net/sched: taprio: taprio_dump and taprio_change are protected by rtnl_mutex
authorVladimir Oltean <vladimir.oltean@nxp.com>
Thu, 15 Sep 2022 10:50:41 +0000 (13:50 +0300)
committerJakub Kicinski <kuba@kernel.org>
Tue, 20 Sep 2022 20:53:33 +0000 (13:53 -0700)
commit18cdd2f0998a4967b1fff4c43ed9aef049e42c39
treea19ae3b08021e0043a63bca9dd7f271cc16ee868
parentc8cbe123be6de9deff5e5312af8848362a919f97
net/sched: taprio: taprio_dump and taprio_change are protected by rtnl_mutex

Since the writer-side lock is taken here, we do not need to open an RCU
read-side critical section, instead we can use rtnl_dereference() to
tell lockdep we are serialized with concurrent writes.

Signed-off-by: Vladimir Oltean <vladimir.oltean@nxp.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
net/sched/sch_taprio.c