Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp277091ybi; Wed, 29 May 2019 21:12:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqwHK+ApmIdoFdb1qMZ30QBdIzfPhVy4PojM1S64vcETxfKHi5XPuG17J53osf+yjDuO/SU0 X-Received: by 2002:a62:3006:: with SMTP id w6mr649608pfw.159.1559189574726; Wed, 29 May 2019 21:12:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559189574; cv=none; d=google.com; s=arc-20160816; b=Hy0Z/WmlGs/oW9SX0xSrdNIywT8r9q/rqcclOTRSzSEcNGBxp85vkklW/EsdYBvlby 73r1fkPU63eSNo2DsEb0pnt2HuJd8t+2suMI1SK6+jzISkqoEeUXH5B0EuSY13Q/2l3o 2nrWlZRqzM5jQeV2Jk5w9reerraRdY8Zg29H2ka2wsOJeZQvlkvZnWHvqafwxdxJwctK H9YgeerNsobp55J/zh7zj+w0zNSBjlKWF3+2GwJmkJ6iCcgZJKViqfuMCN7MJBxBS9Z2 xqNfJtTaXsy6NmYs2+590Ai1Zu9w4lxyrZ5AtFvwu8fj3n96/hFVoztxbeZNFL7XbPV/ IfrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NM36ieKyn8aCuQao8wRlu6PumiJEKPOMFeUI8g2JuLg=; b=psZazy+E9ZbI42ipVnLht3wE+4dOn6F60hQO2zQcYsdzqTj2CuOmoubrSP/R0u0M/8 0dbRlIxcGdU+gM348akbzwLnVP6DapLTuIM975LGByN0xoMF4PYZgK33Imn3OF7QrXyP lAVvL7S5hzoxXF5iAUHQdKcJRg6OEdU+O8Ms1+jFCejmsmb8Fc5pJKdEerI66ihFoVDx q8x+n0UGzR8qLxqpwSOpAmz4TREXAas3+ghiDl3016L28uxCf12rloCJGE96Xfxr9GAC IBEagDcl0UpsV0V7WixZuhaW8tHX55jUvjwbC3vjN87KuvygmY7R/7+Q0ClzGXBlVYyO 9deA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vv0NMyj7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n31si510444pjc.5.2019.05.29.21.12.38; Wed, 29 May 2019 21:12:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vv0NMyj7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727092AbfE3EKV (ORCPT + 99 others); Thu, 30 May 2019 00:10:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:44696 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730888AbfE3DRB (ORCPT ); Wed, 29 May 2019 23:17:01 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B887924656; Thu, 30 May 2019 03:17:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186220; bh=fftdQk/7amfLgc7ki+wpqJ+JdSTVNsCzjgwyklgGKRA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vv0NMyj7RTM0yPtglW/Z6mrNXfRVxJNluW8NVXamKUH9k84UVJQgrEcZ5BcFOhCga K2z1d5V3dTliHDLSfdXVKiEZWIwQg1TmeIyWabkRLxNGA8J60pM3iV6iOn9zR1Y92g Bx2VhF3x2YmE+oFL7jJ8NRNG2IVUug1WJanJLLPM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolai Stange , Jiri Kosina , "Peter Zijlstra (Intel)" , Andy Lutomirski , Borislav Petkov , Dave Hansen , Frederic Weisbecker , Joerg Roedel , Linus Torvalds , Thomas Gleixner , Ingo Molnar , Sasha Levin Subject: [PATCH 4.19 112/276] x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() Date: Wed, 29 May 2019 20:04:30 -0700 Message-Id: <20190530030532.968779573@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030523.133519668@linuxfoundation.org> References: <20190530030523.133519668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit a65c88e16f32aa9ef2e8caa68ea5c29bd5eb0ff0 ] In-NMI warnings have been added to vmalloc_fault() via: ebc8827f75 ("x86: Barf when vmalloc and kmemcheck faults happen in NMI") back in the time when our NMI entry code could not cope with nested NMIs. These days, it's perfectly fine to take a fault in NMI context and we don't have to care about the fact that IRET from the fault handler might cause NMI nesting. This warning has already been removed from 32-bit implementation of vmalloc_fault() in: 6863ea0cda8 ("x86/mm: Remove in_nmi() warning from vmalloc_fault()") but the 64-bit version was omitted. Remove the bogus warning also from 64-bit implementation of vmalloc_fault(). Reported-by: Nicolai Stange Signed-off-by: Jiri Kosina Acked-by: Peter Zijlstra (Intel) Cc: Andy Lutomirski Cc: Borislav Petkov Cc: Dave Hansen Cc: Frederic Weisbecker Cc: Joerg Roedel Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Fixes: 6863ea0cda8 ("x86/mm: Remove in_nmi() warning from vmalloc_fault()") Link: http://lkml.kernel.org/r/nycvar.YFH.7.76.1904240902280.9803@cbobk.fhfr.pm Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin --- arch/x86/mm/fault.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index 47bebfe6efa70..9d9765e4d1ef1 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -427,8 +427,6 @@ static noinline int vmalloc_fault(unsigned long address) if (!(address >= VMALLOC_START && address < VMALLOC_END)) return -1; - WARN_ON_ONCE(in_nmi()); - /* * Copy kernel mappings over when needed. This can also * happen within a race in page table update. In the later -- 2.20.1