* non-zero = failure
*/
int
-osi_NetSend(osi_socket sop, struct sockaddr_in *to, struct iovec *iov,
+osi_NetSend(osi_socket sop, struct sockaddr_in *to, struct iovec *iovec,
int iovcnt, afs_int32 size, int istack)
{
KERNEL_SPACE_DECL;
struct msghdr msg;
int code;
- struct iovec tmpvec[RX_MAXWVECS + 2];
- if (iovcnt > RX_MAXWVECS + 2) {
- osi_Panic("Too many (%d) iovecs passed to osi_NetSend\n", iovcnt);
- }
-
- if (iovcnt <= 2) { /* avoid pointless uiomove */
- tmpvec[0].iov_base = iov[0].iov_base;
- tmpvec[0].iov_len = size;
- msg.msg_iovlen = 1;
- } else {
- memcpy(tmpvec, iov, iovcnt * sizeof(struct iovec));
- msg.msg_iovlen = iovcnt;
- }
- msg.msg_iov = tmpvec;
+ msg.msg_iovlen = iovcnt;
+ msg.msg_iov = iovec;
msg.msg_name = to;
msg.msg_namelen = sizeof(*to);
msg.msg_control = NULL;
TO_KERNEL_SPACE();
if (code < 0) {
+#ifdef AFS_LINUX26_ENV
+#ifdef CONFIG_PM
+ if (
+#ifdef PF_FREEZE
+ current->flags & PF_FREEZE
+#else
+ !current->todo
+#endif
+ )
+#ifdef LINUX_REFRIGERATOR_TAKES_PF_FREEZE
+ refrigerator(PF_FREEZE);
+#else
+ refrigerator();
+#endif
+ set_current_state(TASK_INTERRUPTIBLE);
+#endif
+#endif
+
/* Clear the error before using the socket again.
* Oh joy, Linux has hidden header files as well. It appears we can
* simply call again and have it clear itself via sock_error().
if (&tasklist_lock)
read_lock(&tasklist_lock);
+#if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16)
+ else
+ rcu_read_lock();
+#endif
listener = find_task_by_pid(rxk_ListenerPid);
if (&tasklist_lock)
read_unlock(&tasklist_lock);
+#if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16)
+ else
+ rcu_read_unlock();
+#endif
while (rxk_ListenerPid) {
flush_signals(listener);
force_sig(SIGKILL, listener);