[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170331080046.GI27098@dhcp22.suse.cz>
Date: Fri, 31 Mar 2017 10:00:46 +0200
From: Michal Hocko <mhocko@...nel.org>
To: Joel Fernandes <joelaf@...gle.com>
Cc: Vaneet Narang <v.narang@...sung.com>,
Miroslav Benes <mbenes@...e.cz>,
Maninder Singh <maninder1.s@...sung.com>,
"jeyu@...hat.com" <jeyu@...hat.com>,
"rusty@...tcorp.com.au" <rusty@...tcorp.com.au>,
"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
"chris@...is-wilson.co.uk" <chris@...is-wilson.co.uk>,
"aryabinin@...tuozzo.com" <aryabinin@...tuozzo.com>,
"joonas.lahtinen@...ux.intel.com" <joonas.lahtinen@...ux.intel.com>,
"keescook@...omium.org" <keescook@...omium.org>,
"pavel@....cz" <pavel@....cz>,
"jinb.park7@...il.com" <jinb.park7@...il.com>,
"anisse@...ier.eu" <anisse@...ier.eu>,
"rafael.j.wysocki@...el.com" <rafael.j.wysocki@...el.com>,
"zijun_hu@....com" <zijun_hu@....com>,
"mingo@...nel.org" <mingo@...nel.org>,
"mawilcox@...rosoft.com" <mawilcox@...rosoft.com>,
"thgarnie@...gle.com" <thgarnie@...gle.com>,
"kirill.shutemov@...ux.intel.com" <kirill.shutemov@...ux.intel.com>,
"linux-mm@...ck.org" <linux-mm@...ck.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
PANKAJ MISHRA <pankaj.m@...sung.com>,
Ajeet Kumar Yadav <ajeet.y@...sung.com>,
이학봉 <hakbong5.lee@...sung.com>,
AMIT SAHRAWAT <a.sahrawat@...sung.com>,
랄릿 <lalit.mohan@...sung.com>,
CPGS <cpgs@...sung.com>
Subject: Re: [PATCH v2] module: check if memory leak by module.
On Thu 30-03-17 23:49:52, Joel Fernandes wrote:
> Hi Michal,
>
> On Wed, Mar 29, 2017 at 3:43 AM, Michal Hocko <mhocko@...nel.org> wrote:
> > On Wed 29-03-17 09:23:32, Vaneet Narang wrote:
> >> Hi,
> >>
> >> >> Hmm, how can you track _all_ vmalloc allocations done on behalf of the
> >> >> module? It is quite some time since I've checked kernel/module.c but
> >> >> from my vague understading your check is basically only about statically
> >> >> vmalloced areas by module loader. Is that correct? If yes then is this
> >> >> actually useful? Were there any bugs in the loader code recently? What
> >> >> led you to prepare this patch? All this should be part of the changelog!
> >>
> >> First of all there is no issue in kernel/module.c. This patch add functionality
> >> to detect scenario where some kernel module does some memory allocation but gets
> >> unloaded without doing vfree. For example
> >> static int kernel_init(void)
> >> {
> >> char * ptr = vmalloc(400 * 1024);
> >> return 0;
> >> }
> >
> > How can you track that allocation back to the module? Does this patch
> > actually works at all? Also why would be vmalloc more important than
> > kmalloc allocations?
>
> Doesn't the patch use caller's (in this case, the module is the
> caller) text address for tracking this? vma->vm->caller should track
> the caller doing the allocation?
Not really. First of all it will be vmalloc() to be tracked in the above
the example because vmalloc is not inlined. And secondly even if the
caller of the vmalloc was tracked then it would be hopelessly
insufficient because you would get coverage of the _direct_ module usage
of vmalloc rather than anything that the module triggered and that is
outside of the module. Which means any library function etc...
--
Michal Hocko
SUSE Labs
Powered by blists - more mailing lists