summaryrefslogtreecommitdiff
path: root/net/sched/sch_mqprio_lib.c
diff options
context:
space:
mode:
authorJakub Kicinski <kuba@kernel.org>2023-05-17 06:52:34 +0300
committerJakub Kicinski <kuba@kernel.org>2023-05-17 06:52:35 +0300
commit6ad85ed0ebf7ece0f376950a6b3b3c6048093d35 (patch)
tree427331d15b3d613fcdaa5002850c14a1d0ffb49b /net/sched/sch_mqprio_lib.c
parent47d55c62bdb9ce55283243f61b0575d4a9ce3744 (diff)
parent8680407b6f8f5fba59e8f1d63c869abc280f04df (diff)
downloadlinux-6ad85ed0ebf7ece0f376950a6b3b3c6048093d35.tar.xz
Merge tag 'ipsec-2023-05-16' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec
Steffen Klassert says: ==================== pull request (net): ipsec 2023-05-16 1) Don't check the policy default if we have an allow policy. Fix from Sabrina Dubroca. 2) Fix netdevice refount usage on offload. From Leon Romanovsky. 3) Use netdev_put instead of dev_puti to correctly release the netdev on failure in xfrm_dev_policy_add. From Leon Romanovsky. 4) Revert "Fix XFRM-I support for nested ESP tunnels" This broke Netfilter policy matching. From Martin Willi. 5) Reject optional tunnel/BEET mode templates in outbound policies on netlink and pfkey sockets. From Tobias Brunner. 6) Check if_id in inbound policy/secpath match to make it symetric to the outbound codepath. From Benedict Wong. * tag 'ipsec-2023-05-16' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec: xfrm: Check if_id in inbound policy/secpath match af_key: Reject optional tunnel/BEET mode templates in outbound policies xfrm: Reject optional tunnel/BEET mode templates in outbound policies Revert "Fix XFRM-I support for nested ESP tunnels" xfrm: Fix leak of dev tracker xfrm: release all offloaded policy memory xfrm: don't check the default policy if the policy allows the packet ==================== Link: https://lore.kernel.org/r/20230516052405.2677554-1-steffen.klassert@secunet.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'net/sched/sch_mqprio_lib.c')
0 files changed, 0 insertions, 0 deletions