Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760428AbcCDXFE (ORCPT ); Fri, 4 Mar 2016 18:05:04 -0500 Received: from mail.ispras.ru ([83.149.199.45]:38232 "EHLO mail.ispras.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759087AbcCDXFC (ORCPT ); Fri, 4 Mar 2016 18:05:02 -0500 From: Alexey Khoroshilov To: Eric Dumazet , Greg Kurz , "Michael S. Tsirkin" Cc: Alexey Khoroshilov , David Gibson , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, ldv-project@linuxtesting.org Subject: Suspicious code in tun_flow_update() Date: Sat, 5 Mar 2016 02:04:44 +0300 Message-Id: <1457132684-16118-1-git-send-email-khoroshilov@ispras.ru> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 262 Lines: 12 Hello, If tun_flow_find() successfully finds tun_flow_entry, tun_flow_update() updates the entry in place. Is such usage of RCU safe here? Found by Linux Driver Verification project (linuxtesting.org). -- Alexey Khoroshilov Linux Verification Center, ISPRAS