diff options
author | Stanislav Fomichev <sdf@fomichev.me> | 2025-03-05 08:37:29 -0800 |
---|---|---|
committer | Jakub Kicinski <kuba@kernel.org> | 2025-03-06 12:59:45 -0800 |
commit | df43d8bf10316a7c3b1e47e3cc0057a54df4a5b8 (patch) | |
tree | d31253686f41f2bdad50762ea5b86bf56cc7ad25 /net/core/dev_ioctl.c | |
parent | 2bcf4772e45adb00649a4e9cbff14b08a144f9e3 (diff) | |
download | linux-df43d8bf10316a7c3b1e47e3cc0057a54df4a5b8.tar.gz linux-df43d8bf10316a7c3b1e47e3cc0057a54df4a5b8.tar.bz2 linux-df43d8bf10316a7c3b1e47e3cc0057a54df4a5b8.zip |
net: replace dev_addr_sem with netdev instance lock
Lockdep reports possible circular dependency in [0]. Instead of
fixing the ordering, replace global dev_addr_sem with netdev
instance lock. Most of the paths that set/get mac are RTNL
protected. Two places where it's not, convert to explicit
locking:
- sysfs address_show
- dev_get_mac_address via dev_ioctl
0: https://netdev-3.bots.linux.dev/vmksft-forwarding-dbg/results/993321/24-router-bridge-1d-lag-sh/stderr
Signed-off-by: Stanislav Fomichev <sdf@fomichev.me>
Link: https://patch.msgid.link/20250305163732.2766420-12-sdf@fomichev.me
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'net/core/dev_ioctl.c')
-rw-r--r-- | net/core/dev_ioctl.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/core/dev_ioctl.c b/net/core/dev_ioctl.c index d9f350593121..296e52d1395d 100644 --- a/net/core/dev_ioctl.c +++ b/net/core/dev_ioctl.c @@ -574,7 +574,7 @@ static int dev_ifsioc(struct net *net, struct ifreq *ifr, void __user *data, case SIOCSIFHWADDR: if (dev->addr_len > sizeof(struct sockaddr)) return -EINVAL; - return dev_set_mac_address_user(dev, &ifr->ifr_hwaddr, NULL); + return dev_set_mac_address(dev, &ifr->ifr_hwaddr, NULL); case SIOCSIFHWBROADCAST: if (ifr->ifr_hwaddr.sa_family != dev->type) |