add missing splx(), when outgoing interface queue is full on tunnelled
IPsec packet output. KAME PR 280.
This commit is contained in:
parent
b0976c1455
commit
0150f3ec9b
@ -475,6 +475,7 @@ ah4_input(m, va_alist)
|
||||
s = splimp();
|
||||
if (IF_QFULL(&ipintrq)) {
|
||||
ipsecstat.in_inval++;
|
||||
splx(s);
|
||||
goto fail;
|
||||
}
|
||||
IF_ENQUEUE(&ipintrq, m);
|
||||
@ -879,6 +880,7 @@ ah6_input(mp, offp, proto)
|
||||
s = splimp();
|
||||
if (IF_QFULL(&ip6intrq)) {
|
||||
ipsec6stat.in_inval++;
|
||||
splx(s);
|
||||
goto fail;
|
||||
}
|
||||
IF_ENQUEUE(&ip6intrq, m);
|
||||
|
@ -392,6 +392,7 @@ noreplaycheck:
|
||||
s = splimp();
|
||||
if (IF_QFULL(&ipintrq)) {
|
||||
ipsecstat.in_inval++;
|
||||
splx(s);
|
||||
goto bad;
|
||||
}
|
||||
IF_ENQUEUE(&ipintrq, m);
|
||||
@ -735,6 +736,7 @@ noreplaycheck:
|
||||
s = splimp();
|
||||
if (IF_QFULL(&ip6intrq)) {
|
||||
ipsec6stat.in_inval++;
|
||||
splx(s);
|
||||
goto bad;
|
||||
}
|
||||
IF_ENQUEUE(&ip6intrq, m);
|
||||
|
Loading…
x
Reference in New Issue
Block a user