* Kmemcheck issue
[not found] ` <x2n448a67a1004190620z6b23d12vc4ba54f2d460d125@mail.gmail.com>
@ 2010-04-19 13:23 ` naveen yadav
2010-04-20 8:01 ` Vegard Nossum
0 siblings, 1 reply; 4+ messages in thread
From: naveen yadav @ 2010-04-19 13:23 UTC (permalink / raw
To: linux-arm-kernel-request, linux newbie, linux-kernel
Hi,
I am trying to run Kmemcheck on a Cortex ( ARM-v7)
board running Linux 2.6.30.9
At boot-up time, as soon as Timer-device is enabled, I find
that timer gets disabled because system
gets spurious interrupts on that irq line.
PID hash table entries: 1024 (order: 10, 4096 bytes)
Linux System timer initialize
irq 23: nobody cared (try booting with the "irqpoll" option)
[<c002e148>] (unwind_backtrace+0x0/0xe8) from [<c002c4b8>]
(dump_stack+0x18/0x1c)
[<c002c4b8>] (dump_stack+0x18/0x1c) from [<c006ad74>]
(__report_bad_irq+0x80/0xb0)
[<c006ad74>] (__report_bad_irq+0x80/0xb0) from [<c006af28>]
(note_interrupt+0x184/0x1f0)
[<c006af28>] (note_interrupt+0x184/0x1f0) from [<c006ba38>]
(handle_edge_irq+0xe8/0x160)
[<c006ba38>] (handle_edge_irq+0xe8/0x160) from [<c0027060>]
(asm_do_IRQ+0x60/0x74)
[<c0027060>] (asm_do_IRQ+0x60/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
Exception stack(0xc0373ec0 to 0xc0373f08)
3ec0: 00000017 c0372000 00000002 00000000 00000002 c038e8f4 00000000 0aa00000
3ee0: c0372000 c03bfc40 0000001f c0373f44 00000100 c0373f08 c0047ffc c0047c98
3f00: 20000153 ffffffff
[<c0027a30>] (__irq_svc+0x30/0x80) from [<c0047ffc>] (irq_exit+0x44/0x4c)
[<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0047ffc>] (irq_exit+0x44/0x4c)
[<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0027064>] (asm_do_IRQ+0x64/0x74)
[<c0027064>] (asm_do_IRQ+0x64/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
Exception stack(0xc0373f78 to 0xc0373fc0)
3f60: 00000000 c037c15c
3f80: 00000001 600001d3 955fffff c00242ec c0399f80 0aa00000 c0023000 412fc082
3fa0: 0000001f c0373ff4 c0373fc0 c0373fc0 c0008974 c0019798 20000153 ffffffff
[<c0027a30>] (__irq_svc+0x30/0x80) from [<c0008974>] (start_kernel+0x168/0x3e4)
[<c0008974>] (start_kernel+0x168/0x3e4) from [<60008034>] (0x60008034)
handlers:
[<c003a604>] (sdp_timer_interrupt+0x0/0x38)
Disabling IRQ #23
Console: colour dummy device 80x30
console [ttyS1] enabled
Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
Later, when calibrating delay loop, the system is hung as timer
is not working.
The problem happens even if I set kmemcheck_enabled = 0 at boot.
( I also commented out pagetable_init(&meminfo) ).
If you have seen this before, please let me know.
( I know that your patch was written for ARM v6. My cpu is
Cortex . I am aware that I may have to make some change in the
instruction simulation handling. )
Thanks
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Kmemcheck issue
2010-04-19 13:23 ` Kmemcheck issue naveen yadav
@ 2010-04-20 8:01 ` Vegard Nossum
2010-04-20 10:16 ` naveen yadav
0 siblings, 1 reply; 4+ messages in thread
From: Vegard Nossum @ 2010-04-20 8:01 UTC (permalink / raw
To: naveen yadav
Cc: linux-arm-kernel-request, linux newbie, linux-kernel,
Catalin Marinas
On 19 April 2010 15:23, naveen yadav <yad.naveen@gmail.com> wrote:
> Hi,
>
> á á á I áam átrying to á run áKmemcheck on á a áCortex ( ARM-v7)
> board árunning áLinux 2.6.30.9
>
> At boot-up time, áas ásoon áas áTimer-device is áenabled, á I áfind
> that á timer ágets ádisabled ábecause ásystem
> gets spurious áinterrupts áon áthat áirq áline.
