[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110812094018.GA1639@e102109-lin.cambridge.arm.com>
Date: Fri, 12 Aug 2011 10:40:18 +0100
From: Catalin Marinas <catalin.marinas@....com>
To: Steven Rostedt <rostedt@...dmis.org>
Cc: LKML <linux-kernel@...r.kernel.org>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: [PATCH] kmemleak: Show where early_log issues come from
Hi Steven,
On Tue, Jul 26, 2011 at 06:33:56PM +0100, Steven Rostedt wrote:
> The backtrace is from where the problem was detected, not where the
> problem occurred. I also noticed that the logs that are stored include a
> stack_trace dump. But this trace is only added when ALLOC is done.
>
> The above issues ended up being from the cgroup code calling
> kmemleak_not_leak(), which does not store the trace. But that didn't
> matter, because even if it did, the trace is not printed out here
> leaving the above output still unhelpful in finding where the problem
> occurred.
>
> By having all early kmemleak logs record the stack_trace, and by having
> the above error message / detection bubble up the call stack that an
> error occurred. We can have kmemleak_init() write exactly where the
> problem occurred.
...
> @@ -1708,10 +1730,12 @@ void __init kmemleak_init(void)
> kmemleak_free_part(log->ptr, log->size);
> break;
> case KMEMLEAK_NOT_LEAK:
> - kmemleak_not_leak(log->ptr);
> + if (__kmemleak_not_leak(log->ptr) < 0)
> + print_log_stack(log);
> break;
> case KMEMLEAK_IGNORE:
> - kmemleak_ignore(log->ptr);
> + if (__kmemleak_ignore(log->ptr) < 0)
> + print_log_stack(log);
> break;
> case KMEMLEAK_SCAN_AREA:
> kmemleak_scan_area(log->ptr, log->size, GFP_KERNEL);
Thanks for the patch, it makes sense. I was wondering whether we should
extend the above to the other early kmemleak API calls (apart from
KMEMLEAK_ALLOC). Also, to avoid some code duplication, maybe something
like below:
diff --git a/mm/kmemleak.c b/mm/kmemleak.c
index d6880f5..afec4cb 100644
--- a/mm/kmemleak.c
+++ b/mm/kmemleak.c
@@ -1696,32 +1696,37 @@ void __init kmemleak_init(void)
*/
for (i = 0; i < crt_early_log; i++) {
struct early_log *log = &early_log[i];
+ int ret = 0;
switch (log->op_type) {
case KMEMLEAK_ALLOC:
early_alloc(log);
break;
case KMEMLEAK_FREE:
- kmemleak_free(log->ptr);
+ ret = __kmemleak_free(log->ptr);
break;
case KMEMLEAK_FREE_PART:
- kmemleak_free_part(log->ptr, log->size);
+ ret = __kmemleak_free_part(log->ptr, log->size);
break;
case KMEMLEAK_NOT_LEAK:
- kmemleak_not_leak(log->ptr);
+ ret = __kmemleak_not_leak(log->ptr);
break;
case KMEMLEAK_IGNORE:
- kmemleak_ignore(log->ptr);
+ ret = __kmemleak_ignore(log->ptr);
break;
case KMEMLEAK_SCAN_AREA:
- kmemleak_scan_area(log->ptr, log->size, GFP_KERNEL);
+ ret = __kmemleak_scan_area(log->ptr, log->size,
+ GFP_KERNEL);
break;
case KMEMLEAK_NO_SCAN:
- kmemleak_no_scan(log->ptr);
+ ret = __kmemleak_no_scan(log->ptr);
break;
default:
WARN_ON(1);
}
+
+ if (ret < 0)
+ print_log_stack(log);
}
}
Thanks.
--
Catalin
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists