diff options
| author | Marcelo Ricardo Leitner <[email protected]> | 2015-12-04 15:14:04 -0200 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2015-12-05 22:23:22 -0500 |
| commit | 01ce63c90170283a9855d1db4fe81934dddce648 (patch) | |
| tree | eab8388f522d7f71c2e96b343370ac50f6ff64d8 /tools/perf/scripts/python/event_analyzing_sample.py | |
| parent | cb5e173ed7c03a0d4630ce68a95a186cce3cc872 (diff) | |
sctp: update the netstamp_needed counter when copying sockets
Dmitry Vyukov reported that SCTP was triggering a WARN on socket destroy
related to disabling sock timestamp.
When SCTP accepts an association or peel one off, it copies sock flags
but forgot to call net_enable_timestamp() if a packet timestamping flag
was copied, leading to extra calls to net_disable_timestamp() whenever
such clones were closed.
The fix is to call net_enable_timestamp() whenever we copy a sock with
that flag on, like tcp does.
Reported-by: Dmitry Vyukov <[email protected]>
Signed-off-by: Marcelo Ricardo Leitner <[email protected]>
Acked-by: Vlad Yasevich <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions