diff options
author | David S. Miller <davem@davemloft.net> | 2019-10-13 10:13:08 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-10-13 10:13:08 -0700 |
commit | 3f233809aa7f00da6b42c695cc20801a2050edd4 (patch) | |
tree | 7be26ef02ab2f2979be9a3cdeb36ed1bafc51354 /scripts/gdb/linux/symbols.py | |
parent | 8caf8a91f34d55e8e3b1355ee8d658cb472146e2 (diff) | |
parent | ab4e846a82d0ae00176de19f2db3c5c64f8eb5f2 (diff) |
Merge branch 'tcp-address-KCSAN-reports-in-tcp_poll-part-I'
Eric Dumazet says:
====================
tcp: address KCSAN reports in tcp_poll() (part I)
This all started with a KCSAN report (included
in "tcp: annotate tp->rcv_nxt lockless reads" changelog)
tcp_poll() runs in a lockless way. This means that about
all accesses of tcp socket fields done in tcp_poll() context
need annotations otherwise KCSAN will complain about data-races.
While doing this detective work, I found a more serious bug,
addressed by the first patch ("tcp: add rcu protection around
tp->fastopen_rsk").
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'scripts/gdb/linux/symbols.py')
0 files changed, 0 insertions, 0 deletions