On 25/01/17(Wed) 19:04, Alexander Bluhm wrote:
> On Wed, Jan 25, 2017 at 11:02:22AM -0500, David Hill wrote:
> > splassert: yield: want 0 have 1
> > Starting stack trace...
> > yield() at yield+0xac
> > pool_get() at pool_get+0x1ca
> > socreate() at socreate+0xba
> > sys_socket() at sys_socket+0x135
> > syscall() at syscall+0x27b
> > --- syscall (number 97) ---
> > end of kernel
> > end trace frame: 0x1b1a16c05800, count: 252
> > 0x1b197d23277a:
> > End of stack trace.
> 
> This one looks easy.  We do not need a lock to setup the still
> private so structure.
> 
> ok?

It's right, in the end what we want is to protect the insertion of the
newly created socket to a global list.

ok mpi@

> Index: kern/uipc_socket.c
> ===================================================================
> RCS file: /cvs/src/sys/kern/uipc_socket.c,v
> retrieving revision 1.173
> diff -u -p -r1.173 uipc_socket.c
> --- kern/uipc_socket.c        25 Jan 2017 16:45:50 -0000      1.173
> +++ kern/uipc_socket.c        25 Jan 2017 18:01:06 -0000
> @@ -123,7 +123,6 @@ socreate(int dom, struct socket **aso, i
>               return (EPROTONOSUPPORT);
>       if (prp->pr_type != type)
>               return (EPROTOTYPE);
> -     NET_LOCK(s);
>       so = pool_get(&socket_pool, PR_WAITOK | PR_ZERO);
>       TAILQ_INIT(&so->so_q0);
>       TAILQ_INIT(&so->so_q);
> @@ -136,6 +135,7 @@ socreate(int dom, struct socket **aso, i
>       so->so_egid = p->p_ucred->cr_gid;
>       so->so_cpid = p->p_p->ps_pid;
>       so->so_proto = prp;
> +     NET_LOCK(s);
>       error = (*prp->pr_usrreq)(so, PRU_ATTACH, NULL,
>           (struct mbuf *)(long)proto, NULL, p);
>       if (error) {
> 

Reply via email to