[prev in list] [next in list] [prev in thread] [next in thread]
List: openbsd-cvs
Subject: CVS: cvs.openbsd.org: src
From: Vitaliy Makkoveev <mvs () cvs ! openbsd ! org>
Date: 2022-11-30 10:20:37
Message-ID: 4f7e070c5e1f8042 () cvs ! openbsd ! org
[Download RAW message or body]
CVSROOT: /cvs
Module name: src
Changes by: mvs@cvs.openbsd.org 2022/11/30 03:20:37
Modified files:
sys/kern : syscalls.master
Log message:
Unlock getsockopt(2) and setsockopt(2). Unlock them both because at
protocol layer they follow the same (*pr_ctloutput)() handlers.
At sockets layer we touch only per-socket data, which is solock()
protected.
At protocol layer, udp(4), unix(4) and key management sockets have no
(*pr_ctloutput)() handlers. route_ctloutput() touches only per socket
data, which is solock() protected. inet{,6} globals are protected by
netlock, which is solock() backend for corresponding sockets.
ok bluhm@
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic