From: Eric Dumazet <eduma...@google.com> Date: Thu, 10 Oct 2019 20:17:37 -0700
> This all started with a KCSAN report (included > in "tcp: annotate tp->rcv_nxt lockless reads" changelog) > > tcp_poll() runs in a lockless way. This means that about > all accesses of tcp socket fields done in tcp_poll() context > need annotations otherwise KCSAN will complain about data-races. > > While doing this detective work, I found a more serious bug, > addressed by the first patch ("tcp: add rcu protection around > tp->fastopen_rsk"). Series applied, thanks Eric.