summaryrefslogtreecommitdiffstats
path: root/sys/kern
diff options
context:
space:
mode:
authormpi <mpi@openbsd.org>2017-08-09 14:22:58 +0000
committermpi <mpi@openbsd.org>2017-08-09 14:22:58 +0000
commit411c440090c6f91e3da76c39ecea500fae7d4350 (patch)
treec164b53b9cf13409d3c40a4a62cea05bedda031b /sys/kern
parentFix filtering so it works after the change to only show windows if they (diff)
downloadwireguard-openbsd-411c440090c6f91e3da76c39ecea500fae7d4350.tar.xz
wireguard-openbsd-411c440090c6f91e3da76c39ecea500fae7d4350.zip
Move the socket lock "above" sosetopt(), sogetopt() and sosplice().
Protect the fields modifieds by sosetopt() and simplify the dance with the stars. ok bluhm@
Diffstat (limited to 'sys/kern')
-rw-r--r--sys/kern/uipc_socket.c40
-rw-r--r--sys/kern/uipc_syscalls.c21
2 files changed, 24 insertions, 37 deletions
diff --git a/sys/kern/uipc_socket.c b/sys/kern/uipc_socket.c
index 64a65603f25..10f3760d469 100644
--- a/sys/kern/uipc_socket.c
+++ b/sys/kern/uipc_socket.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: uipc_socket.c,v 1.198 2017/07/27 12:05:36 mpi Exp $ */
+/* $OpenBSD: uipc_socket.c,v 1.199 2017/08/09 14:22:58 mpi Exp $ */
/* $NetBSD: uipc_socket.c,v 1.21 1996/02/04 02:17:52 christos Exp $ */
/*
@@ -1073,7 +1073,9 @@ sosplice(struct socket *so, int fd, off_t max, struct timeval *tv)
struct file *fp;
struct socket *sosp;
struct sosplice *sp;
- int s, error = 0;
+ int error = 0;
+
+ soassertlocked(so);
if (sosplice_taskq == NULL)
sosplice_taskq = taskq_create("sosplice", 1, IPL_SOFTNET, 0);
@@ -1097,17 +1099,14 @@ sosplice(struct socket *so, int fd, off_t max, struct timeval *tv)
/* If no fd is given, unsplice by removing existing link. */
if (fd < 0) {
- s = solock(so);
/* Lock receive buffer. */
if ((error = sblock(so, &so->so_rcv,
(so->so_state & SS_NBIO) ? M_NOWAIT : M_WAITOK)) != 0) {
- sounlock(s);
return (error);
}
if (so->so_sp->ssp_socket)
sounsplice(so, so->so_sp->ssp_socket, 1);
sbunlock(&so->so_rcv);
- sounlock(s);
return (0);
}
@@ -1129,17 +1128,14 @@ sosplice(struct socket *so, int fd, off_t max, struct timeval *tv)
pool_put(&sosplice_pool, sp);
}
- s = solock(so);
/* Lock both receive and send buffer. */
if ((error = sblock(so, &so->so_rcv,
(so->so_state & SS_NBIO) ? M_NOWAIT : M_WAITOK)) != 0) {
- sounlock(s);
FRELE(fp, curproc);
return (error);
}
if ((error = sblock(so, &sosp->so_snd, M_WAITOK)) != 0) {
sbunlock(&so->so_rcv);
- sounlock(s);
FRELE(fp, curproc);
return (error);
}
@@ -1185,7 +1181,6 @@ sosplice(struct socket *so, int fd, off_t max, struct timeval *tv)
release:
sbunlock(&sosp->so_snd);
sbunlock(&so->so_rcv);
- sounlock(s);
FRELE(fp, curproc);
return (error);
}
@@ -1565,15 +1560,15 @@ sowwakeup(struct socket *so)
int
sosetopt(struct socket *so, int level, int optname, struct mbuf *m0)
{
- int s, error = 0;
+ int error = 0;
struct mbuf *m = m0;
+ soassertlocked(so);
+
if (level != SOL_SOCKET) {
if (so->so_proto && so->so_proto->pr_ctloutput) {
- s = solock(so);
error = (*so->so_proto->pr_ctloutput)(PRCO_SETOPT, so,
level, optname, m0);
- sounlock(s);
return (error);
}
error = ENOPROTOOPT;
@@ -1647,14 +1642,11 @@ sosetopt(struct socket *so, int level, int optname, struct mbuf *m0)
error = EINVAL;
goto bad;
}
- s = solock(so);
if (sbcheckreserve(cnt, so->so_snd.sb_wat) ||
sbreserve(so, &so->so_snd, cnt)) {
- sounlock(s);
error = ENOBUFS;
goto bad;
}
- sounlock(s);
so->so_snd.sb_wat = cnt;
break;
@@ -1663,14 +1655,11 @@ sosetopt(struct socket *so, int level, int optname, struct mbuf *m0)
error = EINVAL;
goto bad;
}
- s = solock(so);
if (sbcheckreserve(cnt, so->so_rcv.sb_wat) ||
