Sebastian Andrzej Siewior 4051a81774 locking/lockdep: Use sched_clock() for random numbers
Since the rewrote of prandom_u32(), in the commit mentioned below, the
function uses sleeping locks which extracing random numbers and filling
the batch.
This breaks lockdep on PREEMPT_RT because lock_pin_lock() disables
interrupts while calling __lock_pin_lock(). This can't be moved earlier
because the main user of the function (rq_pin_lock()) invokes that
function after disabling interrupts in order to acquire the lock.

The cookie does not require random numbers as its goal is to provide a
random value in order to notice unexpected "unlock + lock" sites.

Use sched_clock() to provide random numbers.

Fixes: a0103f4d86f88 ("random32: use real rng for non-deterministic randomness")
Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/YoNn3pTkm5+QzE5k@linutronix.de
2022-06-13 10:29:57 +02:00
..
2022-05-26 17:13:43 -07:00
2022-06-02 07:17:59 +02:00
2022-06-05 10:40:31 -07:00
2022-05-25 16:18:27 -07:00
2021-12-02 17:25:21 +09:00
2022-05-25 11:32:53 -07:00
2022-06-02 08:55:01 -07:00
2022-05-27 21:24:19 -07:00
2022-05-26 16:57:20 -07:00
2022-01-11 13:08:21 -08:00
2021-08-11 13:11:12 -07:00
2021-09-08 15:32:35 -07:00
2022-05-23 17:51:12 -07:00
2022-03-15 10:32:44 +01:00
2022-03-28 17:29:53 -07:00
2021-09-08 15:32:34 -07:00
2022-05-29 10:31:36 -07:00
2022-05-02 14:06:20 -06:00
2022-05-26 16:57:20 -07:00
2021-10-14 13:29:18 +02:00
2022-01-08 12:43:57 -06:00
2022-05-24 11:11:13 -07:00
2022-02-25 09:36:06 +01:00
2022-05-26 16:57:20 -07:00