Re: [PATCH] arm: mm: Poison freed init memory

2011-01-11 Thread Pavel Machek
Hi! > > Ok it seems that 0xcc was chosen by Pavel since it's a breakpoint > > instruction (sorry for not noticing that earlier [1]). > > It may be on x86, but on ARM: > >0: stclgt 12, cr12, [ip], {204} > > That's a co-processor #12 instruction which will only be executed

Re: [PATCH] arm: mm: Poison freed init memory

2011-01-11 Thread Russell King - ARM Linux
On Mon, Jan 10, 2011 at 09:00:17PM -0800, Stephen Boyd wrote: > Ok it seems that 0xcc was chosen by Pavel since it's a breakpoint > instruction (sorry for not noticing that earlier [1]). It may be on x86, but on ARM: 0: stclgt 12, cr12, [ip], {204} That's a co-processor #12

Re: [PATCH] arm: mm: Poison freed init memory

2011-01-10 Thread Stephen Boyd
On 01/06/2011 01:07 AM, Russell King - ARM Linux wrote: > On Wed, Jan 05, 2011 at 09:25:55PM -0800, Stephen Boyd wrote: >> On 01/05/2011 12:26 PM, Russell King - ARM Linux wrote: >>> On Wed, Jan 05, 2011 at 11:47:25AM -0800, Stephen Boyd wrote: Poisoning __init marked memory can be useful when

Re: [PATCH] arm: mm: Poison freed init memory

2011-01-06 Thread Russell King - ARM Linux
On Wed, Jan 05, 2011 at 09:25:55PM -0800, Stephen Boyd wrote: > On 01/05/2011 12:26 PM, Russell King - ARM Linux wrote: > > On Wed, Jan 05, 2011 at 11:47:25AM -0800, Stephen Boyd wrote: > >> Poisoning __init marked memory can be useful when tracking down > >> obscure memory corruption bugs. When a

Re: [PATCH] arm: mm: Poison freed init memory

2011-01-05 Thread Stephen Boyd
On 01/05/2011 12:26 PM, Russell King - ARM Linux wrote: > On Wed, Jan 05, 2011 at 11:47:25AM -0800, Stephen Boyd wrote: >> Poisoning __init marked memory can be useful when tracking down >> obscure memory corruption bugs. When a pointer is 0x in an > > That's a bad idea for a value. With a

Re: [PATCH] arm: mm: Poison freed init memory

2011-01-05 Thread Russell King - ARM Linux
On Wed, Jan 05, 2011 at 11:47:25AM -0800, Stephen Boyd wrote: > Poisoning __init marked memory can be useful when tracking down > obscure memory corruption bugs. When a pointer is 0x in an That's a bad idea for a value. With a 3GB page offset and 256MB or more memory, accesses to such an

[PATCH] arm: mm: Poison freed init memory

2011-01-05 Thread Stephen Boyd
Poisoning __init marked memory can be useful when tracking down obscure memory corruption bugs. When a pointer is 0x in an oops it's much more obvious that somebody is using __init marked memory after kernel initialization. This should help find incorrect __init markings earlier and mimics