lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <1247763217.27689.36.camel@pc1117.cambridge.arm.com>
Date:	Thu, 16 Jul 2009 17:53:37 +0100
From:	Catalin Marinas <catalin.marinas@....com>
To:	Jaswinder Singh Rajput <jaswinder@...nel.org>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>
Subject: Re: kmemleak: Early log buffer exceeded

On Wed, 2009-07-15 at 22:47 +0530, Jaswinder Singh Rajput wrote:
> Currently this reporting seems not very impressive and not giving much
> useful information :
> 
> kmemleak: Early log buffer exceeded
> kmemleak: Kernel memory leak detector disabled
> 
> It should be something like this because it is an error and this will
> disable Kernel memory leak detector :
> 
> [    0.000173] ------------[ cut here ]------------
> [    0.000186] WARNING: at mm/kmemleak.c:726 log_early+0x39/0xa9()
> [    0.000189] Hardware name:         
> [    0.000192] Early log buffer exceeded, please increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE
> [    0.000195] Modules linked in:
> [    0.000202] Pid: 0, comm: swapper Not tainted 2.6.31-rc3 #51
> [    0.000206] Call Trace:
> [    0.000216]  [<c102cf74>] warn_slowpath_common+0x60/0x90
> [    0.000222]  [<c102cfd8>] warn_slowpath_fmt+0x24/0x27
> [    0.000227]  [<c109614b>] log_early+0x39/0xa9
> [    0.000232]  [<c109682d>] kmemleak_alloc+0x41/0x4c
> [    0.000241]  [<c1093b63>] __kmalloc+0xcb/0x153
> [    0.000247]  [<c1093c04>] alloc_arraycache+0x19/0x50
> [    0.000253]  [<c1093e44>] do_tune_cpucache+0x209/0x35d
> [    0.000259]  [<c10940ee>] enable_cpucache+0x58/0x9a
> [    0.000267]  [<c14bc6e5>] kmem_cache_init_late+0x21/0xc2
> [    0.000274]  [<c14a8a20>] start_kernel+0x1e5/0x2ba
> [    0.000280]  [<c14a8340>] i386_start_kernel+0x6a/0x6f
> [    0.000380] ---[ end trace 4eaa2a86a8e2da22 ]---
> [    0.000384] kmemleak: Kernel memory leak detector disabled

I'm OK with mentioning DEBUG_KMEMLEAK_EARLY_LOG_SIZE but the stack trace
is not relevant here, it can happen in any place which allocates some
memory.

> Currently default value of DEBUG_KMEMLEAK_EARLY_LOG_SIZE is 400 which
> can be easily exceed-able if debugging is on.

That's why I made it configurable. We can indeed set it to a higher
value but that's after 2.6.31. I have a patch in to mark this buffer as
__initdata so that it is freed.

> These issues can be fixed like this :
> 
> diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug
> index 12327b2..2eaf8bc 100644
> --- a/lib/Kconfig.debug
> +++ b/lib/Kconfig.debug
> @@ -362,14 +362,15 @@ config DEBUG_KMEMLEAK
>  config DEBUG_KMEMLEAK_EARLY_LOG_SIZE
>  	int "Maximum kmemleak early log entries"
>  	depends on DEBUG_KMEMLEAK
> -	range 200 2000
> -	default 400
> +	range 256 2048
> +	default 512

The power of 2 boundaries is not relevant as this represents the number
of elements in an array rather than a size in bytes.

>  	help
>  	  Kmemleak must track all the memory allocations to avoid
>  	  reporting false positives. Since memory may be allocated or
>  	  freed before kmemleak is initialised, an early log buffer is
> -	  used to store these actions. If kmemleak reports "early log
> -	  buffer exceeded", please increase this value.
> +	  used to store these actions. You need to increase this value,
> +	  if kmemleak reports "Early log buffer exceeded, please increase
> +	  DEBUG_KMEMLEAK_EARLY_LOG_SIZE".
>  
>  config DEBUG_KMEMLEAK_TEST
>  	tristate "Simple test for the kernel memory leak detector"
> diff --git a/mm/kmemleak.c b/mm/kmemleak.c
> index 5aabd41..084e927 100644
> --- a/mm/kmemleak.c
> +++ b/mm/kmemleak.c
> @@ -722,7 +722,8 @@ static void log_early(int op_type, const void *ptr, size_t size,
>  	struct early_log *log;
>  
>  	if (crt_early_log >= ARRAY_SIZE(early_log)) {
> -		pr_warning("Early log buffer exceeded\n");
> +		WARN_ONCE(1, KERN_ERR "Early log buffer exceeded, "
> +			  "please increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE\n");
>  		kmemleak_disable();
>  		return;
>  	}

As I said above, I wouldn't want a stack trace here. Initially, this
code called kmemleak_panic() but changed it since the stack trace isn't
relevant.

Thanks.

-- 
Catalin

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