Le mercredi 01 dÃcembre 2010 Ã 19:14 +0800, Amerigo Wang a Ãcrit :From: WANG Cong<amwang@xxxxxxxxxx>
The latest net-next-2.6 triggers an RCU warning during boot,
lockdep complains that in inet_fill_link_af() we call rcu_dereference_check()
without rcu_read_lock() protection.
This patch fixes it by replacing __in_dev_get_rcu() with in_dev_get().
Here is a better version, thanks a lot for your report and initial
patch.
[PATCH net-next-2.6] net: kill an RCU warning in inet_fill_link_af()
commits 9f0f7272 (ipv4: AF_INET link address family) and cf7afbfeb8c
(rtnl: make link af-specific updates atomic) used incorrect
__in_dev_get_rcu() in RTNL protected contexts, triggering PROVE_RCU
warnings.
Switch to __in_dev_get_rtnl(), wich is more appropriate, since we hold
RTNL.
Based on a report and initial patch from Amerigo Wang.