summaryrefslogtreecommitdiffstats
path: root/net/xfrm/xfrm_interface_core.c
diff options
context:
space:
mode:
authorSabrina Dubroca <sd@queasysnail.net>2023-04-04 15:12:16 +0200
committerSteffen Klassert <steffen.klassert@secunet.com>2023-04-06 12:04:31 +0200
commit430cac487400494c19a8b85299e979bb07b4671f (patch)
tree87017aa943c6ed74db012c7ce9c2a89d712a009b /net/xfrm/xfrm_interface_core.c
parentnet: stmmac: Add queue reset into stmmac_xdp_open() function (diff)
downloadlinux-430cac487400494c19a8b85299e979bb07b4671f.tar.xz
linux-430cac487400494c19a8b85299e979bb07b4671f.zip
xfrm: don't check the default policy if the policy allows the packet
The current code doesn't let a simple "allow" policy counteract a default policy blocking all incoming packets: ip x p setdefault in block ip x p a src 192.168.2.1/32 dst 192.168.2.2/32 dir in action allow At this stage, we have an allow policy (with or without transforms) for this packet. It doesn't matter what the default policy says, since the policy we looked up lets the packet through. The case of a blocking policy is already handled separately, so we can remove this check. Fixes: 2d151d39073a ("xfrm: Add possibility to set the default to block if we have no policy") Signed-off-by: Sabrina Dubroca <sd@queasysnail.net> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Diffstat (limited to 'net/xfrm/xfrm_interface_core.c')
0 files changed, 0 insertions, 0 deletions