Re: Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats on lock acquisition/release")

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> On Dec 28, 2022, at 9:39 PM, Joel Fernandes <joel@xxxxxxxxxxxxxxxxx> wrote:
> 
> Hello,
> Please apply to v5.10 stable: 4d60b475f858 ("rcu: Prevent lockdep-RCU splats
> on lock acquisition/release"). The patch made it in v5.11
> 
> Without it, I get the follow splat on TREE05 rcutorture testing:
> 
> [    1.253678] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.10.162-rc1+ #6
> [    1.253678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
> [    1.253678] Call Trace:
> [    1.253678]
> [    1.253678] =============================
> [    1.253678] WARNING: suspicious RCU usage
> [    1.253678] 5.10.162-rc1+ #6 Not tainted
> [    1.253678] -----------------------------
> [    1.253678] kernel/kprobes.c:300 RCU-list traversed in non-reader section!!
> 
> I tested with the patch and the warning is gone.

Please hold off on this particular one. After a 12 hour test, I am seeing some new warnings. Will update the thread after some more debug.

Sorry for the noise,

 - Joel


> 
> thanks,
> 
> - Joel
> 




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux