From: David S. Miller Date: Sun, 13 Oct 2019 17:13:08 +0000 (-0700) Subject: Merge branch 'tcp-address-KCSAN-reports-in-tcp_poll-part-I' X-Git-Tag: v5.15~5278^2~50 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=3f233809aa7f00da6b42c695cc20801a2050edd4;p=platform%2Fkernel%2Flinux-starfive.git Merge branch 'tcp-address-KCSAN-reports-in-tcp_poll-part-I' Eric Dumazet says: ==================== tcp: address KCSAN reports in tcp_poll() (part I) This all started with a KCSAN report (included in "tcp: annotate tp->rcv_nxt lockless reads" changelog) tcp_poll() runs in a lockless way. This means that about all accesses of tcp socket fields done in tcp_poll() context need annotations otherwise KCSAN will complain about data-races. While doing this detective work, I found a more serious bug, addressed by the first patch ("tcp: add rcu protection around tp->fastopen_rsk"). ==================== Signed-off-by: David S. Miller --- 3f233809aa7f00da6b42c695cc20801a2050edd4