Message ID | 20220908231523.8977-1-yepeilin.cs@gmail.com (mailing list archive) |
---|---|
State | Accepted |
Commit | 96628951869c0dedf0377adca01c8675172d8639 |
Delegated to: | Netdev Maintainers |
Headers | show |
Series | [net] tcp: Use WARN_ON_ONCE() in tcp_read_skb() | expand |
Hello: This patch was applied to netdev/net.git (master) by David S. Miller <davem@davemloft.net>: On Thu, 8 Sep 2022 16:15:23 -0700 you wrote: > From: Peilin Ye <peilin.ye@bytedance.com> > > Prevent tcp_read_skb() from flooding the syslog. > > Suggested-by: Jakub Sitnicki <jakub@cloudflare.com> > Signed-off-by: Peilin Ye <peilin.ye@bytedance.com> > > [...] Here is the summary with links: - [net] tcp: Use WARN_ON_ONCE() in tcp_read_skb() https://git.kernel.org/netdev/net/c/96628951869c You are awesome, thank you!
diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c index 8230be00ecca..9251c99d3cfd 100644 --- a/net/ipv4/tcp.c +++ b/net/ipv4/tcp.c @@ -1766,7 +1766,7 @@ int tcp_read_skb(struct sock *sk, skb_read_actor_t recv_actor) return 0; __skb_unlink(skb, &sk->sk_receive_queue); - WARN_ON(!skb_set_owner_sk_safe(skb, sk)); + WARN_ON_ONCE(!skb_set_owner_sk_safe(skb, sk)); copied = recv_actor(sk, skb); if (copied >= 0) { seq += copied;