Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1318570pxk; Thu, 10 Sep 2020 12:22:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx9RUjSANeKWvuTE04XVdUY9oBopPsrmeUUDVlEGEgvFQQ5ucLAijap29KrW6PmCDkmGxXp X-Received: by 2002:a05:6402:1819:: with SMTP id g25mr10651967edy.292.1599765734480; Thu, 10 Sep 2020 12:22:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599765734; cv=none; d=google.com; s=arc-20160816; b=iwOtO2qs4sFW/dD8uwFQjOdE58AJDMJcTwP8Cx6F0FYdkCM7Uzz/4xEfR33h7bB+hh GsUG/EbZdsKfzxCx/yOuqKZbsb4vtDC/skc5ADUPReDD4iy51dDITK5esMTdqY5TfSEY yRPt451X5KrxGeEhGnHRrL2aBBuMo9/9WYwRwLnR3hXb6Ok85Q22Za/kC2JFyE1mu5wI B9WHjIKS0ghSnHItqY0jlMyktpzTo4AzqjB/sbg7HZZVCfvTlEwvRlC3Ns4O4SjLNxUu QB6CznO82KVITE5BHPrDtXMmPBhm1dkX+5e2ry9vnrkTWkarETcLZP5twzzVv3H0dWiU WnRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=ImBbgx9Fuyf+FvHYSyNnwhjykst+Kj12GiIKnsJXKUU=; b=hU7exWQgs48N/dkabjJIWvdXnKGo+h63h0B0LeRG9xnm/1OO/jUW3oeMTAUoimI417 ueLtsgMpdbUQs/lUUjOQfrY0p0oYVM7lBhivBy4CetMyhlWc4q8N12lLSY0724BoW3pu Ag6LHOM/ZCiLgWtUVKDp6Mwoe7hfidNJHaLMljebmlfVvOrRDvw+Of/PHa0hDIaj09I0 G+WBjBiEe7Hhw/QK2CAlufgwN2bHLkguww9joGp6/+H0qsrFXj68NpuoP2SLKIacgT3z RvYx9d0dQHTtBmhygOXqYpL0YYZCiE3Z9gxpoPARG/fMIA9vPyOfN6poZAkt0d6eyFsq DsWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s3si2106660edq.248.2020.09.10.12.21.51; Thu, 10 Sep 2020 12:22:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727847AbgIJTVQ (ORCPT + 99 others); Thu, 10 Sep 2020 15:21:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45284 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727119AbgIJTUl (ORCPT ); Thu, 10 Sep 2020 15:20:41 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 12E00C061573; Thu, 10 Sep 2020 12:20:40 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id C64F012A2A40F; Thu, 10 Sep 2020 12:03:50 -0700 (PDT) Date: Thu, 10 Sep 2020 12:20:33 -0700 (PDT) Message-Id: <20200910.122033.2205909020498878557.davem@davemloft.net> To: geert+renesas@glider.be Cc: hkallweit1@gmail.com, f.fainelli@gmail.com, andrew@lunn.ch, kuba@kernel.org, gaku.inami.xh@renesas.com, yoshihiro.shimoda.uh@renesas.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] Revert "net: linkwatch: add check for netdevice being present to linkwatch_do_dev" From: David Miller In-Reply-To: <20200901150237.15302-1-geert+renesas@glider.be> References: <20200901150237.15302-1-geert+renesas@glider.be> X-Mailer: Mew version 6.8 on Emacs 27.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [2620:137:e000::1:9]); Thu, 10 Sep 2020 12:03:51 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Geert Uytterhoeven Date: Tue, 1 Sep 2020 17:02:37 +0200 > This reverts commit 124eee3f6955f7aa19b9e6ff5c9b6d37cb3d1e2c. > > Inami-san reported that this commit breaks bridge support in a Xen > environment, and that reverting it fixes this. > > During system resume, bridge ports are no longer enabled, as that relies > on the receipt of the NETDEV_CHANGE notification. This notification is > not sent, as netdev_state_change() is no longer called. > > Note that the condition this commit intended to fix never existed > upstream, as the patch triggering it and referenced in the commit was > never applied upstream. Hence I can confirm s2ram on r8a73a4/ape6evm > and sh73a0/kzm9g works fine before/after this revert. > > Reported-by Gaku Inami > Signed-off-by: Geert Uytterhoeven Maybe you cannot reproduce it, but the problem is there and it still looks very real to me. netdev_state_change() does two things: 1) Emit the NETDEV_CHANGE notification 2) Emit an rtmsg_ifinfo() netlink message, which in turn tries to access the device statistics via ->ndo_get_stats*(). It is absolutely wrong to do #2 when netif_device_present() is false. So I cannot apply this patch as-is, sorry.