Various tap functions of bpf(4) are the only non-MPSAFE code on ethernet
authorSepherosa Ziehau <sephe@dragonflybsd.org>
Sun, 17 Aug 2008 03:44:48 +0000 (03:44 +0000)
committerSepherosa Ziehau <sephe@dragonflybsd.org>
Sun, 17 Aug 2008 03:44:48 +0000 (03:44 +0000)
commit64202d9a766eddf567236a56224537d058114d0d
tree624282bb0e6ac46b526937819acd5f115ff614a8
parent65c6566c7426715f83c16078dbc6378c0ada070a
Various tap functions of bpf(4) are the only non-MPSAFE code on ethernet
input path (in polling or interrupt threads), so push mplock holding down
into bpf(4) tap functions.  Also re-check the bpf_if after holding mplock
to avoid use-after-check race.
sys/net/bpf.c