Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp6315747ybn; Sun, 29 Sep 2019 17:28:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqz/+fnxz2ALOK3W4ovwQcTQAXWErOhj1MIs3Jisf/w2VzovBoY66QbJH9mMttJtQryR0JYO X-Received: by 2002:a17:906:9498:: with SMTP id t24mr16554682ejx.88.1569803338872; Sun, 29 Sep 2019 17:28:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569803338; cv=none; d=google.com; s=arc-20160816; b=W9UAF6IBLxzAJZSTRxrtCdIwYhFY1xW6TQLMMaowwa3pup7i9ArzRChuCeQFZHZ2e2 GrDtMLgPebps4Qsq4VYBOY22Q3sqtYPpa+OiFXr05hOSe7isXU6p0ZBeVcKdm8IYr6Y+ XKFgiz9rRWP3F288ZT/drY2pQ5WO5mrtUtMt1qSLFATC/rLrJAaGVLbER7MPLxN+qS6t Fy9VrrW8Fek1uG/E2vo+6ZmOF25RHdh5hBnJBwvaeH4kuFTHqO5clVWpIxTvSFmuMUTn UjwTU9IKPFeXEkMn9qvK+07/v/BVAYeUZC20qeYZ18F54bKa8a6SPg3ziLvHZcaGWmTI L3fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=18Xoe49n0LwJ985Z5rDsuGb/OZgAqt2Ye8XtTlaCTqY=; b=taEbjxQPMC99hdtum6lq7jG7pWpYzVQjL7vM7xV65e2iw3Xgj+rvze1JhTeSwqkGJk 1D0Yys+r1WzY8rTFWWCLJwCL5zUm9ELCNAGACoRfLbpZog1a8RY7+Px7sX08SFhYwbhL dPQcqa55P+EDY4x4/wtOUfm+oGTM1C+Gm/4KdPDWuOWqLyC6nL/qLYjaw2o45X7fxamI 5fxOhzBf8pRt9oPyeTuf2SeNsPGDe8/YE15xfEzvDWqnCkoDmgTERz63XJ5ik8CrAoTU JAY+fVj1Kn1520Ill0miaD+BPv4IwC1xtXKBDBuwQIB2m8H/0qYEPz2kltFf2NkYHvE/ y0CQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1vl6AlM6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z10si5542173edd.140.2019.09.29.17.28.34; Sun, 29 Sep 2019 17:28:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1vl6AlM6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729205AbfI3A2b (ORCPT + 99 others); Sun, 29 Sep 2019 20:28:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:37454 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726360AbfI3A2a (ORCPT ); Sun, 29 Sep 2019 20:28:30 -0400 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 059E02082F; Mon, 30 Sep 2019 00:28:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569803310; bh=18Xoe49n0LwJ985Z5rDsuGb/OZgAqt2Ye8XtTlaCTqY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=1vl6AlM68mcxrKNKJrSd1tVhtyrR6+F6y2tUi5gN2GnhyJag2mk3rTFfiyB5FDf6/ P1TIgQV/HLhaBfAd0e+KhMXzNw/OLO8i9JYKM0Mt9RPT4dCjzkygjXeqkwUspy2jzU k4+Ae1hTd6qXM15QQ+6FNvNqvskZNA3o+ydOY5mI= Date: Sun, 29 Sep 2019 20:28:28 -0400 From: Sasha Levin To: Tetsuo Handa Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org, syzbot+53383ae265fb161ef488@syzkaller.appspotmail.com, Waiman Long , "Peter Zijlstra (Intel)" , Andrew Morton , Linus Torvalds , "Paul E. McKenney" , Thomas Gleixner , Will Deacon , Ingo Molnar Subject: Re: [PATCH 4.19 36/63] locking/lockdep: Add debug_locks check in __lock_downgrade() Message-ID: <20190930002828.GQ8171@sasha-vm> References: <20190929135031.382429403@linuxfoundation.org> <20190929135038.482721804@linuxfoundation.org> <801c81d2-ce72-8eb3-a18b-1b0943270fc4@i-love.sakura.ne.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <801c81d2-ce72-8eb3-a18b-1b0943270fc4@i-love.sakura.ne.jp> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Sep 29, 2019 at 11:43:38PM +0900, Tetsuo Handa wrote: >On 2019/09/29 22:54, Greg Kroah-Hartman wrote: >> From: Waiman Long >> >> [ Upstream commit 513e1073d52e55b8024b4f238a48de7587c64ccf ] >> >> Tetsuo Handa had reported he saw an incorrect "downgrading a read lock" >> warning right after a previous lockdep warning. It is likely that the >> previous warning turned off lock debugging causing the lockdep to have >> inconsistency states leading to the lock downgrade warning. >> >> Fix that by add a check for debug_locks at the beginning of >> __lock_downgrade(). > >Please drop "[PATCH 4.19 36/63] locking/lockdep: Add debug_locks check in __lock_downgrade()". >We had a revert patch shown below in the past. We had a revert in the stable trees, but that revert was incorrect. Take a look at commit 513e1073d52e55 upstream, it patches __lock_set_class() (even though the subject line says __lock_downgrade()). So this is not a backporting error as the revert said it is, but is rather the intended location to be patched. If this is actually wrong, then it should be addressed upstream first. -- Thanks, Sasha