diff options
author | David S. Miller <davem@davemloft.net> | 2014-03-25 20:29:20 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2014-03-25 20:29:20 -0400 |
commit | 04f58c88542b6b351efb4eea01134eb672e22e6e (patch) | |
tree | 47bb617212f8c8951f35730e324bdc43487a01ca /net/xfrm | |
parent | 0fc31966035d7a540c011b6c967ce8eae1db121b (diff) | |
parent | 632b06aa2842b12c6d6a510ec080fb6ebdb38ea5 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
Conflicts:
Documentation/devicetree/bindings/net/micrel-ks8851.txt
net/core/netpoll.c
The net/core/netpoll.c conflict is a bug fix in 'net' happening
to code which is completely removed in 'net-next'.
In micrel-ks8851.txt we simply have overlapping changes.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/xfrm')
-rw-r--r-- | net/xfrm/xfrm_user.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index cdd9e9c7ff0e..8f131c10a6f3 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c | |||
@@ -1246,7 +1246,7 @@ static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct nlattr **attrs | |||
1246 | return 0; | 1246 | return 0; |
1247 | 1247 | ||
1248 | uctx = nla_data(rt); | 1248 | uctx = nla_data(rt); |
1249 | return security_xfrm_policy_alloc(&pol->security, uctx); | 1249 | return security_xfrm_policy_alloc(&pol->security, uctx, GFP_KERNEL); |
1250 | } | 1250 | } |
1251 | 1251 | ||
1252 | static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut, | 1252 | static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut, |
@@ -1651,7 +1651,7 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1651 | if (rt) { | 1651 | if (rt) { |
1652 | struct xfrm_user_sec_ctx *uctx = nla_data(rt); | 1652 | struct xfrm_user_sec_ctx *uctx = nla_data(rt); |
1653 | 1653 | ||
1654 | err = security_xfrm_policy_alloc(&ctx, uctx); | 1654 | err = security_xfrm_policy_alloc(&ctx, uctx, GFP_KERNEL); |
1655 | if (err) | 1655 | if (err) |
1656 | return err; | 1656 | return err; |
1657 | } | 1657 | } |
@@ -1953,7 +1953,7 @@ static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1953 | if (rt) { | 1953 | if (rt) { |
1954 | struct xfrm_user_sec_ctx *uctx = nla_data(rt); | 1954 | struct xfrm_user_sec_ctx *uctx = nla_data(rt); |
1955 | 1955 | ||
1956 | err = security_xfrm_policy_alloc(&ctx, uctx); | 1956 | err = security_xfrm_policy_alloc(&ctx, uctx, GFP_KERNEL); |
1957 | if (err) | 1957 | if (err) |
1958 | return err; | 1958 | return err; |
1959 | } | 1959 | } |