1. 30 Jul, 2020 4 commits
    • Tom Parkin's avatar
      l2tp: don't export tunnel and session free functions · 52016e25
      Tom Parkin authored
      Tunnel and session instances are reference counted, and shouldn't be
      directly freed by pseudowire code.
      
      Rather than exporting l2tp_tunnel_free and l2tp_session_free, make them
      private to l2tp_core.c, and export the refcount functions instead.
      
      In order to do this, the refcount functions cannot be declared as
      inline.  Since the codepaths which take and drop tunnel and session
      references are not directly in the datapath this shouldn't cause
      performance issues.
      Signed-off-by: default avatarTom Parkin <tparkin@katalix.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      52016e25
    • Tom Parkin's avatar
      l2tp: don't export __l2tp_session_unhash · b2aecfe8
      Tom Parkin authored
      When __l2tp_session_unhash was first added it was used outside of
      l2tp_core.c, but that's no longer the case.
      
      As such, there's no longer a need to export the function.  Make it
      private inside l2tp_core.c, and relocate it to avoid having to declare
      the function prototype in l2tp_core.h.
      
      Since the function is no longer used outside l2tp_core.c, remove the
      "__" prefix since we don't need to indicate anything special about its
      expected use to callers.
      Signed-off-by: default avatarTom Parkin <tparkin@katalix.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      b2aecfe8
    • Jian Yang's avatar
      selftests: txtimestamp: add flag for timestamp validation tolerance. · d3239425
      Jian Yang authored
      The txtimestamp selftest sets a fixed 500us tolerance. This value was
      arrived at experimentally. Some platforms have higher variances. Make
      this adjustable by adding the following flag:
      
      -t N: tolerance (usec) for timestamp validation.
      Signed-off-by: default avatarJian Yang <jianyang@google.com>
      Acked-by: default avatarWillem de Bruijn <willemb@google.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      d3239425
    • David S. Miller's avatar
      Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next · 3c2d19cb
      David S. Miller authored
      Steffen Klassert says:
      
      ====================
      pull request (net-next): ipsec-next 2020-07-30
      
      Please note that I did the first time now --no-ff merges
      of my testing branch into the master branch to include
      the [PATCH 0/n] message of a patchset. Please let me
      know if this is desirable, or if I should do it any
      different.
      
      1) Introduce a oseq-may-wrap flag to disable anti-replay
         protection for manually distributed ICVs as suggested
         in RFC 4303. From Petr Vaněk.
      
      2) Patchset to fully support IPCOMP for vti4, vti6 and
         xfrm interfaces. From Xin Long.
      
      3) Switch from a linear list to a hash list for xfrm interface
         lookups. From Eyal Birger.
      
      4) Fixes to not register one xfrm(6)_tunnel object twice.
         From Xin Long.
      
      5) Fix two compile errors that were introduced with the
         IPCOMP support for vti and xfrm interfaces.
         Also from Xin Long.
      
      6) Make the policy hold queue work with VTI. This was
         forgotten when VTI was implemented.
      
      Please pull or let me know if there are problems.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      3c2d19cb
  2. 29 Jul, 2020 36 commits