Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp2447797ybg; Thu, 24 Oct 2019 09:48:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqwCZFETiuGZV9tHsbHLDrwp8qDo4h9hJs494iTPZMXnR7dCPkchMs3iYFzV4hWJlVk6Lpj6 X-Received: by 2002:a17:906:9596:: with SMTP id r22mr2203674ejx.332.1571935716344; Thu, 24 Oct 2019 09:48:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571935716; cv=none; d=google.com; s=arc-20160816; b=rXpaf2PDk/0pTd41UJVb84Jzt+/fFBy37YpLtHLzLv1eBo6wlesKRKDjIlN4tgJltS y1ZcRrlGgJ/Bj8e1OwYTuzxBZQphdKZOl41ostgCvyKUmfvqvXB/BxYudhLGlAHb94uk dVPHYxjNzeCT+23/lSEuQ4h57VTcJjypFDdn5OSHEZ0elFY8wBa/o17zNPjv1ihZZK7a pG/DcQ9SOeuHyolR0lIh17oYRyc9KFOzX48GvK3H1LHrB4keAYu2UNB+ct5s8rBpEiAU eBIQXuyF1jZeWeYEe4XEZTwjnhENh+z3KVJWxN2QqoFVrhBFwj7FoL1VbnbEZyWOIkEb WFfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=6RpESkgeR72NRdSZX7ZLtWsxSCVVwPTTnZywZxXk+70=; b=e5x5PghKEWGU9OYJ0mnfw+R85L3BrnqBLq3XkG4D+BajnOnZbJD4mN/Ul/ynBKfUtV LdslobqDz6Kwo165iLCgBdsoE/aEHcSCTiviqlnBb8n0+OIrUlysfcBk30ZDx1s5Rpk9 2SJR1hGrwH2JBTXyRkJne3Q9E3V3uYKbSPDq2FlRoTuCwCGMbdRXF30zN0qLg2Lebo9m 4z00nD+ZOjW34nXl5Af+FBCqyAhr11xcnTvdb0G01Wb53IQA5IYXh2TouLEFJdtZcxCq k2drLNo9+gIxjVI+TJ9YFw4zIrE1rYtRREomkXfYkndvL6ROSewZfP+4UsGFg1gMXxz4 eXzA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v10si6249204edc.62.2019.10.24.09.48.11; Thu, 24 Oct 2019 09:48:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392737AbfJWXYF (ORCPT + 99 others); Wed, 23 Oct 2019 19:24:05 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:51325 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731522AbfJWXYF (ORCPT ); Wed, 23 Oct 2019 19:24:05 -0400 Received: from p5b06da22.dip0.t-ipconnect.de ([91.6.218.34] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1iNPyy-0002iM-Q5; Thu, 24 Oct 2019 01:24:00 +0200 Date: Thu, 24 Oct 2019 01:23:59 +0200 (CEST) From: Thomas Gleixner To: Josh Poimboeuf cc: LKML , x86@kernel.org, Peter Zijlstra , Andy Lutomirski , Will Deacon , Paolo Bonzini , kvm@vger.kernel.org, linux-arch@vger.kernel.org, Mike Rapoport , Miroslav Benes Subject: Re: [patch V2 05/17] x86/traps: Make interrupt enable/disable symmetric in C code In-Reply-To: <20191023220109.jmbrluyjxenblcij@treble> Message-ID: References: <20191023122705.198339581@linutronix.de> <20191023123118.084086112@linutronix.de> <20191023220109.jmbrluyjxenblcij@treble> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 23 Oct 2019, Josh Poimboeuf wrote: > On Wed, Oct 23, 2019 at 02:27:10PM +0200, Thomas Gleixner wrote: > > --- a/arch/x86/mm/fault.c > > +++ b/arch/x86/mm/fault.c > > @@ -1500,10 +1500,13 @@ static noinline void > > return; > > > > /* Was the fault on kernel-controlled part of the address space? */ > > - if (unlikely(fault_in_kernel_space(address))) > > + if (unlikely(fault_in_kernel_space(address))) { > > do_kern_addr_fault(regs, hw_error_code, address); > > - else > > + } else { > > do_user_addr_fault(regs, hw_error_code, address); > > + if (regs->flags & X86_EFLAGS_IF) > > + local_irq_disable(); > > + } > > The corresponding irq enable is in do_user_addr_fault(), why not do the > disable there? Yeah, will do. Was just as lazy as Peter and did not want to touch the gazillion of returns. :) Thanks, tglx