>
>
> PID hash table entries: 1024 (order: 10, 4096 bytes)
> Linux System timer initialize
> irq 23: nobody cared (try booting with the "irqpoll" option)
> [<c002e148>] (unwind_backtrace+0x0/0xe8) from [<c002c4b8>]
> (dump_stack+0x18/0x1c)
> [<c002c4b8>] (dump_stack+0x18/0x1c) from [<c006ad74>]
> (__report_bad_irq+0x80/0xb0)
> [<c006ad74>] (__report_bad_irq+0x80/0xb0) from [<c006af28>]
> (note_interrupt+0x184/0x1f0)
> [<c006af28>] (note_interrupt+0x184/0x1f0) from [<c006ba38>]
> (handle_edge_irq+0xe8/0x160)
> [<c006ba38>] (handle_edge_irq+0xe8/0x160) from [<c0027060>]
> (asm_do_IRQ+0x60/0x74)
> [<c0027060>] (asm_do_IRQ+0x60/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
> Exception stack(0xc0373ec0 to 0xc0373f08)
> 3ec0: 00000017 c0372000 00000002 00000000 00000002 c038e8f4 00000000 0aa00000
> 3ee0: c0372000 c03bfc40 0000001f c0373f44 00000100 c0373f08 c0047ffc c0047c98
> 3f00: 20000153 ffffffff
> [<c0027a30>] (__irq_svc+0x30/0x80) from [<c0047ffc>] (irq_exit+0x44/0x4c)
> [<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0047ffc>] (irq_exit+0x44/0x4c)
> [<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0027064>] (asm_do_IRQ+0x64/0x74)
> [<c0027064>] (asm_do_IRQ+0x64/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
> Exception stack(0xc0373f78 to 0xc0373fc0)
> 3f60: á á á á á á á á á á á á á á á á á á á á á á á á á á á 00000000 c037c15c
> 3f80: 00000001 600001d3 955fffff c00242ec c0399f80 0aa00000 c0023000 412fc082
> 3fa0: 0000001f c0373ff4 c0373fc0 c0373fc0 c0008974 c0019798 20000153 ffffffff
> [<c0027a30>] (__irq_svc+0x30/0x80) from [<c0008974>] (start_kernel+0x168/0x3e4)
> [<c0008974>] (start_kernel+0x168/0x3e4) from [<60008034>] (0x60008034)
> handlers:
> [<c003a604>] (sdp_timer_interrupt+0x0/0x38)
> Disabling IRQ #23
> Console: colour dummy device 80x30
> console [ttyS1] enabled
> Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
> Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
>
>
> Later, áwhen ácalibrating delay áloop, áthe system is hung áas timer
> is not working.
>
> The problem happens áeven if áI áset kmemcheck_enabled = 0 at áboot.
> ( I also commented out á á pagetable_init(&meminfo) á).
>
> áIf áyou have seen this before, áplease let me know.
>
> ( I know that áyour patch was written for á ARM v6. á á My cpu is
> Cortex . á áI am aware that áI may have to make some change in the
> áinstruction simulation handling. )
>
> Thanks
Hi,
First up, I see a lot of funny á characters in your text.
I think that this is not about kmemcheck, but kmemleak. kmemcheck is
for catching references to uninitialized memory while kmemleak is for
detecting memory leaks. kmemcheck only works on x86 so far (with an
ARM patch by Ye Janboe, but it is not in mainline). kmemleak, however,
was written on ARM.
I put Catalin Marinas (kmemleak author) on Cc.
Please correct me if I am wrong. Good luck.
Vegard
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Kmemcheck issue
2010-04-20 8:01 ` Vegard Nossum
@ 2010-04-20 10:16 ` naveen yadav
2010-04-21 20:08 ` ye janboe
0 siblings, 1 reply; 4+ messages in thread
From: naveen yadav @ 2010-04-20 10:16 UTC (permalink / raw
To: Vegard Nossum
Cc: linux-arm-kernel-request, linux newbie, linux-kernel,
Catalin Marinas
Hi Vegard,
Thanks for your answer, but this is coming from kmemchek only
thanks
naveen
On Tue, Apr 20, 2010 at 1:31 PM, Vegard Nossum <vegard.nossum@gmail.com> wrote:
> On 19 April 2010 15:23, naveen yadav <yad.naveen@gmail.com> wrote:
>> Hi,
>>
>> á á á I áam átrying to á run áKmemcheck on á a áCortex ( ARM-v7)
>> board árunning áLinux 2.6.30.9
>>
>> At boot-up time, áas ásoon áas áTimer-device is áenabled, á I áfind
>> that á timer ágets ádisabled ábecause ásystem
>> gets spurious áinterrupts áon áthat áirq áline.
