android_kernel_msm-6.1_noth.../include/uapi
Steffen Klassert 2d151d3907 xfrm: Add possibility to set the default to block if we have no policy
As the default we assume the traffic to pass, if we have no
matching IPsec policy. With this patch, we have a possibility to
change this default from allow to block. It can be configured
via netlink. Each direction (input/output/forward) can be
configured separately. With the default to block configuered,
we need allow policies for all packet flows we accept.
We do not use default policy lookup for the loopback device.

v1->v2
 - fix compiling when XFRM is disabled
 - Reported-by: kernel test robot <lkp@intel.com>

Co-developed-by: Christian Langrock <christian.langrock@secunet.com>
Signed-off-by: Christian Langrock <christian.langrock@secunet.com>
Co-developed-by: Antony Antony <antony.antony@secunet.com>
Signed-off-by: Antony Antony <antony.antony@secunet.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
2021-07-21 09:49:19 +02:00
..
asm-generic arch, mm: wire up memfd_secret system call where relevant 2021-07-08 11:48:21 -07:00
drm Merge tag 'drm-msm-next-2021-06-23b' of https://gitlab.freedesktop.org/drm/msm into drm-next 2021-06-24 07:21:16 +10:00
linux xfrm: Add possibility to set the default to block if we have no policy 2021-07-21 09:49:19 +02:00
misc habanalabs: added open_stats info ioctl 2021-06-18 15:23:42 +03:00
mtd
rdma Merge branch 'mlx5_realtime_ts' into rdma.git for-next 2021-06-22 15:08:39 -03:00
scsi
sound ALSA: rawmidi: Add framing mode 2021-05-17 16:02:44 +02:00
video
xen
Kbuild