Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp672357ybz; Fri, 1 May 2020 06:34:22 -0700 (PDT) X-Google-Smtp-Source: APiQypK5T24YEIc8dOjYoqnNAIm4cSgMHCJlXQxLOkjWoyAUgTuMEEvAbwcAyunWigKiWSgsvKiB X-Received: by 2002:aa7:d1cc:: with SMTP id g12mr3622953edp.84.1588340062336; Fri, 01 May 2020 06:34:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588340062; cv=none; d=google.com; s=arc-20160816; b=Q4VdNTbzjCeeyuHfb5nkLFwS4Xz1HxtuZjxSxVZ6NqGeqpRMlfsuh8G/6tifok+bkw 1PB5ooCRh+EiP1YAILFwV6Jh6c7wkenV96aWehQJdg/4I7yADU4zSmRbRXPorSYTmc6e 729T6kglJZdUyMSAOthz84dOqJfetCkYhdbOBkI37oviCj1gOaU9CpbEyS3Zfj+5OO7c ZiUWyoOFqDg620E6FoYJbVYBXNH2lzj4QRb6/3VGS9+78iUjUZ8vVxlwh7EcZO6pYuOf AJuuJDXHuGYEehK/cT98JkdzoAHwatRhlW4cl8sa2rnLWmJmxbMUpdd2WhQCzmF/rMnn 0J0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IVwFzmOKVix4oq7QRyNMwaqz6T/BZxEtFlSZW76u5VQ=; b=Bue2Ag114us4b6Ts3rS9+EYo18uesd9Y2kvJoV/G/JZrypAyRFMXF51q/2uMzCzfaV LhWSwCOYOa+vuNdJAmZ43Yx38lNmmALuCqhPn1XtHNc0FiL21hNMhaszWF/59/oV2cJx 1jSNfvzUk/FpsdzREv5C3zxUtydTtRdN9dkWRlqDQXBsM5fdfdowyHpRWjqui4JSDtQy edzo9woaAAVQHbYAYgRZiJv9zp43D6Ge/nO5d36CI6RqOdLF7l1sbJ2cQtKwNuP1T3/z f8OocO431hHQJJY53Y/ZE0/LEKk3oxLoIADt7338EIqFuE7WYAzHFil8OGJh8fmnuD8p 2jjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wUQz6Tx4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p7si1736181edx.98.2020.05.01.06.33.58; Fri, 01 May 2020 06:34:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wUQz6Tx4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729746AbgEAN3O (ORCPT + 99 others); Fri, 1 May 2020 09:29:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:52448 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729170AbgEAN3E (ORCPT ); Fri, 1 May 2020 09:29:04 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4225B2166E; Fri, 1 May 2020 13:29:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588339743; bh=Qs78r1hJQ7eIwNzO01q2Oa9PHG7c6wH58tUjB1MxkYA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wUQz6Tx4ml+aaTiWsKxazYhoPWuSsRQWxK3kfVijUzmSEtJVPVL74/RYgbD9ycEor M/OruPCVilPpCzenhoBHWJgvokakzMKdiC66KBfpqb717tMJYkWxpViUTD9PB6ScF4 eZw+vYbS9C3c8V4J32VWc7NhU9npXAcGv60B0QWI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Ahern , "David S. Miller" Subject: [PATCH 4.9 28/80] xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish Date: Fri, 1 May 2020 15:21:22 +0200 Message-Id: <20200501131523.355882658@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200501131513.810761598@linuxfoundation.org> References: <20200501131513.810761598@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Ahern [ Upstream commit 0c922a4850eba2e668f73a3f1153196e09abb251 ] IPSKB_XFRM_TRANSFORMED and IP6SKB_XFRM_TRANSFORMED are skb flags set by xfrm code to tell other skb handlers that the packet has been passed through the xfrm output functions. Simplify the code and just always set them rather than conditionally based on netfilter enabled thus making the flag available for other users. Signed-off-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/xfrm4_output.c | 2 -- net/ipv6/xfrm6_output.c | 2 -- 2 files changed, 4 deletions(-) --- a/net/ipv4/xfrm4_output.c +++ b/net/ipv4/xfrm4_output.c @@ -75,9 +75,7 @@ int xfrm4_output_finish(struct sock *sk, { memset(IPCB(skb), 0, sizeof(*IPCB(skb))); -#ifdef CONFIG_NETFILTER IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED; -#endif return xfrm_output(sk, skb); } --- a/net/ipv6/xfrm6_output.c +++ b/net/ipv6/xfrm6_output.c @@ -125,9 +125,7 @@ int xfrm6_output_finish(struct sock *sk, { memset(IP6CB(skb), 0, sizeof(*IP6CB(skb))); -#ifdef CONFIG_NETFILTER IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED; -#endif return xfrm_output(sk, skb); }