Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp793370pxb; Tue, 3 Nov 2020 12:41:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJzCrZryjcmCcxhfqbNqUZNt5E8Wxb1fbwVsaGzYhQjdAEL1qvH+O2PRFqW7x7O5/qT6eJgW X-Received: by 2002:a17:907:2667:: with SMTP id ci7mr17176499ejc.282.1604436067676; Tue, 03 Nov 2020 12:41:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604436067; cv=none; d=google.com; s=arc-20160816; b=VE9ifGrEKaDr9CntfT/pABDc2rCXM5f7rvRL6fdxmuYvGJvRhWOIz2zFRzUamTufHU GRl2y5D1Zz58ac1vjq7sGvG9rObfjpzKiusXfhd7gh2id3hLLeI3F14Cx3aPzgbHGxSV 2xOm4geID1y9DBZneyAU2J4ioHHasrXP4n1EyGiEmhvtHI7ADuiMQSqOlCVGl4BIU4D6 0IR6drbA8t/rw7x3kbfQCF1zzGnZffBfhMWuKopWiXq8xkNuc0iUIqmZ330Oq0xIGGYu OZmNXCk4muzG/5xNLJUqBtVBtHMs/lHTu+OkETmPrgFWiONJSrH5Q8lmXQGCb3cAW/+M 3SFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=MNw0FfvBStyYva11ommS0/AEenQ351cLLQPQHESQl8c=; b=TNwJKTcexaaABBBgS50C1lp5Qq+0oSVfBiGE3ridXJIKlBybGm4OEAKkx4ZV7OS9OJ lpeqKSuj/uHJaa5T0qf5aHl6EEvvvkdHDPMngQLDiLQRPeshbOBqIB9hWj6TK8HZBZ+J pgHcpdOSERha8Z39HHngGg+EiHMnaksaPe5RBIU92PLfjGmoWtj4Sj0EVpEjXcuTBPGB rKg15+Pu7XuoZ0GalwRfW71EI32DjPC5IuDM+636Ww7EXojj3NjAEb3PRMAzOJpkxTwJ h8/bj8zplSe1MuIhSic2QuDTUVaULgDrAz+pGkdM+lbrxvvD0i4hyVOA8TzovqfJSAfL ffvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=F++LPkcs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd28si5656705ejb.606.2020.11.03.12.40.44; Tue, 03 Nov 2020 12:41:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=F++LPkcs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729997AbgKCUin (ORCPT + 99 others); Tue, 3 Nov 2020 15:38:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:49040 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729969AbgKCUil (ORCPT ); Tue, 3 Nov 2020 15:38:41 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4643822226; Tue, 3 Nov 2020 20:38:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604435920; bh=1e+jJ2JMYtK1uaKazz4HqSjoXw+cWKvPgzN3SsMC/CY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=F++LPkcsam9Zl3z3Ciz9Zk5xUxPSK8yCF5ZYPTE0fgEPuYNKOLJ/alMN849pjRaZi lZs7DbOSK40KD1oGf07SqGf68IjqQnTHfgosYF2eiFxqQmJrJwvnDkHsx7vqYhXrTw f8+OYUk/iaBLm0Fv2AgvNBvN6s5HUjEH+sOOPnqs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+53f8ce8bbc07924b6417@syzkaller.appspotmail.com, kernel test robot , "Peter Zijlstra (Intel)" , Sasha Levin Subject: [PATCH 5.9 040/391] lockdep: Fix preemption WARN for spurious IRQ-enable Date: Tue, 3 Nov 2020 21:31:31 +0100 Message-Id: <20201103203350.357256240@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Peter Zijlstra [ Upstream commit f8e48a3dca060e80f672d398d181db1298fbc86c ] It is valid (albeit uncommon) to call local_irq_enable() without first having called local_irq_disable(). In this case we enter lockdep_hardirqs_on*() with IRQs enabled and trip a preemption warning for using __this_cpu_read(). Use this_cpu_read() instead to avoid the warning. Fixes: 4d004099a6 ("lockdep: Fix lockdep recursion") Reported-by: syzbot+53f8ce8bbc07924b6417@syzkaller.appspotmail.com Reported-by: kernel test robot Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Sasha Levin --- kernel/locking/lockdep.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c index 85d15f0362dc5..3eb35ad1b5241 100644 --- a/kernel/locking/lockdep.c +++ b/kernel/locking/lockdep.c @@ -3681,7 +3681,7 @@ void lockdep_hardirqs_on_prepare(unsigned long ip) if (unlikely(in_nmi())) return; - if (unlikely(__this_cpu_read(lockdep_recursion))) + if (unlikely(this_cpu_read(lockdep_recursion))) return; if (unlikely(lockdep_hardirqs_enabled())) { @@ -3750,7 +3750,7 @@ void noinstr lockdep_hardirqs_on(unsigned long ip) goto skip_checks; } - if (unlikely(__this_cpu_read(lockdep_recursion))) + if (unlikely(this_cpu_read(lockdep_recursion))) return; if (lockdep_hardirqs_enabled()) { -- 2.27.0