From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933241Ab0GOPzM (ORCPT ); Thu, 15 Jul 2010 11:55:12 -0400 Received: from courier.cs.helsinki.fi ([128.214.9.1]:57524 "EHLO mail.cs.helsinki.fi" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932412Ab0GOPzI (ORCPT ); Thu, 15 Jul 2010 11:55:08 -0400 Message-ID: <4C3F2F52.2050101@cs.helsinki.fi> Date: Thu, 15 Jul 2010 18:54:58 +0300 From: Pekka Enberg User-Agent: Thunderbird 2.0.0.24 (Macintosh/20100228) MIME-Version: 1.0 To: Zeno Davatz CC: Catalin Marinas , linux-kernel@vger.kernel.org, Andrew Morton , x86@kernel.org, mingo@elte.hu, yinghai@kernel.org, damien.wyart@free.fr Subject: Re: kmemleak, cpu usage jump out of nowhere References: <1279100846.8592.53.camel@e102109-lin.cambridge.arm.com> <4C3D89AC.4040303@cs.helsinki.fi> <1279205891.6664.46.camel@e102109-lin.cambridge.arm.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Zeno Davatz wrote: > Dear Catalin > > On Thu, Jul 15, 2010 at 4:58 PM, Catalin Marinas > wrote: >> On Wed, 2010-07-14 at 10:55 +0100, Pekka Enberg wrote: >>> Catalin Marinas wrote: >>>> On Wed, 2010-07-14 at 09:27 +0100, Zeno Davatz wrote: >>>>> On Wed, Jul 14, 2010 at 10:05 AM, Pekka Enberg wrote: >>>>>> On Wed, Jul 14, 2010 at 9:12 AM, Zeno Davatz wrote: >>>>>>> I am attaching you the file from /sys/kernel/debug/kmemleak >>>>>> Zeno, can you post your dmesg and .config, please? >>>>> Sure, see attached files. >>>> It looks like NO_BOOTMEM is enabled. You can try the attached patch (I >>>> need to post it again on the list). >>>> >>>> >>>> kmemleak: Add support for NO_BOOTMEM configurations >>>> >>>> From: Catalin Marinas >>>> >>>> With commits 08677214 and 59be5a8e, alloc_bootmem()/free_bootmem() and >>>> friends use the early_res functions for memory management when >>>> NO_BOOTMEM is enabled. This patch adds the kmemleak calls in the >>>> corresponding code paths for bootmem allocations. >>>> >>>> Signed-off-by: Catalin Marinas >>>> Cc: Yinghai Lu >>>> Cc: H. Peter Anvin >>> Makes sense. >>> >>> Acked-by: Pekka Enberg >> I'll post an updated patch since I missed a callback. I've been testing >> it since yesterday and seems ok. > > I also did not have anymore hangs and random bad moods of my CPUs that > all of a sudden grab 100% of all 8 cores of my CPU power across my > machine since I disabled > > CONFIG_NO_BOOTMEM: Interesting. Damien, does disabling CONFIG_NO_BOOTMEM fix you problem too?