On Fri, Feb 13, 2026 at 08:20:31PM -0800, Saurabh Singh Sengar wrote:
> On Fri, Feb 06, 2026 at 07:47:54AM +0100, Jan Kiszka wrote:
> > From: Jan Kiszka <[email protected]>
> >
> > Resolves the following lockdep report when booting PREEMPT_RT on Hyper-V
> > with related guest support enabled:
> >
> > [ 1.127941] hv_vmbus: registering driver hyperv_drm
> >
> > [ 1.132518] =============================
> > [ 1.132519] [ BUG: Invalid wait context ]
> > [ 1.132521] 6.19.0-rc8+ #9 Not tainted
> > [ 1.132524] -----------------------------
> > [ 1.132525] swapper/0/0 is trying to lock:
> > [ 1.132526] ffff8b9381bb3c90 (&channel->sched_lock){....}-{3:3}, at:
> > vmbus_chan_sched+0xc4/0x2b0
> > [ 1.132543] other info that might help us debug this:
> > [ 1.132544] context-{2:2}
> > [ 1.132545] 1 lock held by swapper/0/0:
> > [ 1.132547] #0: ffffffffa010c4c0 (rcu_read_lock){....}-{1:3}, at:
> > vmbus_chan_sched+0x31/0x2b0
> > [ 1.132557] stack backtrace:
> > [ 1.132560] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.19.0-rc8+
> > #9 PREEMPT_{RT,(lazy)}
> > [ 1.132565] Hardware name: Microsoft Corporation Virtual Machine/Virtual
> > Machine, BIOS Hyper-V UEFI Release v4.1 09/25/2025
> > [ 1.132567] Call Trace:
> > [ 1.132570] <IRQ>
> > [ 1.132573] dump_stack_lvl+0x6e/0xa0
> > [ 1.132581] __lock_acquire+0xee0/0x21b0
> > [ 1.132592] lock_acquire+0xd5/0x2d0
> > [ 1.132598] ? vmbus_chan_sched+0xc4/0x2b0
> > [ 1.132606] ? lock_acquire+0xd5/0x2d0
> > [ 1.132613] ? vmbus_chan_sched+0x31/0x2b0
> > [ 1.132619] rt_spin_lock+0x3f/0x1f0
> > [ 1.132623] ? vmbus_chan_sched+0xc4/0x2b0
> > [ 1.132629] ? vmbus_chan_sched+0x31/0x2b0
> > [ 1.132634] vmbus_chan_sched+0xc4/0x2b0
> > [ 1.132641] vmbus_isr+0x2c/0x150
> > [ 1.132648] __sysvec_hyperv_callback+0x5f/0xa0
> > [ 1.132654] sysvec_hyperv_callback+0x88/0xb0
> > [ 1.132658] </IRQ>
> > [ 1.132659] <TASK>
> > [ 1.132660] asm_sysvec_hyperv_callback+0x1a/0x20
> >
> > As code paths that handle vmbus IRQs use sleepy locks under PREEMPT_RT,
> > the complete vmbus_handler execution needs to be moved into thread
> > context. Open-coding this allows to skip the IPI that irq_work would
> > additionally bring and which we do not need, being an IRQ, never an NMI.
> >
> > Signed-off-by: Jan Kiszka <[email protected]>
>
> First I would like to share my opinion that, although support for the
> RT kernel is not on the near-term roadmap, we should welcome RT Linux
> patches.
>
> Coming back to this patch I can reproduce the stack trace referenced
> in the commit when running with PREEMPT_RT enabled, and I have verified
> that this patch resolves the issue. Next, I observed the storage-related
> stack trace mentioned in Jan’s other patch; applying the storvsc patch
> fixed that as well.
>
> However, when testing without PREEMPT_RT enabled, I see a another lockdep
> warning below (both with and without Jan’s patches). IWanted to check if
> is it possible to address this issue as part of the same fix ?
> Doing so would make the change more useful beyond PREEMPT_RT.
