From: Eric Dumazet <eduma...@google.com>
Date: Thu, 10 Oct 2019 20:17:37 -0700

> This all started with a KCSAN report (included
> in "tcp: annotate tp->rcv_nxt lockless reads" changelog)
> 
> tcp_poll() runs in a lockless way. This means that about
> all accesses of tcp socket fields done in tcp_poll() context
> need annotations otherwise KCSAN will complain about data-races.
> 
> While doing this detective work, I found a more serious bug,
> addressed by the first patch ("tcp: add rcu protection around
> tp->fastopen_rsk").

Series applied, thanks Eric.

Reply via email to