Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp704604ybz; Fri, 1 May 2020 07:06:49 -0700 (PDT) X-Google-Smtp-Source: APiQypI7XFkxo0Pe/XyC5E3tCxcooL4D5K671AoLG5dy5o0RNkSPDo+wJlLcgR6R9KPr8mzqHiJR X-Received: by 2002:adf:f4d1:: with SMTP id h17mr4206781wrp.69.1588342009084; Fri, 01 May 2020 07:06:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588342009; cv=none; d=google.com; s=arc-20160816; b=eJTwiOrsWulvuzghLDyt/Vp5xJOtnilTS+ZdeA/jhQYAafpP2yBMW/Uta7vCeXOQo9 vu2dCv/kcrsCJBo4FPdzusxgI1CyhH+0yvoA7dXvBl/zD7b2hmkartbk0JYBw6eC1fpn ujsnJtOFTaSNjpu9G08KBMqpRMxfXLSDkV9kwt3+XoIMmq05/ZidKfbNTDI3G7PCyoNp o5GW4TDZGWiE5jy9s8eMlgpwF4qOjtulXUXYplR6kEOQeDQeCPKqPH5oMkrJT+Ty9SrN ZgNZr0C/aWuMbPsnUpuox51EjQM8HVfXWNmkeZmIU1TBdkdXSXErIutaDoe+m+C6dk5F pG3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IVwFzmOKVix4oq7QRyNMwaqz6T/BZxEtFlSZW76u5VQ=; b=ctVzxKR9qPIrVvuJRxJjAl32Bx9nKriW3sf+nEDj7qWM8VFyQSGq1WYRqSRuc8HXTX HyZtR+wpDhwbjnGS10dmmqKMXFgoIo2982f6xIFTyaoXI1qGYuE99Y2DTgPQvCClmpDX 7h8a/K5SvY9VNJGok4x4UoYVBsebZ+GTXvvUFISGH+ZxdjGwjTT7+LUPD4TXXuQmTIgR hnc5wvDUYQz57GkP4VOw0t4k/TSct2AnwBZP7KaPhBZRaPYTckKxtwpEnB7A5yD94Oiw q5k5w3XPSsZ+zLTinqwaqXnYh9oOKxCW1j0ub+R0aLRUoWdEfUlYVGDvCvfAQnjxI0oa 6a0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mj4OlbWm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a6si1882835edb.367.2020.05.01.07.06.21; Fri, 01 May 2020 07:06:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mj4OlbWm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729899AbgEAOBo (ORCPT + 99 others); Fri, 1 May 2020 10:01:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:46316 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728854AbgEANZY (ORCPT ); Fri, 1 May 2020 09:25:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1607E2166E; Fri, 1 May 2020 13:25:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588339524; bh=Qs78r1hJQ7eIwNzO01q2Oa9PHG7c6wH58tUjB1MxkYA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mj4OlbWmWcK+FcSqEKPsDvYEq2j4o1ORl+XrFdDO0dmO5BJNThducBtkEvIJzF6kC b2w0kkW1de/lGwo1uH7DxE05lMaK+Ctc8umspVqttEMoFYs07nr3RtjsRAQKp4nVcl KIH+PlD1kfnQkBk5GZkMeWwrLqpr/Hza73MwIMtA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Ahern , "David S. Miller" Subject: [PATCH 4.4 24/70] xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish Date: Fri, 1 May 2020 15:21:12 +0200 Message-Id: <20200501131521.946706660@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200501131513.302599262@linuxfoundation.org> References: <20200501131513.302599262@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Ahern [ Upstream commit 0c922a4850eba2e668f73a3f1153196e09abb251 ] IPSKB_XFRM_TRANSFORMED and IP6SKB_XFRM_TRANSFORMED are skb flags set by xfrm code to tell other skb handlers that the packet has been passed through the xfrm output functions. Simplify the code and just always set them rather than conditionally based on netfilter enabled thus making the flag available for other users. Signed-off-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/xfrm4_output.c | 2 -- net/ipv6/xfrm6_output.c | 2 -- 2 files changed, 4 deletions(-) --- a/net/ipv4/xfrm4_output.c +++ b/net/ipv4/xfrm4_output.c @@ -75,9 +75,7 @@ int xfrm4_output_finish(struct sock *sk, { memset(IPCB(skb), 0, sizeof(*IPCB(skb))); -#ifdef CONFIG_NETFILTER IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED; -#endif return xfrm_output(sk, skb); } --- a/net/ipv6/xfrm6_output.c +++ b/net/ipv6/xfrm6_output.c @@ -125,9 +125,7 @@ int xfrm6_output_finish(struct sock *sk, { memset(IP6CB(skb), 0, sizeof(*IP6CB(skb))); -#ifdef CONFIG_NETFILTER IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED; -#endif return xfrm_output(sk, skb); }