[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4a0d36bf1d8265aa2692d7d1b33d724fe7a98849.camel@infradead.org>
Date: Tue, 22 Dec 2020 09:42:11 +0000
From: David Woodhouse <dwmw2@...radead.org>
To: kernel test robot <oliver.sang@...el.com>
Cc: 0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
lkp@...ts.01.org, kvm@...r.kernel.org,
Paolo Bonzini <pbonzini@...hat.com>,
Ankur Arora <ankur.a.arora@...cle.com>,
Joao Martins <joao.m.martins@...cle.com>,
Boris Ostrovsky <boris.ostrovsky@...cle.com>,
Sean Christopherson <seanjc@...gle.com>, graf@...zon.com,
iaslan@...zon.de
Subject: Re: [KVM] fdd90b978b: WARNING:suspicious_RCU_usage
On Tue, 2020-12-22 at 13:06 +0800, kernel test robot wrote:
>
> kern :warn : [ 86.138096] WARNING: suspicious RCU usage
> kern :warn : [ 86.142286] 5.10.0-rc5-gfdd90b978b4e #1 Tainted: G I
> kern :warn : [ 86.148879] -----------------------------
> kern :warn : [ 86.153110] include/linux/kvm_host.h:633 suspicious rcu_dereference_check() usage!
> kern :warn : [ 86.160992]
> other info that might help us debug this:
>
> kern :warn : [ 86.169413]
> rcu_scheduler_active = 2, debug_locks = 1
> kern :warn : [ 86.176231] no locks held by xen_shinfo_test/10611.
> kern :warn : [ 86.181328]
> stack backtrace:
> kern :warn : [ 86.185946] CPU: 2 PID: 10611 Comm: xen_shinfo_test Tainted: G I 5.10.0-rc5-gfdd90b978b4e #1
> kern :warn : [ 86.196092] Hardware name: /NUC6i7KYB, BIOS KYSKLi70.86A.0041.2016.0817.1130 08/17/2016
> kern :warn : [ 86.204517] Call Trace:
> kern :warn : [ 86.207122] dump_stack+0x8d/0xb5
> kern :warn : [ 86.210615] kvm_map_gfn+0xbb/0xc0
> kern :warn : [ 86.214127] kvm_xen_map_guest_page+0x5c/0x100
> kern :warn : [ 86.218787] kvm_xen_hvm_set_attr+0xf8/0x1c0
> kern :warn : [ 86.223275] kvm_arch_vm_ioctl+0xae9/0xc80
Thanks. FWIW all this mapping code was removed in the last version of
the series.
Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5174 bytes)
Powered by blists - more mailing lists