From 81510a5bf00dabcdbb94e0d712e955f0e4a72197 Mon Sep 17 00:00:00 2001 From: mvs Date: Thu, 24 Feb 2022 07:41:51 +0000 Subject: [PATCH] Unlock getsockname(2) syscall. For inet and UNIX sockets it fills passed 'sockaddr' structure with socket's address. For key management and route domain sockets it just returns error. ok bluhm@ --- sys/kern/syscalls.master | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sys/kern/syscalls.master b/sys/kern/syscalls.master index bd7832e979d..db4c2c8b067 100644 --- a/sys/kern/syscalls.master +++ b/sys/kern/syscalls.master @@ -1,4 +1,4 @@ -; $OpenBSD: syscalls.master,v 1.222 2022/01/11 08:09:14 mvs Exp $ +; $OpenBSD: syscalls.master,v 1.223 2022/02/24 07:41:51 mvs Exp $ ; $NetBSD: syscalls.master,v 1.32 1996/04/23 10:24:21 mycroft Exp $ ; @(#)syscalls.master 8.2 (Berkeley) 1/13/94 @@ -99,7 +99,7 @@ socklen_t *anamelen); } 31 STD NOLOCK { int sys_getpeername(int fdes, struct sockaddr *asa, \ socklen_t *alen); } -32 STD { int sys_getsockname(int fdes, struct sockaddr *asa, \ +32 STD NOLOCK { int sys_getsockname(int fdes, struct sockaddr *asa, \ socklen_t *alen); } 33 STD { int sys_access(const char *path, int amode); } 34 STD { int sys_chflags(const char *path, u_int flags); } -- 2.20.1