>>
>>
>> PID hash table entries: 1024 (order: 10, 4096 bytes)
>> Linux System timer initialize
>> irq 23: nobody cared (try booting with the "irqpoll" option)
>> [<c002e148>] (unwind_backtrace+0x0/0xe8) from [<c002c4b8>]
>> (dump_stack+0x18/0x1c)
>> [<c002c4b8>] (dump_stack+0x18/0x1c) from [<c006ad74>]
>> (__report_bad_irq+0x80/0xb0)
>> [<c006ad74>] (__report_bad_irq+0x80/0xb0) from [<c006af28>]
>> (note_interrupt+0x184/0x1f0)
>> [<c006af28>] (note_interrupt+0x184/0x1f0) from [<c006ba38>]
>> (handle_edge_irq+0xe8/0x160)
>> [<c006ba38>] (handle_edge_irq+0xe8/0x160) from [<c0027060>]
>> (asm_do_IRQ+0x60/0x74)
>> [<c0027060>] (asm_do_IRQ+0x60/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
>> Exception stack(0xc0373ec0 to 0xc0373f08)
>> 3ec0: 00000017 c0372000 00000002 00000000 00000002 c038e8f4 00000000 0aa00000
>> 3ee0: c0372000 c03bfc40 0000001f c0373f44 00000100 c0373f08 c0047ffc c0047c98
>> 3f00: 20000153 ffffffff
>> [<c0027a30>] (__irq_svc+0x30/0x80) from [<c0047ffc>] (irq_exit+0x44/0x4c)
>> [<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0047ffc>] (irq_exit+0x44/0x4c)
>> [<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0027064>] (asm_do_IRQ+0x64/0x74)
>> [<c0027064>] (asm_do_IRQ+0x64/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
>> Exception stack(0xc0373f78 to 0xc0373fc0)
>> 3f60: á á á á á á á á á á á á á á á á á á á á á á á á á á á 00000000 c037c15c
>> 3f80: 00000001 600001d3 955fffff c00242ec c0399f80 0aa00000 c0023000 412fc082
>> 3fa0: 0000001f c0373ff4 c0373fc0 c0373fc0 c0008974 c0019798 20000153 ffffffff
>> [<c0027a30>] (__irq_svc+0x30/0x80) from [<c0008974>] (start_kernel+0x168/0x3e4)
>> [<c0008974>] (start_kernel+0x168/0x3e4) from [<60008034>] (0x60008034)
>> handlers:
>> [<c003a604>] (sdp_timer_interrupt+0x0/0x38)
>> Disabling IRQ #23
>> Console: colour dummy device 80x30
>> console [ttyS1] enabled
>> Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
>> Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
>>
>>
>> Later, áwhen ácalibrating delay áloop, áthe system is hung áas timer
>> is not working.
>>
>> The problem happens áeven if áI áset kmemcheck_enabled = 0 at áboot.
>> ( I also commented out á á pagetable_init(&meminfo) á).
>>
>> áIf áyou have seen this before, áplease let me know.
>>
>> ( I know that áyour patch was written for á ARM v6. á á My cpu is
>> Cortex . á áI am aware that áI may have to make some change in the
>> áinstruction simulation handling. )
>>
>> Thanks
>
> Hi,
>
> First up, I see a lot of funny á characters in your text.
>
> I think that this is not about kmemcheck, but kmemleak. kmemcheck is
> for catching references to uninitialized memory while kmemleak is for
> detecting memory leaks. kmemcheck only works on x86 so far (with an
> ARM patch by Ye Janboe, but it is not in mainline). kmemleak, however,
> was written on ARM.
>
> I put Catalin Marinas (kmemleak author) on Cc.
>
> Please correct me if I am wrong. Good luck.
>
>
> Vegard
>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Kmemcheck issue
2010-04-20 10:16 ` naveen yadav
@ 2010-04-21 20:08 ` ye janboe
0 siblings, 0 replies; 4+ messages in thread
From: ye janboe @ 2010-04-21 20:08 UTC (permalink / raw
To: naveen yadav
Cc: Vegard Nossum, linux-arm-kernel-request, linux newbie,
linux-kernel, Catalin Marinas
hi, Naveen
Since kmemcheck is slow on arm which lack hw singlestep, I do not plan
to maintain this patch.
If you want to check slab error, please try kmudflap I posted in the mail list.
Janboe
2010/4/20 naveen yadav <yad.naveen@gmail.com>:
> Hi Vegard,
>
> Thanks for your answer, but this is coming from kmemchek only
>
> thanks
> naveen
> On Tue, Apr 20, 2010 at 1:31 PM, Vegard Nossum <vegard.nossum@gmail.com> wrote:
>> On 19 April 2010 15:23, naveen yadav <yad.naveen@gmail.com> wrote:
>>> Hi,
>>>
>>> á á á I áam átrying to á run áKmemcheck on á a áCortex ( ARM-v7)
>>> board árunning áLinux 2.6.30.9
>>>
>>> At boot-up time, áas ásoon áas áTimer-device is áenabled, á I áfind
>>> that á timer ágets ádisabled ábecause ásystem
>>> gets spurious áinterrupts áon áthat áirq áline.
