diff options
author | David S. Miller <davem@davemloft.net> | 2017-10-22 08:36:53 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-10-22 08:39:14 -0400 |
commit | f8ddadc4db6c7b7029b6d0e0d9af24f74ad27ca2 (patch) | |
tree | 0a6432aba336bae42313613f4c891bcfce02bd4e /drivers/net/macsec.c | |
parent | bdd091bab8c631bd2801af838e344fad34566410 (diff) | |
parent | b5ac3beb5a9f0ef0ea64cd85faf94c0dc4de0e42 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
There were quite a few overlapping sets of changes here.
Daniel's bug fix for off-by-ones in the new BPF branch instructions,
along with the added allowances for "data_end > ptr + x" forms
collided with the metadata additions.
Along with those three changes came veritifer test cases, which in
their final form I tried to group together properly. If I had just
trimmed GIT's conflict tags as-is, this would have split up the
meta tests unnecessarily.
In the socketmap code, a set of preemption disabling changes
overlapped with the rename of bpf_compute_data_end() to
bpf_compute_data_pointers().
Changes were made to the mv88e6060.c driver set addr method
which got removed in net-next.
The hyperv transport socket layer had a locking change in 'net'
which overlapped with a change of socket state macro usage
in 'net-next'.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/macsec.c')
-rw-r--r-- | drivers/net/macsec.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/drivers/net/macsec.c b/drivers/net/macsec.c index 8948b6adc0c5..2c98152d1e1b 100644 --- a/drivers/net/macsec.c +++ b/drivers/net/macsec.c | |||
@@ -743,6 +743,7 @@ static struct sk_buff *macsec_encrypt(struct sk_buff *skb, | |||
743 | sg_init_table(sg, ret); | 743 | sg_init_table(sg, ret); |
744 | ret = skb_to_sgvec(skb, sg, 0, skb->len); | 744 | ret = skb_to_sgvec(skb, sg, 0, skb->len); |
745 | if (unlikely(ret < 0)) { | 745 | if (unlikely(ret < 0)) { |
746 | aead_request_free(req); | ||
746 | macsec_txsa_put(tx_sa); | 747 | macsec_txsa_put(tx_sa); |
747 | kfree_skb(skb); | 748 | kfree_skb(skb); |
748 | return ERR_PTR(ret); | 749 | return ERR_PTR(ret); |
@@ -955,6 +956,7 @@ static struct sk_buff *macsec_decrypt(struct sk_buff *skb, | |||
955 | sg_init_table(sg, ret); | 956 | sg_init_table(sg, ret); |
956 | ret = skb_to_sgvec(skb, sg, 0, skb->len); | 957 | ret = skb_to_sgvec(skb, sg, 0, skb->len); |
957 | if (unlikely(ret < 0)) { | 958 | if (unlikely(ret < 0)) { |
959 | aead_request_free(req); | ||
958 | kfree_skb(skb); | 960 | kfree_skb(skb); |
959 | return ERR_PTR(ret); | 961 | return ERR_PTR(ret); |
960 | } | 962 | } |