Print this page
8541 pfiles does not properly identify PF_KEY or PF_POLICY
Reviewed by: Mike Zeller <mike.zeller@joyent.com>
Reviewed by: Patrick Mooney <patrick.mooney@joyent.com>

Split Close
Expand all
Collapse all
          --- old/usr/src/uts/common/inet/ipsec_impl.h
          +++ new/usr/src/uts/common/inet/ipsec_impl.h
↓ open down ↓ 14 lines elided ↑ open up ↑
  15   15   * If applicable, add the following below this CDDL HEADER, with the
  16   16   * fields enclosed by brackets "[]" replaced with your own identifying
  17   17   * information: Portions Copyright [yyyy] [name of copyright owner]
  18   18   *
  19   19   * CDDL HEADER END
  20   20   */
  21   21  /*
  22   22   * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
  23   23   * Use is subject to license terms.
  24   24   * Copyright (c) 2012 Nexenta Systems, Inc. All rights reserved.
       25 + * Copyright 2017 Joyent, Inc.
  25   26   */
  26   27  
  27   28  #ifndef _INET_IPSEC_IMPL_H
  28   29  #define _INET_IPSEC_IMPL_H
  29   30  
  30   31  #include <inet/ip.h>
  31   32  #include <inet/ipdrop.h>
  32   33  
  33   34  #ifdef  __cplusplus
  34   35  extern "C" {
↓ open down ↓ 68 lines elided ↑ open up ↑
 103  104   */
 104  105  #define IPSEC_TASKQ_MIN 10
 105  106  #define IPSEC_TASKQ_MAX 20
 106  107  
 107  108  /*
 108  109   * So we can access IPsec global variables that live in keysock.c.
 109  110   */
 110  111  extern boolean_t keysock_extended_reg(netstack_t *);
 111  112  extern uint32_t keysock_next_seq(netstack_t *);
 112  113  
      114 +/* Common-code for spdsock and keysock. */
      115 +extern void keysock_spdsock_wput_iocdata(queue_t *, mblk_t *, sa_family_t);
      116 +
 113  117  /*
 114  118   * Locking for ipsec policy rules:
 115  119   *
 116  120   * policy heads: system policy is static; per-conn polheads are dynamic,
 117  121   * and refcounted (and inherited); use atomic refcounts and "don't let
 118  122   * go with both hands".
 119  123   *
 120  124   * policy: refcounted; references from polhead, ipsec_out
 121  125   *
 122  126   * actions: refcounted; referenced from: action hash table, policy, ipsec_out
↓ open down ↓ 911 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX