Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3407746rwa; Tue, 23 Aug 2022 04:23:30 -0700 (PDT) X-Google-Smtp-Source: AA6agR6N1+aZ20ENEqBrddh3BO/g3Uq950FHeHvHEfWLR7a6x0LqtkZB8mun3uF+RcmKFjYMvF8c X-Received: by 2002:a05:6a00:35c4:b0:536:cddc:583a with SMTP id dc4-20020a056a0035c400b00536cddc583amr6197852pfb.40.1661253809808; Tue, 23 Aug 2022 04:23:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661253809; cv=none; d=google.com; s=arc-20160816; b=KxszaRmSBuXQj+eRTW8TzShEEiiJGo+Bd051c9ByUKUmJDx271/VMhOYnNoRe/HsDw 3bpUWT89jOH63hR556sWHjHCqGN4eZhMi6BQCPVBnjwK6LwubS6ausAqJX652mi+5L4t 0OQzDNoONfakSFzrWiqQa/aOdIspwPGXaFKMjHmUYfugDL6WcgVefRj3zFD8cG9sCU9f OnLMyMHzqi9Lw89GQtzRulh837zl3IQjizVi0WGuyE22K10QK9081bsMt5BjcuLt7skC hLPXNhYHnyfV7lIZ65PbnrLuQ0wOzM7FFHvYkdq3Zw/ZQLH5cEVAGV0zU5NozS5TrJ42 X7og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=X4dWj1jcg374Rg+BNw7VlvRqxUEbhETz2FxjymXrpzw=; b=fyPfKwtWB+gUHXzoHOwRLLP9Qj2tAts8VE67C1Yoldi/0BDaBtwWuszHMpqQNjmVA+ pdyrzmrbR8QDJPqCu6n8bEsihas/n5pzF25feKXcHAoPWFQisUJ9OoajTIerNZfd2h3E 1P9SjD5G8ONQuvGyflWoaoJ83gHaa+mBMjZj9ZNKaSr3AEbaW0Ddr8zwLssMCDnQDRCs sOV46lBXZk3HrNiAlKxqxJSUMFXpjomt/Aev89SiVPAwK82ZFry4KuCv2Kf+L86xTQFW iKzKCn3rB2vnVVP3yuu/yPULja02hTpUoRtE6CbCF8KdMgdhNqoJ7f3qBunBnsPuC/8J KF6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AWHqa+AN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g10-20020a636b0a000000b0041a4f434cecsi12037785pgc.798.2022.08.23.04.23.18; Tue, 23 Aug 2022 04:23:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AWHqa+AN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351066AbiHWJzt (ORCPT + 99 others); Tue, 23 Aug 2022 05:55:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40740 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344438AbiHWJyE (ORCPT ); Tue, 23 Aug 2022 05:54:04 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 298DC6A49A; Tue, 23 Aug 2022 01:46:22 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9CCFD6153C; Tue, 23 Aug 2022 08:45:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 91F55C433D6; Tue, 23 Aug 2022 08:45:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661244357; bh=bfj1rlsQXGQ8Wn6QfQwt2YuiHr8K9dNN60BDvqIIFzk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AWHqa+ANDAEjO0GwqjFp3L5ECdlJJv8fIjgtubPkaosekCOypYnqL9sW92rGvRUem lVODCU1eoVbrJeQSC60AV7uiMb8zs8aD3pljJeEbAl1X5mX1dVXMSMzq/pKqZdZeB5 zE5jwDjJrAL/tao4Is0/3AzKW3LHRYWgHpiB/dUo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Guillaume Nault , Matthias May , Jakub Kicinski Subject: [PATCH 5.15 078/244] ipv6: do not use RT_TOS for IPv6 flowlabel Date: Tue, 23 Aug 2022 10:23:57 +0200 Message-Id: <20220823080101.656251834@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220823080059.091088642@linuxfoundation.org> References: <20220823080059.091088642@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Matthias May commit ab7e2e0dfa5d37540ab1dc5376e9a2cb9188925d upstream. According to Guillaume Nault RT_TOS should never be used for IPv6. Quote: RT_TOS() is an old macro used to interprete IPv4 TOS as described in the obsolete RFC 1349. It's conceptually wrong to use it even in IPv4 code, although, given the current state of the code, most of the existing calls have no consequence. But using RT_TOS() in IPv6 code is always a bug: IPv6 never had a "TOS" field to be interpreted the RFC 1349 way. There's no historical compatibility to worry about. Fixes: 571912c69f0e ("net: UDP tunnel encapsulation module for tunnelling different protocols like MPLS, IP, NSH etc.") Acked-by: Guillaume Nault Signed-off-by: Matthias May Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/ipv6/ip6_output.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/net/ipv6/ip6_output.c +++ b/net/ipv6/ip6_output.c @@ -1289,8 +1289,7 @@ struct dst_entry *ip6_dst_lookup_tunnel( fl6.daddr = info->key.u.ipv6.dst; fl6.saddr = info->key.u.ipv6.src; prio = info->key.tos; - fl6.flowlabel = ip6_make_flowinfo(RT_TOS(prio), - info->key.label); + fl6.flowlabel = ip6_make_flowinfo(prio, info->key.label); dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6, NULL);