Stop grabing the KERNEL_LOCK() for running protocol input routines.
authormpi <mpi@openbsd.org>
Tue, 9 Jan 2018 17:50:57 +0000 (17:50 +0000)
committermpi <mpi@openbsd.org>
Tue, 9 Jan 2018 17:50:57 +0000 (17:50 +0000)
commite839bdc73a1f7fa16bfcc2f44438301df154a3e2
tree30a3224e780f5f504dc7ec1d9bd78f1eab8a7c54
parent809d3a3e7e4e2167dd03620b8ad7b0a18aaebb7d
Stop grabing the KERNEL_LOCK() for running protocol input routines.

The NET_LOCK() is already held in this thread and is now enough.

People interested in ARP/bridge(4)/switch(4)/pipex(4)/pppoe(4)
performances can now push the KERNEL_LOCK() without depending on
other subsystems/drivers.

Tested by Hrvoje Popovski.

ok bluhm@, visa@
sys/net/if.c