Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp693625ybg; Mon, 1 Jun 2020 11:51:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx3EtFmRgyhADNaf6xSChC+T4Oi05rDaHj4qS6tSLLe+7/XrFwaYfLNP+sTC3tqWcTGIq/1 X-Received: by 2002:aa7:d35a:: with SMTP id m26mr22974558edr.25.1591037514686; Mon, 01 Jun 2020 11:51:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591037514; cv=none; d=google.com; s=arc-20160816; b=sjJiYvz00+QJnzX6uQckFdx13NX0eodL69pTVdUWzXp/cNhFB9fb+RJ3B07sbSwiI/ U3RJuSNVC6zneNN+9YOiQqThgem0HYEg24JI752UQguqWqNyWgYHN1wdbAzwj9E64npQ Vv5tV+Kgw15sdTX3x8TKW+nGP8leEN3GOX1+1wguMPJygmBspwyrGyJTgw+Yq+cEZn6H xawpQauMkpJFeZfT99DW8IrykXRr2zzPV5ksLy66KN8oK2N/Iy5S96bGmErV25kQqufA J/dRx9XXXL3ilzb37G2lQk9Kagki829ntPqWoExYXAyVoQMnVDzvpzI1ttci98jb6EaG wckg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kyk5AOuKkBdlTEU0rWMRgB/E8TkwIQ7C5MmknlNJ2sU=; b=FDMByNyO+TrHoTndPdTE/nqyZ2lhqr9Pgn+iBXWCqODngCWqudJIu/d28d1iRVUn8w q8FOanT9FoNRhsyUnczhNadeDodKUbeuZXqypGnputAie9D2cmxGdUY2ZsMZe6B9yRzC tb/SxCL60EOUR5SVt8Ej8lJ3dx75nxgp7hdK32XZjqnUlizmNMyIUrC8Jv4RTRFnYsL3 1lxa1qBD0Pkegq+dXogZarS8TOK7QBrLt6KW15IVxIhe4vgG49TgxVI4tCah6rGj3+t7 9v4/OIyjK+n4JiUmcRkQ/HZ+8K8QZRvzqVzoPxy0jkf9hJqhBkM1DOYP5PK3+mf00844 eDxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uAUQ17+2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r9si132407eds.223.2020.06.01.11.51.31; Mon, 01 Jun 2020 11:51:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uAUQ17+2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730832AbgFAStv (ORCPT + 99 others); Mon, 1 Jun 2020 14:49:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:52368 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730473AbgFASGk (ORCPT ); Mon, 1 Jun 2020 14:06:40 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 56ED62068D; Mon, 1 Jun 2020 18:06:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591034799; bh=M0fabt7unVU5QF8l4HkRxEV7twQQuRiqHuedoJ3zhjY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uAUQ17+2F85fxe/7SCHsG75UWMEFinD/cOntpFIqSM06O5wHNXaicRRgHunu6iNKm BrEJeadUzqZQOWHxnzuSJdSLPW7kTrn2iddlLkrzNCgp6ur3k2l1i7cFXKfAq4dDnM +P8aoCIuEKB99nkVwY07zqJrmki7CqvDVT93303o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Grygorii Strashko , "David S. Miller" Subject: [PATCH 5.4 005/142] net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend Date: Mon, 1 Jun 2020 19:52:43 +0200 Message-Id: <20200601174038.612777995@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200601174037.904070960@linuxfoundation.org> References: <20200601174037.904070960@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Grygorii Strashko [ Upstream commit 4c64b83d03f4aafcdf710caad994cbc855802e74 ] vlan_for_each() are required to be called with rtnl_lock taken, otherwise ASSERT_RTNL() warning will be triggered - which happens now during System resume from suspend: cpsw_suspend() |- cpsw_ndo_stop() |- __hw_addr_ref_unsync_dev() |- cpsw_purge_all_mc() |- vlan_for_each() |- ASSERT_RTNL(); Hence, fix it by surrounding cpsw_ndo_stop() by rtnl_lock/unlock() calls. Fixes: 15180eca569b ("net: ethernet: ti: cpsw: fix vlan mcast") Signed-off-by: Grygorii Strashko Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/ti/cpsw.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/drivers/net/ethernet/ti/cpsw.c +++ b/drivers/net/ethernet/ti/cpsw.c @@ -2999,11 +2999,15 @@ static int cpsw_suspend(struct device *d struct cpsw_common *cpsw = dev_get_drvdata(dev); int i; + rtnl_lock(); + for (i = 0; i < cpsw->data.slaves; i++) if (cpsw->slaves[i].ndev) if (netif_running(cpsw->slaves[i].ndev)) cpsw_ndo_stop(cpsw->slaves[i].ndev); + rtnl_unlock(); + /* Select sleep pin state */ pinctrl_pm_select_sleep_state(dev);