summaryrefslogtreecommitdiffstats
path: root/drivers/cpufreq
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2019-07-30 14:57:18 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2019-08-05 11:29:50 +0200
commit0ca1bbb7f4212aeef83a67a8aed9da1d84567fcc (patch)
tree543aae3493b8355faba862bfb30e43fd9ccdc4cf /drivers/cpufreq
parent5e5412c365a32e452daa762eac36121cb8a370bb (diff)
downloadlinux-0ca1bbb7f4212aeef83a67a8aed9da1d84567fcc.tar.bz2
selftests: netfilter: extend flowtable test script for ipsec
'flow offload' expression should not offload flows that will be subject to ipsec, but it does. This results in a connectivity blackhole for the affected flows -- first packets will go through (offload happens after established state is reached), but all remaining ones bypass ipsec encryption and are thus discarded by the peer. This can be worked around by adding "rt ipsec exists accept" before the 'flow offload' rule matches. This test case will fail, support for such flows is added in next patch. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'drivers/cpufreq')
0 files changed, 0 insertions, 0 deletions