Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754364Ab0DTKRC (ORCPT ); Tue, 20 Apr 2010 06:17:02 -0400 Received: from mail-qy0-f179.google.com ([209.85.221.179]:42422 "EHLO mail-qy0-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754253Ab0DTKQ5 convert rfc822-to-8bit (ORCPT ); Tue, 20 Apr 2010 06:16:57 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=cPN+J0aTSn7o0kvQz0c+JQdRVcWUHOx26DSPPWpjlrflpykOjcbI9m8abcZ5kp6yxI 8rS3+TJgGhpM/2nmBLv8x64+ywWMZu+ihVpF9e8nRQ1mwkwsGqQSKUZUb6vUat0+3Y5K VznqK8rzyEL+8kSmKjveJUOtDXX174fe6gX4M= MIME-Version: 1.0 In-Reply-To: References: Date: Tue, 20 Apr 2010 15:46:56 +0530 Message-ID: Subject: Re: Kmemcheck issue From: naveen yadav To: Vegard Nossum Cc: linux-arm-kernel-request@lists.arm.linux.org.uk, linux newbie , linux-kernel@vger.kernel.org, Catalin Marinas Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3708 Lines: 91 Hi Vegard, Thanks for your answer, but this is coming from kmemchek only thanks naveen On Tue, Apr 20, 2010 at 1:31 PM, Vegard Nossum wrote: > On 19 April 2010 15:23, naveen yadav wrote: >> Hi, >> >> ? ? ? I ?am ?trying to ? run ?Kmemcheck on ? a ?Cortex ( ARM-v7) >> board ?running ?Linux 2.6.30.9 >> >> At boot-up time, ?as ?soon ?as ?Timer-device is ?enabled, ? I ?find >> that ? timer ?gets ?disabled ?because ?system >> gets spurious ?interrupts ?on ?that ?irq ?line. >> >> >> PID hash table entries: 1024 (order: 10, 4096 bytes) >> Linux System timer initialize >> irq 23: nobody cared (try booting with the "irqpoll" option) >> [] (unwind_backtrace+0x0/0xe8) from [] >> (dump_stack+0x18/0x1c) >> [] (dump_stack+0x18/0x1c) from [] >> (__report_bad_irq+0x80/0xb0) >> [] (__report_bad_irq+0x80/0xb0) from [] >> (note_interrupt+0x184/0x1f0) >> [] (note_interrupt+0x184/0x1f0) from [] >> (handle_edge_irq+0xe8/0x160) >> [] (handle_edge_irq+0xe8/0x160) from [] >> (asm_do_IRQ+0x60/0x74) >> [] (asm_do_IRQ+0x60/0x74) from [] (__irq_svc+0x30/0x80) >> Exception stack(0xc0373ec0 to 0xc0373f08) >> 3ec0: 00000017 c0372000 00000002 00000000 00000002 c038e8f4 00000000 0aa00000 >> 3ee0: c0372000 c03bfc40 0000001f c0373f44 00000100 c0373f08 c0047ffc c0047c98 >> 3f00: 20000153 ffffffff >> [] (__irq_svc+0x30/0x80) from [] (irq_exit+0x44/0x4c) >> [] (irq_exit+0x44/0x4c) from [] (irq_exit+0x44/0x4c) >> [] (irq_exit+0x44/0x4c) from [] (asm_do_IRQ+0x64/0x74) >> [] (asm_do_IRQ+0x64/0x74) from [] (__irq_svc+0x30/0x80) >> Exception stack(0xc0373f78 to 0xc0373fc0) >> 3f60: ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 00000000 c037c15c >> 3f80: 00000001 600001d3 955fffff c00242ec c0399f80 0aa00000 c0023000 412fc082 >> 3fa0: 0000001f c0373ff4 c0373fc0 c0373fc0 c0008974 c0019798 20000153 ffffffff >> [] (__irq_svc+0x30/0x80) from [] (start_kernel+0x168/0x3e4) >> [] (start_kernel+0x168/0x3e4) from [<60008034>] (0x60008034) >> handlers: >> [] (sdp_timer_interrupt+0x0/0x38) >> Disabling IRQ #23 >> Console: colour dummy device 80x30 >> console [ttyS1] enabled >> Dentry cache hash table entries: 32768 (order: 5, 131072 bytes) >> Inode-cache hash table entries: 16384 (order: 4, 65536 bytes) >> >> >> Later, ?when ?calibrating delay ?loop, ?the system is hung ?as timer >> is not working. >> >> The problem happens ?even if ?I ?set kmemcheck_enabled = 0 at ?boot. >> ( I also commented out ? ? pagetable_init(&meminfo) ?). >> >> ?If ?you have seen this before, ?please let me know. >> >> ( I know that ?your patch was written for ? ARM v6. ? ? My cpu is >> Cortex . ? ?I am aware that ?I may have to make some change in the >> ?instruction simulation handling. ) >> >> Thanks > > Hi, > > First up, I see a lot of funny ? characters in your text. > > I think that this is not about kmemcheck, but kmemleak. kmemcheck is > for catching references to uninitialized memory while kmemleak is for > detecting memory leaks. kmemcheck only works on x86 so far (with an > ARM patch by Ye Janboe, but it is not in mainline). kmemleak, however, > was written on ARM. > > I put Catalin Marinas (kmemleak author) on Cc. > > Please correct me if I am wrong. Good luck. > > > Vegard > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/