sbreserve(so, &so->so_rcv, cnt)) {
- sounlock(s);
error = ENOBUFS;
goto bad;
}
- sounlock(s);
so->so_rcv.sb_wat = cnt;
break;
@@ -1724,10 +1713,8 @@ sosetopt(struct socket *so, int level, int optname, struct mbuf *m0)
struct domain *dom = so->so_proto->pr_domain;
level = dom->dom_protosw->pr_protocol;
- s = solock(so);
error = (*so->so_proto->pr_ctloutput)
(PRCO_SETOPT, so, level, optname, m0);
- sounlock(s);
return (error);
}
error = ENOPROTOOPT;
@@ -1756,10 +1743,8 @@ sosetopt(struct socket *so, int level, int optname, struct mbuf *m0)
break;
}
if (error == 0 && so->so_proto && so->so_proto->pr_ctloutput) {
- s = solock(so);
(*so->so_proto->pr_ctloutput)(PRCO_SETOPT, so,
level, optname, m0);
- sounlock(s);
m = NULL; /* freed by protocol */
}
}
@@ -1772,18 +1757,18 @@ bad:
int
sogetopt(struct socket *so, int level, int optname, struct mbuf **mp)
{
- int s, error = 0;
+ int error = 0;
struct mbuf *m;
+ soassertlocked(so);
+
if (level != SOL_SOCKET) {
if (so->so_proto && so->so_proto->pr_ctloutput) {
m = m_get(M_WAIT, MT_SOOPTS);
m->m_len = 0;
- s = solock(so);
error = (*so->so_proto->pr_ctloutput)(PRCO_GETOPT, so,
level, optname, m);
- sounlock(s);
if (error) {
m_free(m);
return (error);
@@ -1869,10 +1854,8 @@ sogetopt(struct socket *so, int level, int optname, struct mbuf **mp)
struct domain *dom = so->so_proto->pr_domain;
level = dom->dom_protosw->pr_protocol;
- s = solock(so);
error = (*so->so_proto->pr_ctloutput)
(PRCO_GETOPT, so, level, optname, m);
- sounlock(s);
if (error) {
(void)m_free(m);
return (error);
@@ -1886,13 +1869,10 @@ sogetopt(struct socket *so, int level, int optname, struct mbuf **mp)
case SO_SPLICE:
{
off_t len;
- int s;
- s = solock(so);
m->m_len = sizeof(off_t);
len = so->so_sp ? so->so_sp->ssp_len : 0;
memcpy(mtod(m, off_t *), &len, sizeof(off_t));
- sounlock(s);
break;
}
#endif /* SOCKET_SPLICE */
diff --git a/sys/kern/uipc_syscalls.c b/sys/kern/uipc_syscalls.c
index ac47bef508d..21fb463f8c9 100644
--- a/sys/kern/uipc_syscalls.c
+++ b/sys/kern/uipc_syscalls.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: uipc_syscalls.c,v 1.156 2017/07/24 15:07:39 mpi Exp $ */
+/* $OpenBSD: uipc_syscalls.c,v 1.157 2017/08/09 14:22:58 mpi Exp $ */
/* $NetBSD: uipc_syscalls.c,v 1.19 1996/02/09 19:00:48 christos Exp $ */
/*
@@ -940,7 +940,8 @@ sys_setsockopt(struct proc *p, void *v, register_t *retval)
} */ *uap = v;
struct file *fp;
struct mbuf *m = NULL;
- int error;
+ struct socket *so;
+ int s, error;
if ((error = getsock(p, SCARG(uap, s), &fp)) != 0)
@@ -972,7 +973,10 @@ sys_setsockopt(struct proc *p, void *v, register_t *retval)
}
m->m_len = SCARG(uap, valsize);
}
- error = sosetopt(fp->f_data, SCARG(uap, level), SCARG(uap, name), m);
+ so = fp->f_data;
+ s = solock(so);
+ error = sosetopt(so, SCARG(uap, level), SCARG(uap, name), m);
+ sounlock(s);
m = NULL;
bad:
m_freem(m);
@@ -993,7 +997,8 @@ sys_getsockopt(struct proc *p, void *v, register_t *retval)
struct file *fp;
struct mbuf *m = NULL;
socklen_t valsize;
- int error;
+ struct socket *so;
+ int s, error;
if ((error = getsock(p, SCARG(uap, s), &fp)) != 0)
return (error);
@@ -1007,9 +1012,11 @@ sys_getsockopt(struct proc *p, void *v, register_t *retval)
goto out;
} else
valsize = 0;
- if ((error = sogetopt(fp->f_data, SCARG(uap, level),
- SCARG(uap, name), &m)) == 0 && SCARG(uap, val) && valsize &&
- m != NULL) {
+ so = fp->f_data;
+ s = solock(so);
+ error = sogetopt(so, SCARG(uap, level), SCARG(uap, name), &m);
+ sounlock(s);
+ if (error == 0 && SCARG(uap, val) && valsize && m != NULL) {
if (valsize > m->m_len)
valsize = m->m_len;
error = copyout(mtod(m, caddr_t), SCARG(uap, val), valsize);