On Tue, 2020-12-22 at 13:06 +0800, kernel test robot wrote: > > kern :warn : [ 86.138096] WARNING: suspicious RCU usage > kern :warn : [ 86.142286] 5.10.0-rc5-gfdd90b978b4e #1 Tainted: G I > kern :warn : [ 86.148879] ----------------------------- > kern :warn : [ 86.153110] include/linux/kvm_host.h:633 suspicious rcu_dereference_check() usage! > kern :warn : [ 86.160992] > other info that might help us debug this: > > kern :warn : [ 86.169413] > rcu_scheduler_active = 2, debug_locks = 1 > kern :warn : [ 86.176231] no locks held by xen_shinfo_test/10611. > kern :warn : [ 86.181328] > stack backtrace: > kern :warn : [ 86.185946] CPU: 2 PID: 10611 Comm: xen_shinfo_test Tainted: G I 5.10.0-rc5-gfdd90b978b4e #1 > kern :warn : [ 86.196092] Hardware name: /NUC6i7KYB, BIOS KYSKLi70.86A.0041.2016.0817.1130 08/17/2016 > kern :warn : [ 86.204517] Call Trace: > kern :warn : [ 86.207122] dump_stack+0x8d/0xb5 > kern :warn : [ 86.210615] kvm_map_gfn+0xbb/0xc0 > kern :warn : [ 86.214127] kvm_xen_map_guest_page+0x5c/0x100 > kern :warn : [ 86.218787] kvm_xen_hvm_set_attr+0xf8/0x1c0 > kern :warn : [ 86.223275] kvm_arch_vm_ioctl+0xae9/0xc80 Thanks. FWIW all this mapping code was removed in the last version of the series.
Attachment:
smime.p7s
Description: S/MIME cryptographic signature