Module Name: src
Committed By: ozaki-r
Date: Mon Aug 19 07:45:31 UTC 2024
Modified Files:
src/sys/net: bpf.c bpfdesc.h
Log Message:
bpf: restore wakeup softint
This change fixes the issue that fownsignal which can take an
adaptive mutex is called inside a pserialize read section in
bpf_deliver.
Fix issue #4 (only the latter of two) in PR#58596
To generate a diff of this commit:
cvs rdiff -u -r1.255 -r1.256 src/sys/net/bpf.c
cvs rdiff -u -r1.48 -r1.49 src/sys/net/bpfdesc.h
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/sys/net/bpf.c
diff -u src/sys/net/bpf.c:1.255 src/sys/net/bpf.c:1.256
--- src/sys/net/bpf.c:1.255 Thu Aug 15 11:23:39 2024
+++ src/sys/net/bpf.c Mon Aug 19 07:45:31 2024
@@ -1,4 +1,4 @@
-/* $NetBSD: bpf.c,v 1.255 2024/08/15 11:23:39 riastradh Exp $ */
+/* $NetBSD: bpf.c,v 1.256 2024/08/19 07:45:31 ozaki-r Exp $ */
/*
* Copyright (c) 1990, 1991, 1993
@@ -39,7 +39,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: bpf.c,v 1.255 2024/08/15 11:23:39 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: bpf.c,v 1.256 2024/08/19 07:45:31 ozaki-r Exp $");
#if defined(_KERNEL_OPT)
#include "opt_bpf.h"
@@ -268,6 +268,7 @@ static int bpf_poll(struct file *, int);
static int bpf_stat(struct file *, struct stat *);
static int bpf_close(struct file *);
static int bpf_kqfilter(struct file *, struct knote *);
+static void bpf_softintr(void *);
static const struct fileops bpf_fileops = {
.fo_name = "bpf",
@@ -602,6 +603,7 @@ bpfopen(dev_t dev, int flag, int mode, s
d->bd_atime = d->bd_mtime = d->bd_btime;
callout_init(&d->bd_callout, CALLOUT_MPSAFE);
selinit(&d->bd_sel);
+ d->bd_sih = softint_establish(SOFTINT_CLOCK, bpf_softintr, d);
d->bd_jitcode = NULL;
d->bd_rfilter = NULL;
d->bd_wfilter = NULL;
@@ -660,6 +662,7 @@ bpf_close(struct file *fp)
bpf_freed(d);
callout_destroy(&d->bd_callout);
seldestroy(&d->bd_sel);
+ softint_disestablish(d->bd_sih);
mutex_obj_free(d->bd_mtx);
mutex_obj_free(d->bd_buf_mtx);
cv_destroy(&d->bd_cv);
@@ -798,11 +801,21 @@ bpf_wakeup(struct bpf_d *d)
mutex_exit(d->bd_buf_mtx);
if (d->bd_async)
- fownsignal(d->bd_pgid, SIGIO, 0, 0, NULL);
+ softint_schedule(d->bd_sih);
selnotify(&d->bd_sel, 0, 0);
}
static void
+bpf_softintr(void *cookie)
+{
+ struct bpf_d *d;
+
+ d = cookie;
+ if (d->bd_async)
+ fownsignal(d->bd_pgid, SIGIO, 0, 0, NULL);
+}
+
+static void
bpf_timed_out(void *arg)
{
struct bpf_d *d = arg;
Index: src/sys/net/bpfdesc.h
diff -u src/sys/net/bpfdesc.h:1.48 src/sys/net/bpfdesc.h:1.49
--- src/sys/net/bpfdesc.h:1.48 Wed Jun 9 15:44:15 2021
+++ src/sys/net/bpfdesc.h Mon Aug 19 07:45:31 2024
@@ -1,4 +1,4 @@
-/* $NetBSD: bpfdesc.h,v 1.48 2021/06/09 15:44:15 martin Exp $ */
+/* $NetBSD: bpfdesc.h,v 1.49 2024/08/19 07:45:31 ozaki-r Exp $ */
/*
* Copyright (c) 1990, 1991, 1993
@@ -113,7 +113,6 @@ struct bpf_d {
pid_t bd_pid; /* corresponding PID */
/* DEPRECATED. Keep it to avoid breaking kvm(3) users */
LIST_ENTRY(bpf_d) _bd_list; /* list of all BPF's */
- /* DEPRECATED. Keep it to avoid breaking kvm(3) users */
void *bd_sih; /* soft interrupt handle */
struct timespec bd_atime; /* access time */
struct timespec bd_mtime; /* modification time */