On 2018å01æ26æ 07:36, Michael S. Tsirkin wrote:lockless is tricky, and I'd rather not sprinkle READ/WRITE_ONCE where
Similar to bcecb4bbf88a ("net: ptr_ring: otherwise safe empty checks canIt looks to me that just fix this is better than disallow through doc (which
overrun array bounds") a lockless use of __ptr_ring_full might
cause an out of bounds access.
We can fix this, but it's easier to just disallow lockless
__ptr_ring_full for now.
is easily to be ignored ...).
Thanks
they aren't necessary.