summaryrefslogtreecommitdiffstats
path: root/debian/patches-rt/0100-printk-Add-sparse-notation-to-console_srcu-locking.patch
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches-rt/0100-printk-Add-sparse-notation-to-console_srcu-locking.patch')
-rw-r--r--debian/patches-rt/0100-printk-Add-sparse-notation-to-console_srcu-locking.patch36
1 files changed, 36 insertions, 0 deletions
diff --git a/debian/patches-rt/0100-printk-Add-sparse-notation-to-console_srcu-locking.patch b/debian/patches-rt/0100-printk-Add-sparse-notation-to-console_srcu-locking.patch
new file mode 100644
index 0000000000..8a1473c93d
--- /dev/null
+++ b/debian/patches-rt/0100-printk-Add-sparse-notation-to-console_srcu-locking.patch
@@ -0,0 +1,36 @@
+From: John Ogness <john.ogness@linutronix.de>
+Date: Mon, 9 Oct 2023 13:55:19 +0000
+Subject: [PATCH 100/134] printk: Add sparse notation to console_srcu locking
+Origin: https://www.kernel.org/pub/linux/kernel/projects/rt/6.6/older/patches-6.6.7-rt18.tar.xz
+
+kernel/printk/printk.c:284:5: sparse: sparse: context imbalance in
+'console_srcu_read_lock' - wrong count at exit
+include/linux/srcu.h:301:9: sparse: sparse: context imbalance in
+'console_srcu_read_unlock' - unexpected unlock
+
+Reported-by: kernel test robot <lkp@intel.com>
+Fixes: 6c4afa79147e ("printk: Prepare for SRCU console list protection")
+Signed-off-by: John Ogness <john.ogness@linutronix.de>
+Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
+---
+ kernel/printk/printk.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/kernel/printk/printk.c
++++ b/kernel/printk/printk.c
+@@ -282,6 +282,7 @@ EXPORT_SYMBOL(console_list_unlock);
+ * Return: A cookie to pass to console_srcu_read_unlock().
+ */
+ int console_srcu_read_lock(void)
++ __acquires(&console_srcu)
+ {
+ return srcu_read_lock_nmisafe(&console_srcu);
+ }
+@@ -295,6 +296,7 @@ EXPORT_SYMBOL(console_srcu_read_lock);
+ * Counterpart to console_srcu_read_lock()
+ */
+ void console_srcu_read_unlock(int cookie)
++ __releases(&console_srcu)
+ {
+ srcu_read_unlock_nmisafe(&console_srcu, cookie);
+ }