Support SO_OVERFLOWED on PF_KEY sockets

The original author is hsuenaga@IIJ
This commit is contained in:
ozaki-r 2017-05-25 04:45:59 +00:00
parent 69db236409
commit acdabb990b

View File

@ -1,4 +1,4 @@
/* $NetBSD: keysock.c,v 1.57 2017/05/25 04:35:02 ozaki-r Exp $ */
/* $NetBSD: keysock.c,v 1.58 2017/05/25 04:45:59 ozaki-r Exp $ */
/* $FreeBSD: src/sys/netipsec/keysock.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $ */
/* $KAME: keysock.c,v 1.25 2001/08/13 20:07:41 itojun Exp $ */
@ -32,7 +32,7 @@
*/
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.57 2017/05/25 04:35:02 ozaki-r Exp $");
__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.58 2017/05/25 04:45:59 ozaki-r Exp $");
/* This code has derived from sys/net/rtsock.c on FreeBSD2.2.5 */
@ -191,6 +191,7 @@ key_sendup0(
PFKEY_STATINC(PFKEY_STAT_IN_NOMEM);
m_freem(m);
error = ENOBUFS;
rp->rcb_socket->so_rcv.sb_overflowed++;
} else
error = 0;
sorwakeup(rp->rcb_socket);