Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756815AbZGGLuS (ORCPT ); Tue, 7 Jul 2009 07:50:18 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755110AbZGGLuD (ORCPT ); Tue, 7 Jul 2009 07:50:03 -0400 Received: from mail.open.by ([193.232.92.17]:54735 "EHLO post.open.by" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754543AbZGGLuB (ORCPT ); Tue, 7 Jul 2009 07:50:01 -0400 X-SpamTest-Envelope-From: sergey.senozhatsky@mail.by X-SpamTest-Group-ID: 00000000 X-SpamTest-Info: Profiles 8957 [Jul 06 2009] X-SpamTest-Info: {relay has no DNS name} X-SpamTest-Method: none X-SpamTest-Rate: 55 X-SpamTest-SPF: softfail X-SpamTest-Status: Not detected X-SpamTest-Status-Extended: not_detected X-SpamTest-Version: SMTP-Filter Version 3.0.0 [0284], KAS30/Release Date: Tue, 7 Jul 2009 14:51:28 +0300 From: Sergey Senozhatsky To: Catalin Marinas Cc: Pekka Enberg , Ingo Molnar , "Paul E. McKenney" , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: kmemleak not tainted Message-ID: <20090707115128.GA3238@localdomain.by> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="WIyZ46R2i8wDzkSu" Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3152 Lines: 79 --WIyZ46R2i8wDzkSu Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hello, Just noticed: kernel: [ 1917.133154] INFO: RCU detected CPU 0 stall (t=485140/3000 jiffies) kernel: [ 1917.133154] Pid: 511, comm: kmemleak Not tainted 2.6.31-rc2-nv-git1-00254-ga4e2f0a-dirty #2 kernel: [ 1917.133154] Call Trace: kernel: [ 1917.133154] [] ? printk+0x23/0x36 kernel: [ 1917.133154] [] __rcu_pending+0x140/0x210 kernel: [ 1917.133154] [] rcu_pending+0x2a/0x70 kernel: [ 1917.133154] [] update_process_times+0x3f/0x80 kernel: [ 1917.133154] [] tick_sched_timer+0x6f/0xf0 kernel: [ 1917.133154] [] __run_hrtimer+0x56/0xe0 kernel: [ 1917.133154] [] ? tick_sched_timer+0x0/0xf0 kernel: [ 1917.133154] [] ? tick_sched_timer+0x0/0xf0 kernel: [ 1917.133154] [] hrtimer_interrupt+0x145/0x270 kernel: [ 1917.133154] [] smp_apic_timer_interrupt+0x5c/0xb0 kernel: [ 1917.133154] [] ? trace_hardirqs_off_thunk+0xc/0x14 kernel: [ 1917.133154] [] apic_timer_interrupt+0x36/0x3c kernel: [ 1917.133154] [] ? _read_unlock_irqrestore+0x41/0x70 kernel: [ 1917.133154] [] find_and_get_object+0x75/0xe0 kernel: [ 1917.133154] [] ? find_and_get_object+0x0/0xe0 kernel: [ 1917.133154] [] scan_block+0x87/0x110 kernel: [ 1917.133154] [] kmemleak_scan+0x280/0x420 kernel: [ 1917.133154] [] ? kmemleak_scan+0x0/0x420 kernel: [ 1917.133154] [] ? kmemleak_scan_thread+0x0/0xc0 kernel: [ 1917.133154] [] kmemleak_scan_thread+0x50/0xc0 kernel: [ 1917.133154] [] kthread+0x84/0x90 kernel: [ 1917.133154] [] ? kthread+0x0/0x90 kernel: [ 1917.133154] [] kernel_thread_helper+0x7/0x1c static struct kmemleak_object *find_and_get_object(unsigned long ptr, int alias) { unsigned long flags; struct kmemleak_object *object = NULL; rcu_read_lock(); read_lock_irqsave(&kmemleak_lock, flags); if (ptr >= min_addr && ptr < max_addr) object = lookup_object(ptr, alias); >> read_unlock_irqrestore(&kmemleak_lock, flags); /* check whether the object is still available */ if (object && !get_object(object)) object = NULL; rcu_read_unlock(); return object; } I'm not sure where this is kmemleak's problem, since with 31 I see lots of 'not tainted' reports on my laptop. Sergey --WIyZ46R2i8wDzkSu Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iJwEAQECAAYFAkpTNsAACgkQfKHnntdSXjTZLgQA2R+5PQ+FCKIcAWzVal/1mruU FjzAPFqS8362WTh2le2XuPDuC5t8Ws68nBSZEtmfX0GW+Es7YAaRW/ZinLrBdQy+ 6H4UgndJljHYLtq0IN3cQajFgGQQoqkY/8Ni+wEp2SRdFjTMf3jy+FM9CSa9XUUg cyiOtWNKkUCEefrBo/Q= =jNY6 -----END PGP SIGNATURE----- --WIyZ46R2i8wDzkSu-- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/