Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755204AbYGSM44 (ORCPT ); Sat, 19 Jul 2008 08:56:56 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753905AbYGSM4s (ORCPT ); Sat, 19 Jul 2008 08:56:48 -0400 Received: from courier.cs.helsinki.fi ([128.214.9.1]:53711 "EHLO mail.cs.helsinki.fi" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752833AbYGSM4r (ORCPT ); Sat, 19 Jul 2008 08:56:47 -0400 Subject: Re: linux-next: Tree for July 18: warning at kernel/lockdep.c:2068 trace_hardirqs_on_caller From: Pekka Enberg To: Vegard Nossum Cc: Mariusz Kozlowski , Stephen Rothwell , kernel-testers@vger.kernel.org, linux-next@vger.kernel.org, LKML , cl@linux-foundation.org In-Reply-To: <19f34abd0807190255x304173d4wf2bfabb2d5bce511@mail.gmail.com> References: <20080718195352.e562a00f.sfr@canb.auug.org.au> <200807190928.33978.m.kozlowski@tuxland.pl> <19f34abd0807190255x304173d4wf2bfabb2d5bce511@mail.gmail.com> Date: Sat, 19 Jul 2008 15:56:29 +0300 Message-Id: <1216472189.6762.166.camel@penberg-laptop> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 7bit X-Mailer: Evolution 2.22.2 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2624 Lines: 64 On Sat, 2008-07-19 at 11:55 +0200, Vegard Nossum wrote: > On Sat, Jul 19, 2008 at 9:28 AM, Mariusz Kozlowski > wrote: > > Hello, > > > > I get this on my x86_32 laptop. > > > > ------------[ cut here ]------------ > > WARNING: at /home/mako/linux/lkt/sources/linux-next/kernel/lockdep.c:2068 trace_hardirqs_on_caller+0xdc/0x128() > > Modules linked in: > > Pid: 0, comm: swapper Not tainted 2.6.26-next-20080718 #1 > > [] warn_on_slowpath+0x4e/0x68 > > [] ? init_srcu_struct+0x17/0x3b > > [] ? release_console_sem+0x1c2/0x1e8 > > [] ? trace_hardirqs_off+0xb/0xd > > [] ? _spin_unlock_irqrestore+0x39/0x60 > > [] ? release_console_sem+0x1d6/0x1e8 > > [] ? up+0x23/0x30 > > [] ? release_console_sem+0x1c2/0x1e8 > > [] ? up+0x23/0x30 > > [] ? release_console_sem+0x1c2/0x1e8 > > [] ? __lock_acquire+0x365/0x1151 > > [] trace_hardirqs_on_caller+0xdc/0x128 > > [] trace_hardirqs_on+0xb/0xd > > [] __slab_alloc+0x329/0x61e > > [] ? kmemcheck_memset+0x24/0xe5 > > [] kmem_cache_alloc+0xa0/0xb6 > > [] ? kobject_init+0x3b/0xdd > > [] ? kobject_init+0x3b/0xdd > > [] kobject_init+0x3b/0xdd > > [] firmware_map_add_entry+0x2a/0x4b > > [] firmware_map_add_early+0x32/0x56 > > [] e820_reserve_resources+0x10a/0x14e > > [] setup_arch+0x375/0x540 > > [] ? clockevents_register_notifier+0x28/0x2d > > [] ? printk+0x1b/0x1d > > [] start_kernel+0x67/0x278 > > [] i386_start_kernel+0x64/0x70 > > ======================= > > ---[ end trace 4eaa2a86a8e2da22 ]--- > > > > What I don't get here is how SLUB can be used this early in the boot > process. Notice that this is still miles away from the > > SLUB: Genslabs=12, HWalign=128, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 > > line, which comes much later. And that kobject_init() _is_ calling > kzalloc() via verify_dynamic_kobject_allocation(). Isn't this an > error? > > (Unfortunately, my "git log" doesn't turn up any recent changes for > any of the affected code paths here.) Indeed, looks like a bug in kobject_init(). You need to wait for kmem_cache_init() to be run before using kzalloc(). Pekka -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/