freebsd-skq/sys/rpc
Rick Macklem 318677ad92 It was reported via email that the cu_sent field used by the
krpc client side UDP was observed as way out of range and
caused the rpc.lockd daemon to hang trying to do an RPC.
Inspection of the code found two places where the RPC request
is re-queued, but the value of cu_sent was not incremented.
Since cu_sent is always decremented when the RPC request is
dequeued, I think this could have caused cu_sent to go out of
range. This patch adds lines to increment cu_sent for these
two cases.

Reported by:	dwhite@ixsystems.com
Discussed with:	dwhite@ixsystems.com
MFC after:	2 weeks
2013-09-06 02:34:34 +00:00
..
rpcsec_gss Add support for host-based (Kerberos 5 service principal) initiator 2013-07-09 01:05:28 +00:00
auth_none.c
auth_unix.c
auth.h
authunix_prot.c
clnt_dg.c It was reported via email that the cu_sent field used by the 2013-09-06 02:34:34 +00:00
clnt_rc.c Revert 195703 and 195821 as this special stop handling in NFS is now 2013-03-13 21:06:03 +00:00
clnt_stat.h
clnt_vc.c Revert 195703 and 195821 as this special stop handling in NFS is now 2013-03-13 21:06:03 +00:00
clnt.h
getnetconfig.c
krpc.h
netconfig.h
nettype.h
pmap_prot.h
replay.c
replay.h
rpc_callmsg.c
rpc_com.h
rpc_generic.c Use m_get(), m_gethdr() and m_getcl() instead of historic macros. 2013-03-12 12:17:19 +00:00
rpc_msg.h
rpc_prot.c
rpc.h
rpcb_clnt.c
rpcb_clnt.h
rpcb_prot.c
rpcb_prot.h
rpcm_subs.h Use m_get(), m_gethdr() and m_getcl() instead of historic macros. 2013-03-12 12:17:19 +00:00
rpcsec_gss.h Add support for host-based (Kerberos 5 service principal) initiator 2013-07-09 01:05:28 +00:00
svc_auth_unix.c
svc_auth.c
svc_auth.h
svc_dg.c Use m_get(), m_gethdr() and m_getcl() instead of historic macros. 2013-03-12 12:17:19 +00:00
svc_generic.c
svc_vc.c Fix a potential socket leak in the NFS server. If a client closes its 2013-04-08 19:03:01 +00:00
svc.c Use m_get(), m_gethdr() and m_getcl() instead of historic macros. 2013-03-12 12:17:19 +00:00
svc.h
types.h
xdr.h