From owner-p4-projects@FreeBSD.ORG Tue Dec 9 15:09:36 2003 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id B560316A4D0; Tue, 9 Dec 2003 15:09:36 -0800 (PST) Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 7A3ED16A4CE for ; Tue, 9 Dec 2003 15:09:36 -0800 (PST) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8B63143D28 for ; Tue, 9 Dec 2003 15:09:35 -0800 (PST) (envelope-from sam@freebsd.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.12.9/8.12.9) with ESMTP id hB9N9ZXJ034369 for ; Tue, 9 Dec 2003 15:09:35 -0800 (PST) (envelope-from sam@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.12.9/8.12.9/Submit) id hB9N9Zu6034366 for perforce@freebsd.org; Tue, 9 Dec 2003 15:09:35 -0800 (PST) (envelope-from sam@freebsd.org) Date: Tue, 9 Dec 2003 15:09:35 -0800 (PST) Message-Id: <200312092309.hB9N9Zu6034366@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to sam@freebsd.org using -f From: Sam Leffler To: Perforce Change Reviews Subject: PERFORCE change 43698 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Dec 2003 23:09:37 -0000 http://perforce.freebsd.org/chv.cgi?CH=43698 Change 43698 by sam@sam_ebb on 2003/12/09 15:08:41 o remove Giant assertions o lock snd sockbuf to satisfy assertions Affected files ... .. //depot/projects/netperf+sockets/sys/rpc/rpcclnt.c#2 edit Differences ... ==== //depot/projects/netperf+sockets/sys/rpc/rpcclnt.c#2 (text+ko) ==== @@ -362,8 +362,6 @@ RPC_RETURN(EFAULT); } - GIANT_REQUIRED; /* XXX until socket locking done */ - /* create the socket */ rpc->rc_so = NULL; @@ -620,8 +618,6 @@ { struct socket *so; - GIANT_REQUIRED; /* XXX until socket locking done */ - if (rpc->rc_so) { so = rpc->rc_so; rpc->rc_so = NULL; @@ -671,8 +667,6 @@ #endif int error, soflags, flags; - GIANT_REQUIRED; /* XXX until socket locking done */ - if (rep) { if (rep->r_flags & R_SOFTTERM) { m_freem(top); @@ -756,8 +750,6 @@ #endif int error, sotype, rcvflg; - GIANT_REQUIRED; /* XXX until socket locking done */ - /* * Set up arguments for soreceive() */ @@ -1430,6 +1422,7 @@ * Set r_rtt to -1 in case we fail to send it now. */ rep->r_rtt = -1; + SOCKBUF_LOCK(&so->so_snd); if (sbspace(&so->so_snd) >= rep->r_mreq->m_pkthdr.len && ((rpc->rc_flag & RPCCLNT_DUMBTIMR) || (rep->r_flags & R_SENT) || @@ -1464,6 +1457,7 @@ rep->r_rtt = 0; } } + SOCKBUF_UNLOCK(&so->so_snd); } splx(s);