Sharing the stack, missed in previous email:
[ 1.612866] =============================
[ 1.616197] tun: Universal TUN/TAP device driver, 1.6
[ 1.612866] [ BUG: Invalid wait context ]
[ 1.612866] 6.19.0-next-20260212+ #8 Not tainted
[ 1.612866] -----------------------------
[ 1.612866] swapper/0/0 is trying to lock:
[ 1.612866] ffff895a03dfd3f0 (&channel->sched_lock){....}-{3:3}, at:
vmbus_chan_sched+0xda/0x350
[ 1.621086] PPP generic driver version 2.4.2
[ 1.612866] other info that might help us debug this:
[ 1.612866] context-{2:2}
[ 1.612866] 1 lock held by swapper/0/0:
[ 1.612866] #0: ffffffff9b7d4660 (rcu_read_lock){....}-{1:3}, at:
vmbus_chan_sched+0x38/0x350
[ 1.628045] i8042: PNP: No PS/2 controller found.
[ 1.612866] stack backtrace:
[ 1.612866] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted
6.19.0-next-20260212+ #8 PREEMPT
[ 1.612866] Hardware name: Microsoft Corporation Virtual Machine/Virtual
Machine, BIOS Hyper-V UEFI Release v4.1 09/25/2025
[ 1.612866] Call Trace:
[ 1.612866] <IRQ>
[ 1.612866] dump_stack_lvl+0x6f/0xb0
[ 1.612866] dump_stack+0x10/0x20
[ 1.612866] __lock_acquire+0x973/0x24e0
[ 1.612866] ? __lock_acquire+0x449/0x24e0
[ 1.612866] lock_acquire+0xb6/0x2c0
[ 1.612866] ? vmbus_chan_sched+0xda/0x350
[ 1.612866] ? vmbus_chan_sched+0x38/0x350
[ 1.612866] _raw_spin_lock+0x2f/0x50
[ 1.612866] ? vmbus_chan_sched+0xda/0x350
[ 1.612866] vmbus_chan_sched+0xda/0x350
[ 1.612866] ? sched_clock_idle_wakeup_event+0x22/0x50
[ 1.612866] vmbus_isr+0x26/0x170
[ 1.612866] __sysvec_hyperv_callback+0x43/0x80
[ 1.612866] sysvec_hyperv_callback+0x85/0xb0
[ 1.612866] </IRQ>
[ 1.612866] <TASK>
[ 1.612866] asm_sysvec_hyperv_callback+0x1b/0x20
[ 1.612866] RIP: 0010:pv_native_safe_halt+0xb/0x10
[ 1.612866] Code: 48 2b 05 d8 00 97 00 5d c3 cc cc cc cc 66 90 90 90 90 90
90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d 99 33 1f 00 fb f4 <e9> 40 9e
01 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55
[ 1.612866] RSP: 0000:ffffffff9b603dd8 EFLAGS: 00000242
[ 1.612866] RAX: 0000000000040d85 RBX: 0000000000000000 RCX: 0000000000000000
[ 1.612866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff9981172f
[ 1.612866] RBP: ffffffff9b603de0 R08: 0000000000000001 R09: 0000000000000000
[ 1.612866] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 1.612866] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff9b628490
[ 1.612866] ? do_idle+0x20f/0x290
[ 1.612866] ? default_idle+0x9/0x20
[ 1.612866] arch_cpu_idle+0x9/0x10
[ 1.612866] default_idle_call+0x83/0x210
[ 1.612866] do_idle+0x20f/0x290
[ 1.612866] cpu_startup_entry+0x29/0x30
[ 1.612866] rest_init+0x104/0x200
[ 1.612866] start_kernel+0xa13/0xc90
[ 1.612866] ? sme_unmap_bootdata+0x14/0x70
[ 1.612866] x86_64_start_reservations+0x18/0x30
[ 1.612866] x86_64_start_kernel+0x148/0x1a0
[ 1.612866] ? soft_restart_cpu+0x14/0x14
[ 1.612866] common_startup_64+0x13e/0x141
[ 1.612866] </TASK>
- Saurabh