freebsd_amp_hwpstate/sys/netipsec
Robert Wing fc21aafe5f ipsec: fix a panic with INVARIANTS
When adding an SPD entry that already exists, a refcount wraparound
panic is encountered. This was caused from dropping a reference on the
wrong security policy.

Fixes:          4920e38fec ("ipsec: fix race condition in key.c")
Reviewed by:	wma
Sponsored by:   Klara Inc.
Differential Revision:	https://reviews.freebsd.org/D33100
2021-12-03 14:22:23 -09:00
..
ah.h
ah_var.h
esp.h
esp_var.h
ipcomp.h
ipcomp_var.h
ipsec.c ipsec: Check PMTU before sending a frame. 2021-08-13 09:22:24 +02:00
ipsec.h ipsec: Check PMTU before sending a frame. 2021-08-13 09:22:24 +02:00
ipsec6.h ipsec: Add support for PMTUD for IPv6 tunnels 2021-09-24 10:27:21 +02:00
ipsec_input.c ipsec: enter epoch before calling into ipsec_run_hhooks 2021-09-21 17:02:41 +00:00
ipsec_mbuf.c
ipsec_mod.c ipsec: Handle ICMP NEEDFRAG message. 2021-08-09 12:01:46 +02:00
ipsec_output.c netinet: Remove unneeded mb_unmapped_to_ext() calls 2021-11-24 13:31:16 -05:00
ipsec_pcb.c
ipsec_support.h ipsec: Handle ICMP NEEDFRAG message. 2021-08-09 12:01:46 +02:00
key.c ipsec: fix a panic with INVARIANTS 2021-12-03 14:22:23 -09:00
key.h
key_debug.c
key_debug.h
key_var.h
keydb.h netipsec/keydb.h: fix typo 2021-08-10 03:45:36 +03:00
keysock.c
keysock.h
subr_ipsec.c ipsec: Handle ICMP NEEDFRAG message. 2021-08-09 12:01:46 +02:00
udpencap.c
xform.h
xform_ah.c
xform_esp.c
xform_ipcomp.c
xform_tcp.c