From 28f60a554d7e2fa30aaa5b78ce8258993e8c440c Mon Sep 17 00:00:00 2001 From: Martin Pieuchot Date: Thu, 5 Jul 2018 15:31:05 +0000 Subject: Put back sendto(2) and sendmsg(2) under KERNEL_LOCK(). malloc(9) is apparently not mpsafe as found the hardway by sthen@. --- sys/kern/syscalls.master | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/sys/kern/syscalls.master b/sys/kern/syscalls.master index 0ebc8a58672..0dedfc15685 100644 --- a/sys/kern/syscalls.master +++ b/sys/kern/syscalls.master @@ -1,4 +1,4 @@ -; $OpenBSD: syscalls.master,v 1.184 2018/06/27 16:38:23 mpi Exp $ +; $OpenBSD: syscalls.master,v 1.185 2018/07/05 15:31:04 mpi Exp $ ; $NetBSD: syscalls.master,v 1.32 1996/04/23 10:24:21 mycroft Exp $ ; @(#)syscalls.master 8.2 (Berkeley) 1/13/94 @@ -90,7 +90,7 @@ #endif 27 STD { ssize_t sys_recvmsg(int s, struct msghdr *msg, \ int flags); } -28 STD NOLOCK { ssize_t sys_sendmsg(int s, \ +28 STD { ssize_t sys_sendmsg(int s, \ const struct msghdr *msg, int flags); } 29 STD { ssize_t sys_recvfrom(int s, void *buf, size_t len, \ int flags, struct sockaddr *from, \ @@ -261,7 +261,7 @@ 130 OBSOL oftruncate 131 STD { int sys_flock(int fd, int how); } 132 STD { int sys_mkfifo(const char *path, mode_t mode); } -133 STD NOLOCK { ssize_t sys_sendto(int s, const void *buf, \ +133 STD { ssize_t sys_sendto(int s, const void *buf, \ size_t len, int flags, const struct sockaddr *to, \ socklen_t tolen); } 134 STD { int sys_shutdown(int s, int how); } -- cgit v1.2.3