[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20191024054452.81661-1-edumazet@google.com>
Date: Wed, 23 Oct 2019 22:44:47 -0700
From: Eric Dumazet <edumazet@...gle.com>
To: "David S . Miller" <davem@...emloft.net>
Cc: netdev <netdev@...r.kernel.org>,
Eric Dumazet <edumazet@...gle.com>,
Eric Dumazet <eric.dumazet@...il.com>
Subject: [PATCH net 0/5] net: avoid KCSAN splats
Often times we use skb_queue_empty() without holding a lock,
meaning that other cpus (or interrupt) can change the queue
under us. This is fine, but we need to properly annotate
the lockless intent to make sure the compiler wont over
optimize things.
Eric Dumazet (5):
net: add skb_queue_empty_lockless()
udp: use skb_queue_empty_lockless()
net: use skb_queue_empty_lockless() in poll() handlers
net: use skb_queue_empty_lockless() in busy poll contexts
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
drivers/crypto/chelsio/chtls/chtls_io.c | 2 +-
drivers/isdn/capi/capi.c | 2 +-
drivers/nvme/host/tcp.c | 2 +-
include/linux/skbuff.h | 33 ++++++++++++++++++-------
net/atm/common.c | 2 +-
net/bluetooth/af_bluetooth.c | 4 +--
net/caif/caif_socket.c | 2 +-
net/core/datagram.c | 8 +++---
net/core/sock.c | 2 +-
net/decnet/af_decnet.c | 2 +-
net/ipv4/tcp.c | 4 +--
net/ipv4/udp.c | 8 +++---
net/nfc/llcp_sock.c | 4 +--
net/phonet/socket.c | 4 +--
net/sctp/socket.c | 6 ++---
net/tipc/socket.c | 4 +--
net/unix/af_unix.c | 6 ++---
net/vmw_vsock/af_vsock.c | 2 +-
18 files changed, 56 insertions(+), 41 deletions(-)
--
2.23.0.866.gb869b98d4c-goog
Powered by blists - more mailing lists