linux/net/xfrm
Steffen Klassert 7cb8a93968 xfrm: Allow inserting policies with matching mark and different priorities
We currently can not insert policies with mark and mask
such that some flows would be matched from both policies.
We make this possible when the priority of these policies
are different. If both policies match a flow, the one with
the higher priority is used.

Reported-by: Emmanuel Thierry <emmanuel.thierry@telecom-bretagne.eu>
Reported-by: Romain Kuntz <r.kuntz@ipflavors.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
2013-02-11 14:07:01 +01:00
..
Kconfig
Makefile
xfrm_algo.c pf_key/xfrm_algo: prepare pf_key and xfrm_algo for new algorithms without pfkey support 2013-02-01 10:13:43 +01:00
xfrm_hash.c
xfrm_hash.h
xfrm_input.c
xfrm_ipcomp.c net: xfrm: use __this_cpu_read per-cpu helper 2012-11-13 14:38:52 +01:00
xfrm_output.c xfrm: fix a unbalanced lock 2013-02-01 10:33:40 +01:00
xfrm_policy.c xfrm: Allow inserting policies with matching mark and different priorities 2013-02-11 14:07:01 +01:00
xfrm_proc.c xfrm: removes a superfluous check and add a statistic 2013-01-07 11:18:58 +01:00
xfrm_replay.c
xfrm_state.c xfrm: use separated locks to protect pointers of struct xfrm_state_afinfo 2013-01-17 10:03:57 +01:00
xfrm_sysctl.c net: Don't export sysctls to unprivileged users 2012-11-18 20:30:55 -05:00
xfrm_user.c net: Allow userns root to control llc, netfilter, netlink, packet, and xfrm 2012-11-18 20:32:45 -05:00