaQg3Fd2n/LGudL nrLRP9FRyAhkZhr9sGOvqiRctG0MlikPR0o4zOOVM8uDyvuIrR3dSMS6HXPw7J9MS5 LrgunHFzwOwayd4dool5d4ksH2QzSOQym9kb8+FU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Ahern , "David S. Miller" Subject: [PATCH 5.6 072/167] xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish Date: Tue, 28 Apr 2020 20:24:08 +0200 Message-Id: <20200428182234.043027809@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182225.451225420@linuxfoundation.org> References: <20200428182225.451225420@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Ahern [ Upstream commit 0c922a4850eba2e668f73a3f1153196e09abb251 ] IPSKB_XFRM_TRANSFORMED and IP6SKB_XFRM_TRANSFORMED are skb flags set by xfrm code to tell other skb handlers that the packet has been passed through the xfrm output functions. Simplify the code and just always set them rather than conditionally based on netfilter enabled thus making the flag available for other users. Signed-off-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/xfrm4_output.c | 2 -- net/ipv6/xfrm6_output.c | 2 -- 2 files changed, 4 deletions(-) --- a/net/ipv4/xfrm4_output.c +++ b/net/ipv4/xfrm4_output.c @@ -58,9 +58,7 @@ int xfrm4_output_finish(struct sock *sk, { memset(IPCB(skb), 0, sizeof(*IPCB(skb))); -#ifdef CONFIG_NETFILTER IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED; -#endif return xfrm_output(sk, skb); } --- a/net/ipv6/xfrm6_output.c +++ b/net/ipv6/xfrm6_output.c @@ -111,9 +111,7 @@ int xfrm6_output_finish(struct sock *sk, { memset(IP6CB(skb), 0, sizeof(*IP6CB(skb))); -#ifdef CONFIG_NETFILTER IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED; -#endif return xfrm_output(sk, skb); }