From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dimitris Michailidis Subject: net-next rcu_dereference_check() warning Date: Mon, 27 Sep 2010 09:30:09 -0700 Message-ID: <4CA0C691.1090001@chelsio.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit To: netdev@vger.kernel.org Return-path: Received: from stargate.chelsio.com ([67.207.112.58]:23991 "EHLO stargate.chelsio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759753Ab0I0QaO (ORCPT ); Mon, 27 Sep 2010 12:30:14 -0400 Received: from [127.0.0.1] (honeypot.asicdesigners.com [10.192.176.252]) by stargate.chelsio.com (8.13.1/8.13.1) with ESMTP id o8RGUBGP012033 for ; Mon, 27 Sep 2010 09:30:11 -0700 Sender: netdev-owner@vger.kernel.org List-ID: With today's net-next I am getting the below. It appears to be recent, it wasn't happening with the net-next I was using last week. =================================================== [ INFO: suspicious rcu_dereference_check() usage. ] --------------------------------------------------- /build/net-next-2.6/include/linux/netpoll.h:67 invoked rcu_dereference_check() without protection! other info that might help us debug this: rcu_scheduler_active = 1, debug_locks = 0 1 lock held by ypbind/5046: #0: (sk_lock-AF_INET){+.+.+.}, at: [] udp_sendmsg+0x3fd/0x5dc stack backtrace: Pid: 5046, comm: ypbind Not tainted 2.6.36-rc3+ #16 Call Trace: [] lockdep_rcu_dereference+0xaa/0xb3 [] netif_rx+0x53/0x1cf [] ? get_parent_ip+0x11/0x41 [] netif_rx_ni+0x23/0x5d [] ip_dev_loopback_xmit+0xc5/0xcb [] ip_mc_output+0x18d/0x1a5 [] ip_local_out+0x62/0x66 [] ip_push_pending_frames+0x2db/0x337 [] udp_push_pending_frames+0x2de/0x34c [] ? udp_sendmsg+0x3fd/0x5dc [] udp_sendmsg+0x4ee/0x5dc [] inet_sendmsg+0x13a/0x145 [] ? inet_sendmsg+0x0/0x145 [] sock_sendmsg+0xc0/0xd9 [] ? lock_release_non_nested+0xe5/0x296 [] ? might_fault+0x68/0xb8 [] ? might_fault+0x68/0xb8 [] ? might_fault+0xb1/0xb8 [] ? might_fault+0x68/0xb8 [] ? move_addr_to_kernel+0x3f/0x56 [] sys_sendto+0xe0/0x108 [] ? d_kill+0x6c/0x74 [] ? fput+0x1ce/0x1dd [] system_call_fastpath+0x16/0x1b