Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1987542imm; Thu, 24 May 2018 04:05:35 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrtXojtaooldexCBybDbB6vSMrqpVf9UEjEi7+8P/Q8LLGa68w4xZ+uPPrROuuI9RYpYaw+ X-Received: by 2002:a17:902:2927:: with SMTP id g36-v6mr6783467plb.303.1527159935658; Thu, 24 May 2018 04:05:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527159935; cv=none; d=google.com; s=arc-20160816; b=eq9U//a0kNUAKeFnlaZlpszO4+Rg/sM8n3YZ0SpGqDBqKtg9IXfVjNCMxnAP/ZjGw9 4ZyEdrUmt69ewQuMw1ERWhQfWh/47H7iX2GflnYMMJmLLHfbqiDJANNWP97ZRkhxOMAH Y7k/tLKWnrdXiYl0VGp3xNZocZLQ+P0m/o46tdIGD+YrTEs2lJ6O5+bQ3Tx/mDKVZVuI 2vHL9YDgeZLWWMta4+TpzBqXGmVfMjp1YdyWQ9HC4IseRY401r/030XbnOU+GSVPc2Du D21FCDCY33uMGqsxVysYGC6cvkBJf5hpYeacJS6Y0/76ouBrQPNxQRj41uWNjoAmfa3i S7Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=DUUOGNzSUweyFgZp64VfNdfW/Is5x4+sUj9/476A/QI=; b=v6lc6JKcdVBN/2tpI+ZOzL6d5wBHvoBIE03WHGWpfiolwsUh80QwGISPO2ekhhAE2n Z/ZfaQHOXnyvsailbZZdOhapV7R5slbmX5vG8e0cbOnGux8Jop9Y0DLhqkv/2WHa0QJd M48iSizkwv/xOC079Hppf+Pf4IJgBxezSJyztA2hI1/LrufDBCPW4oMMfZDgehF9SxFU V9vb5l/aUqEaJWWJ2Rlv4RJdwVPCn6L9slRIMxu+3ebrCvOTe94GN40JBHhtbPt6WrTS kFQiX/KuBRZiIcic2qTpK4hW56FD+4Ul0zfcBBsV8o8JLqs8rSJCnyyyAgWCovSytSHm 7EFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dgMp9Zde; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m23-v6si12223911pgc.677.2018.05.24.04.05.19; Thu, 24 May 2018 04:05:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dgMp9Zde; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S968079AbeEXJz0 (ORCPT + 99 others); Thu, 24 May 2018 05:55:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:35450 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968350AbeEXJzV (ORCPT ); Thu, 24 May 2018 05:55:21 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 790FF20891; Thu, 24 May 2018 09:55:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527155721; bh=DtkfQwXTWZHD+iapyo2H6zIU/cdDKHxAnIF9t05XOfI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dgMp9ZdexFwjHJA+NFXu9tu/aXx1olH4FcO0qDEY2ECXJKAZk3v+zbx4NZ+GDhJFa eRDb/fhC+HAgErLjiHzRKnF1vb6yXcjbMOrkwhyXHwBLmCj4x85jmxl6/WB2743Qga alI7yGR0EqHyo1Z1HfI5yBg1wsY49yQHt7BZq4w0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gary R Hook , Sebastian Andrzej Siewior , Herbert Xu , Sasha Levin Subject: [PATCH 4.14 093/165] crypto: ccp - dont disable interrupts while setting up debugfs Date: Thu, 24 May 2018 11:38:19 +0200 Message-Id: <20180524093625.785791316@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180524093621.979359379@linuxfoundation.org> References: <20180524093621.979359379@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sebastian Andrzej Siewior [ Upstream commit 79eb382b5e06a6dca5806465d7195d686a463ab0 ] I don't why we need take a single write lock and disable interrupts while setting up debugfs. This is what what happens when we try anyway: |ccp 0000:03:00.2: enabling device (0000 -> 0002) |BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:69 |in_atomic(): 1, irqs_disabled(): 1, pid: 3, name: kworker/0:0 |irq event stamp: 17150 |hardirqs last enabled at (17149): [<0000000097a18c49>] restore_regs_and_return_to_kernel+0x0/0x23 |hardirqs last disabled at (17150): [<000000000773b3a9>] _raw_write_lock_irqsave+0x1b/0x50 |softirqs last enabled at (17148): [<0000000064d56155>] __do_softirq+0x3b8/0x4c1 |softirqs last disabled at (17125): [<0000000092633c18>] irq_exit+0xb1/0xc0 |CPU: 0 PID: 3 Comm: kworker/0:0 Not tainted 4.16.0-rc2+ #30 |Workqueue: events work_for_cpu_fn |Call Trace: | dump_stack+0x7d/0xb6 | ___might_sleep+0x1eb/0x250 | down_write+0x17/0x60 | start_creating+0x4c/0xe0 | debugfs_create_dir+0x9/0x100 | ccp5_debugfs_setup+0x191/0x1b0 | ccp5_init+0x8a7/0x8c0 | ccp_dev_init+0xb8/0xe0 | sp_init+0x6c/0x90 | sp_pci_probe+0x26e/0x590 | local_pci_probe+0x3f/0x90 | work_for_cpu_fn+0x11/0x20 | process_one_work+0x1ff/0x650 | worker_thread+0x1d4/0x3a0 | kthread+0xfe/0x130 | ret_from_fork+0x27/0x50 If any locking is required, a simple mutex will do it. Cc: Gary R Hook Signed-off-by: Sebastian Andrzej Siewior Acked-by: Gary R Hook Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/ccp/ccp-debugfs.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) --- a/drivers/crypto/ccp/ccp-debugfs.c +++ b/drivers/crypto/ccp/ccp-debugfs.c @@ -278,7 +278,7 @@ static const struct file_operations ccp_ }; static struct dentry *ccp_debugfs_dir; -static DEFINE_RWLOCK(ccp_debugfs_lock); +static DEFINE_MUTEX(ccp_debugfs_lock); #define MAX_NAME_LEN 20 @@ -290,16 +290,15 @@ void ccp5_debugfs_setup(struct ccp_devic struct dentry *debugfs_stats; struct dentry *debugfs_q_instance; struct dentry *debugfs_q_stats; - unsigned long flags; int i; if (!debugfs_initialized()) return; - write_lock_irqsave(&ccp_debugfs_lock, flags); + mutex_lock(&ccp_debugfs_lock); if (!ccp_debugfs_dir) ccp_debugfs_dir = debugfs_create_dir(KBUILD_MODNAME, NULL); - write_unlock_irqrestore(&ccp_debugfs_lock, flags); + mutex_unlock(&ccp_debugfs_lock); if (!ccp_debugfs_dir) return;