Subj. At sockets layer we touch only per-socket data, which is solock() protected().
At protocol layer, unix(4) and key management sockets have no (*pr_ctloutput)() handlers. route_ctloutput() touches only per socket data, which is solock() protected. inet{,6} globals are protected by netlock, which is solock() backend for corresponding sockets. Index: sys/kern/syscalls.master =================================================================== RCS file: /cvs/src/sys/kern/syscalls.master,v retrieving revision 1.236 diff -u -p -r1.236 syscalls.master --- sys/kern/syscalls.master 9 Nov 2022 10:26:28 -0000 1.236 +++ sys/kern/syscalls.master 28 Nov 2022 17:29:03 -0000 @@ -249,7 +249,7 @@ struct timespec *timeout); } 117 STD NOLOCK { int sys_sendmmsg(int s, struct mmsghdr *mmsg,\ unsigned int vlen, int flags); } -118 STD { int sys_getsockopt(int s, int level, int name, \ +118 STD NOLOCK { int sys_getsockopt(int s, int level, int name, \ void *val, socklen_t *avalsize); } 119 STD { int sys_thrkill(pid_t tid, int signum, void *tcb); } 120 STD NOLOCK { ssize_t sys_readv(int fd, \