diff options
author | Paul E. McKenney <paulmck@linux.vnet.ibm.com> | 2010-04-27 08:22:01 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2010-04-27 21:39:01 +0200 |
commit | 7ec75c582e639d956ce3afd499f67febe6f902a4 (patch) | |
tree | 4752d1cc90ab385797d526cb901e42f27e3b20f6 /crypto/cts.c | |
parent | bridge: Fix build of ipv6 multicast code. (diff) | |
download | linux-7ec75c582e639d956ce3afd499f67febe6f902a4.tar.xz linux-7ec75c582e639d956ce3afd499f67febe6f902a4.zip |
net: suppress RCU lockdep false positive in twsk_net()
Calls to twsk_net() are in some cases protected by reference counting
as an alternative to RCU protection. Cases covered by reference counts
include __inet_twsk_kill(), inet_twsk_free(), inet_twdr_do_twkill_work(),
inet_twdr_twcal_tick(), and tcp_timewait_state_process(). RCU is used
by inet_twsk_purge(). Locking is used by established_get_first()
and established_get_next(). Finally, __inet_twsk_hashdance() is an
initialization case.
It appears to be non-trivial to locate the appropriate locks and
reference counts from within twsk_net(), so used rcu_dereference_raw().
Signed-off-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'crypto/cts.c')
0 files changed, 0 insertions, 0 deletions