>>>
>>>
>>> PID hash table entries: 1024 (order: 10, 4096 bytes)
>>> Linux System timer initialize
>>> irq 23: nobody cared (try booting with the "irqpoll" option)
>>> [<c002e148>] (unwind_backtrace+0x0/0xe8) from [<c002c4b8>]
>>> (dump_stack+0x18/0x1c)
>>> [<c002c4b8>] (dump_stack+0x18/0x1c) from [<c006ad74>]
>>> (__report_bad_irq+0x80/0xb0)
>>> [<c006ad74>] (__report_bad_irq+0x80/0xb0) from [<c006af28>]
>>> (note_interrupt+0x184/0x1f0)
>>> [<c006af28>] (note_interrupt+0x184/0x1f0) from [<c006ba38>]
>>> (handle_edge_irq+0xe8/0x160)
>>> [<c006ba38>] (handle_edge_irq+0xe8/0x160) from [<c0027060>]
>>> (asm_do_IRQ+0x60/0x74)
>>> [<c0027060>] (asm_do_IRQ+0x60/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
>>> Exception stack(0xc0373ec0 to 0xc0373f08)
>>> 3ec0: 00000017 c0372000 00000002 00000000 00000002 c038e8f4 00000000 0aa00000
>>> 3ee0: c0372000 c03bfc40 0000001f c0373f44 00000100 c0373f08 c0047ffc c0047c98
>>> 3f00: 20000153 ffffffff
>>> [<c0027a30>] (__irq_svc+0x30/0x80) from [<c0047ffc>] (irq_exit+0x44/0x4c)
>>> [<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0047ffc>] (irq_exit+0x44/0x4c)
>>> [<c0047ffc>] (irq_exit+0x44/0x4c) from [<c0027064>] (asm_do_IRQ+0x64/0x74)
>>> [<c0027064>] (asm_do_IRQ+0x64/0x74) from [<c0027a30>] (__irq_svc+0x30/0x80)
>>> Exception stack(0xc0373f78 to 0xc0373fc0)
>>> 3f60: á á á á á á á á á á á á á á á á á á á á á á á á á á á 00000000 c037c15c
>>> 3f80: 00000001 600001d3 955fffff c00242ec c0399f80 0aa00000 c0023000 412fc082
>>> 3fa0: 0000001f c0373ff4 c0373fc0 c0373fc0 c0008974 c0019798 20000153 ffffffff
>>> [<c0027a30>] (__irq_svc+0x30/0x80) from [<c0008974>] (start_kernel+0x168/0x3e4)
>>> [<c0008974>] (start_kernel+0x168/0x3e4) from [<60008034>] (0x60008034)
>>> handlers:
>>> [<c003a604>] (sdp_timer_interrupt+0x0/0x38)
>>> Disabling IRQ #23
>>> Console: colour dummy device 80x30
>>> console [ttyS1] enabled
>>> Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
>>> Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
>>>
>>>
>>> Later, áwhen ácalibrating delay áloop, áthe system is hung áas timer
>>> is not working.
>>>
>>> The problem happens áeven if áI áset kmemcheck_enabled = 0 at áboot.
>>> ( I also commented out á á pagetable_init(&meminfo) á).
>>>
>>> áIf áyou have seen this before, áplease let me know.
>>>
>>> ( I know that áyour patch was written for á ARM v6. á á My cpu is
>>> Cortex . á áI am aware that áI may have to make some change in the
>>> áinstruction simulation handling. )
>>>
>>> Thanks
>>
>> Hi,
>>
>> First up, I see a lot of funny á characters in your text.
>>
>> I think that this is not about kmemcheck, but kmemleak. kmemcheck is
>> for catching references to uninitialized memory while kmemleak is for
>> detecting memory leaks. kmemcheck only works on x86 so far (with an
>> ARM patch by Ye Janboe, but it is not in mainline). kmemleak, however,
>> was written on ARM.
>>
>> I put Catalin Marinas (kmemleak author) on Cc.
>>
>> Please correct me if I am wrong. Good luck.
>>
>>
>> Vegard
>>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at http://www.tux.org/lkml/
>
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2010-04-21 20:08 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <j2n448a67a1004190442h2d01f517ld1cd0449c7a0513@mail.gmail.com>
[not found] ` <x2n448a67a1004190620z6b23d12vc4ba54f2d460d125@mail.gmail.com>
2010-04-19 13:23 ` Kmemcheck issue naveen yadav
2010-04-20 8:01 ` Vegard Nossum
2010-04-20 10:16 ` naveen yadav
2010-04-21 20:08 ` ye janboe
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).