From af35a2fc0654ddadb55449b38e52945b357f7eaa Mon Sep 17 00:00:00 2001 From: mvs Date: Tue, 11 Jan 2022 08:09:14 +0000 Subject: [PATCH] Unlock getpeername(2). For inet and unix sockets it follows the code which was unlocked with accept(2) unlocking. For key management and route domain sockets it just copies the read-only data. ok bluhm@ --- sys/kern/syscalls.master | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sys/kern/syscalls.master b/sys/kern/syscalls.master index 38eee093cd4..bd7832e979d 100644 --- a/sys/kern/syscalls.master +++ b/sys/kern/syscalls.master @@ -1,4 +1,4 @@ -; $OpenBSD: syscalls.master,v 1.221 2021/12/23 18:50:31 guenther Exp $ +; $OpenBSD: syscalls.master,v 1.222 2022/01/11 08:09:14 mvs Exp $ ; $NetBSD: syscalls.master,v 1.32 1996/04/23 10:24:21 mycroft Exp $ ; @(#)syscalls.master 8.2 (Berkeley) 1/13/94 @@ -97,7 +97,7 @@ socklen_t *fromlenaddr); } 30 STD NOLOCK { int sys_accept(int s, struct sockaddr *name, \ socklen_t *anamelen); } -31 STD { int sys_getpeername(int fdes, struct sockaddr *asa, \ +31 STD NOLOCK { int sys_getpeername(int fdes, struct sockaddr *asa, \ socklen_t *alen); } 32 STD { int sys_getsockname(int fdes, struct sockaddr *asa, \ socklen_t *alen); } -- 2.20.1