Message ID | 20250324061855.4116819-9-steffen.klassert@secunet.com (mailing list archive) |
---|---|
State | Accepted |
Commit | 399e0aae5aab30f911098a0430204e9034ff78bb |
Delegated to: | Netdev Maintainers |
Headers | show |
Series | [1/8] xfrm: prevent high SEQ input in non-ESN mode | expand |
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 6551e588fe52..30970d40a454 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c @@ -3294,7 +3294,7 @@ struct dst_entry *xfrm_lookup_with_ifid(struct net *net, ok: xfrm_pols_put(pols, drop_pols); - if (dst && dst->xfrm && + if (dst->xfrm && (dst->xfrm->props.mode == XFRM_MODE_TUNNEL || dst->xfrm->props.mode == XFRM_MODE_IPTFS)) dst->flags |= DST_XFRM_TUNNEL;