Re: 3.3.0-rc6-next20120305 net/ipv4/tcp_ipv4.c:930 suspiciousrcu_dereference_check() usage!

From: David Miller
Date: Wed Mar 07 2012 - 15:38:50 EST


From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
Date: Wed, 07 Mar 2012 06:45:43 -0800

> [PATCH net-next] tcp: md5: correct a RCU lockdep splat
>
> commit a8afca0329 (tcp: md5: protects md5sig_info with RCU) added a
> lockdep splat in tcp_md5_do_lookup() in case a timer fires a tcp
> retransmit.
>
> At this point, socket lock is owned by the sofirq handler, not the user,
> so we should adjust a bit the lockdep condition, as we dont hold
> rcu_read_lock().
>
> Signed-off-by: Eric Dumazet <eric.dumazet@xxxxxxxxx>
> Reported-by: Valdis Kletnieks <valdis.kletnieks@xxxxxx>

Applied, thanks Eric.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/