Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1578517pxb; Mon, 22 Feb 2021 05:52:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJz4gx8sDkezrXqRnrB7vccBcGv40mzQC08ghgMJGFz6Rc5w5vLtLQ7MZfq9zh0XxChTDrxZ X-Received: by 2002:a17:906:c113:: with SMTP id do19mr6121952ejc.343.1614001949239; Mon, 22 Feb 2021 05:52:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614001949; cv=none; d=google.com; s=arc-20160816; b=kFL7AiuWZXWgBwQZr1y0hfpL2JwaaGjB4BN0O+uHi/0KShRi4wTWEHBvl9ov7puwqm 2zjWFWM32nS6S7YexaV72tITgRWtlnSM6lRYaxaLqW6289ZRg0BseqDXLuwRvlnc14S+ /ws/58AdUiie3hVCrh2mJB8nhugR4PfWCOVsD+7JCU2Bg2+PzJn6JiYplaiy9hCnB1bv YVvZPR8c16MMXOhVy88IyDhrIH7ArpZWiH0RcQ1Lg+HdtIZOMGp7sfRy2oMTwiqiggqs dbVwXfp7VJ9u0QwdOGuhGbiKRQnRNl8Tz+uFMlQono7qyBuV6sliBMq02qN+G7HZz3xx Bbjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NJCvYHoCgLXH5FQDdBkjN33qEqEUkxVVuZMzfy+ERzs=; b=xj8lw/tLOP7Xsr8YlKxg3N+BzjXdkOZOeAphJdRYd1DZ8Ddr94EumAlJ7euWp/YIlB S8ClgJ/IfHbLLGZfNi0XtCvnkDLVkcmaHCH8fBsUhrUT6Xa6nUl8fgIlQqlKHEKeUtsI 9nTYla1Avz8BAmKyuIoc61bRUhh4rRNwAWrgOQvEflksYq4/7fiIo7ygp7sxCRDZVAuq YV2SpPWiQFDgtLq0WI3fg8TNuS/4eBxR0h+LNARZKyFAmsyjdyosFfvV8GWp3ExSbJ7r VIGsC53xt6Gb1FBtoOkq0zM3nFk+MwkqgOHhV/7PKDJHXaf0wXmgwQ7czttbG14WMFKI 18mQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EW2zcT5G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u13si11868147edp.366.2021.02.22.05.52.06; Mon, 22 Feb 2021 05:52:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EW2zcT5G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231492AbhBVNvL (ORCPT + 99 others); Mon, 22 Feb 2021 08:51:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:57400 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231483AbhBVMqF (ORCPT ); Mon, 22 Feb 2021 07:46:05 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6B3B464F57; Mon, 22 Feb 2021 12:41:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1613997701; bh=ssjLo+l+SykrjKG9DQqcEgT0SrriNCxaSatxwJQ8eYE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EW2zcT5GFnv4Am6CJA1Jya6AP7x9e+lzcKkc2pkqsMG1qS473rjQKqQpJNZUdRQD5 abXT0rRtohjPOITOY2Xj1rJFTj3HiMvOwwRamqZYa8tPPP2TrtyB5Qx2tTubD4cTGj Pa3SNY5ZA7botHORtn7wL8NrO3dSRM5uz8MG0wRw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Edwin Peer , Jakub Kicinski , "David S. Miller" Subject: [PATCH 4.9 32/49] net: watchdog: hold device global xmit lock during tx disable Date: Mon, 22 Feb 2021 13:36:30 +0100 Message-Id: <20210222121027.328676719@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210222121022.546148341@linuxfoundation.org> References: <20210222121022.546148341@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Edwin Peer commit 3aa6bce9af0e25b735c9c1263739a5639a336ae8 upstream. Prevent netif_tx_disable() running concurrently with dev_watchdog() by taking the device global xmit lock. Otherwise, the recommended: netif_carrier_off(dev); netif_tx_disable(dev); driver shutdown sequence can happen after the watchdog has already checked carrier, resulting in possible false alarms. This is because netif_tx_lock() only sets the frozen bit without maintaining the locks on the individual queues. Fixes: c3f26a269c24 ("netdev: Fix lockdep warnings in multiqueue configurations.") Signed-off-by: Edwin Peer Reviewed-by: Jakub Kicinski Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/linux/netdevice.h | 2 ++ 1 file changed, 2 insertions(+) --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -3701,6 +3701,7 @@ static inline void netif_tx_disable(stru local_bh_disable(); cpu = smp_processor_id(); + spin_lock(&dev->tx_global_lock); for (i = 0; i < dev->num_tx_queues; i++) { struct netdev_queue *txq = netdev_get_tx_queue(dev, i); @@ -3708,6 +3709,7 @@ static inline void netif_tx_disable(stru netif_tx_stop_queue(txq); __netif_tx_unlock(txq); } + spin_unlock(&dev->tx_global_lock); local_bh_enable(); }