summaryrefslogtreecommitdiff
path: root/sys/netinet/ip_icmp.c
diff options
context:
space:
mode:
authorAlexander Bluhm <bluhm@cvs.openbsd.org>2022-03-22 18:17:31 +0000
committerAlexander Bluhm <bluhm@cvs.openbsd.org>2022-03-22 18:17:31 +0000
commitefc3101a722ac647497a9d79674ebcb74141053b (patch)
treecae29849f8f4e4919782874b99f9a11a9055e5ee /sys/netinet/ip_icmp.c
parent2d2feb84443b95e5e7900bfc5821ce2bbb711ba4 (diff)
For raw IP packets rip_input() traverses the loop of all PCBs. From
there it calls sbappendaddr() while holding the raw table mutex. This ends in sorwakeup() where we finally grab the kernel lock while holding a mutex. Witness detects this misuse. Use the same solution as for PCB notify. Collect the affected PCBs in a temporary list. The list is protected by exclusive net lock. syzbot+ebe3f03a472fecf5e42e@syzkaller.appspotmail.com OK claudio@
Diffstat (limited to 'sys/netinet/ip_icmp.c')
0 files changed, 0 insertions, 0 deletions