aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/event_analyzing_sample.py
diff options
context:
space:
mode:
authorMarcelo Ricardo Leitner <[email protected]>2015-12-04 15:14:04 -0200
committerDavid S. Miller <[email protected]>2015-12-05 22:23:22 -0500
commit01ce63c90170283a9855d1db4fe81934dddce648 (patch)
treeeab8388f522d7f71c2e96b343370ac50f6ff64d8 /tools/perf/scripts/python/event_analyzing_sample.py
parentcb5e173ed7c03a0d4630ce68a95a186cce3cc872 (diff)
sctp: update the netstamp_needed counter when copying sockets
Dmitry Vyukov reported that SCTP was triggering a WARN on socket destroy related to disabling sock timestamp. When SCTP accepts an association or peel one off, it copies sock flags but forgot to call net_enable_timestamp() if a packet timestamping flag was copied, leading to extra calls to net_disable_timestamp() whenever such clones were closed. The fix is to call net_enable_timestamp() whenever we copy a sock with that flag on, like tcp does. Reported-by: Dmitry Vyukov <[email protected]> Signed-off-by: Marcelo Ricardo Leitner <[email protected]> Acked-by: Vlad Yasevich <[email protected]> Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions