diff options
author | 2024-11-18 03:15:18 -0800 | |
---|---|---|
committer | 2024-11-18 19:01:39 -0800 | |
commit | a57d5a72f8dec7db8a79d0016fb0a3bdecc82b56 (patch) | |
tree | 8689e499621e0d7e495ef6ee3edb36dba7de1726 /scripts/gdb/linux/tasks.py | |
parent | netpoll: Use rcu_access_pointer() in __netpoll_setup (diff) | |
download | wireguard-linux-a57d5a72f8dec7db8a79d0016fb0a3bdecc82b56.tar.xz wireguard-linux-a57d5a72f8dec7db8a79d0016fb0a3bdecc82b56.zip |
netpoll: Use rcu_access_pointer() in netpoll_poll_lock
The ndev->npinfo pointer in netpoll_poll_lock() is RCU-protected but is
being accessed directly for a NULL check. While no RCU read lock is held
in this context, we should still use proper RCU primitives for
consistency and correctness.
Replace the direct NULL check with rcu_access_pointer(), which is the
appropriate primitive when only checking for NULL without dereferencing
the pointer. This function provides the necessary ordering guarantees
without requiring RCU read-side protection.
Fixes: bea3348eef27 ("[NET]: Make NAPI polling independent of struct net_device objects.")
Signed-off-by: Breno Leitao <leitao@debian.org>
Reviewed-by: Michal Kubiak <michal.kubiak@intel.com>
Link: https://patch.msgid.link/20241118-netpoll_rcu-v1-2-a1888dcb4a02@debian.org
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'scripts/gdb/linux/tasks.py')
0 files changed, 0 insertions, 0 deletions