commit | 62679a8d3aa4ba15ff63574a43e5686078d7b804 | [log] [tgz] |
---|---|---|
author | Vincent Bernat <vincent@bernat.ch> | Sat Nov 07 20:35:15 2020 +0100 |
committer | Jakub Kicinski <kuba@kernel.org> | Wed Nov 11 16:41:31 2020 -0800 |
tree | be6c0ffa947bc68d8dadf69371111e34f903ff49 | |
parent | 1af5318c00a8acc33a90537af49b3f23f72a2c4b [diff] |
net: evaluate net.ipvX.conf.all.disable_policy and disable_xfrm The disable_policy and disable_xfrm are a per-interface sysctl to disable IPsec policy or encryption on an interface. However, while a "all" variant is exposed, it was a noop since it was never evaluated. We use the usual "or" logic for this kind of sysctls. Signed-off-by: Vincent Bernat <vincent@bernat.ch> Signed-off-by: Jakub Kicinski <kuba@kernel.org>