[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180828101412.mb7t562roqbhsbjw@axis.com>
Date: Tue, 28 Aug 2018 12:14:12 +0200
From: Vincent Whitchurch <vincent.whitchurch@...s.com>
To: Andrew Morton <akpm@...ux-foundation.org>
Cc: catalin.marinas@....com, linux-kernel@...r.kernel.org,
linux-mm@...ck.org
Subject: Re: [PATCHv2] kmemleak: Add option to print warnings to dmesg
On Mon, Aug 27, 2018 at 03:16:41PM -0700, Andrew Morton wrote:
> On Mon, 27 Aug 2018 10:38:21 +0200 Vincent Whitchurch <vincent.whitchurch@...s.com> wrote:
>
> > Currently, kmemleak only prints the number of suspected leaks to dmesg
> > but requires the user to read a debugfs file to get the actual stack
> > traces of the objects' allocation points. Add an option to print the
> > full object information to dmesg too. This allows easier integration of
> > kmemleak into automated test systems since those kind of systems
> > presumably already save kernel logs.
>
> "presumably" is a bit rubbery. Are you sure this change is sufficienty
> useful to justify including it? Do you have use-cases for it?
We (like every one else) have automated test infrastructure which test
our Linux systems. With this option, running our tests with kmemleak is
as simple as enabling kmemleak and this option; the test infrastructure
knows how to save kernel logs, which will now include kmemleak reports.
Without this option, the test infrastructure needs to be specifically
taught to read out the kmemleak debugfs file. Removing this need for
special handling makes kmemleak more similar to other kernel debug
options (slab debugging, debug objects, etc).
>
> > --- a/lib/Kconfig.debug
> > +++ b/lib/Kconfig.debug
> > @@ -593,6 +593,15 @@ config DEBUG_KMEMLEAK_DEFAULT_OFF
> > Say Y here to disable kmemleak by default. It can then be enabled
> > on the command line via kmemleak=on.
> >
> > +config DEBUG_KMEMLEAK_WARN
> > + bool "Print kmemleak object warnings to log buffer"
> > + depends on DEBUG_KMEMLEAK
> > + help
> > + Say Y here to make kmemleak print information about unreferenced
> > + objects (including stacktraces) as warnings to the kernel log buffer.
> > + Otherwise this information is only available by reading the kmemleak
> > + debugfs file.
>
> Why add the config option? Why not simply make the change for all
> configs?
No particular reason other than preserving the current behaviour for
existing users. I can remove the config option if Catalin is fine with
it.
>
> > config DEBUG_STACK_USAGE
> > bool "Stack utilization instrumentation"
> > depends on DEBUG_KERNEL && !IA64
> > diff --git a/mm/kmemleak.c b/mm/kmemleak.c
> > index 9a085d525bbc..22662715a3dc 100644
> > --- a/mm/kmemleak.c
> > +++ b/mm/kmemleak.c
> > @@ -181,6 +181,7 @@ struct kmemleak_object {
> > /* flag set to not scan the object */
> > #define OBJECT_NO_SCAN (1 << 2)
> >
> > +#define HEX_PREFIX " "
> > /* number of bytes to print per line; must be 16 or 32 */
> > #define HEX_ROW_SIZE 16
> > /* number of bytes to print at a time (1, 2, 4, 8) */
> > @@ -299,6 +300,25 @@ static void kmemleak_disable(void);
> > kmemleak_disable(); \
> > } while (0)
> >
> > +#define warn_or_seq_printf(seq, fmt, ...) do { \
> > + if (seq) \
> > + seq_printf(seq, fmt, ##__VA_ARGS__); \
> > + else \
> > + pr_warn(fmt, ##__VA_ARGS__); \
> > +} while (0)
> > +
> > +static void warn_or_seq_hex_dump(struct seq_file *seq, int prefix_type,
> > + int rowsize, int groupsize, const void *buf,
> > + size_t len, bool ascii)
> > +{
> > + if (seq)
> > + seq_hex_dump(seq, HEX_PREFIX, prefix_type, rowsize, groupsize,
> > + buf, len, ascii);
> > + else
> > + print_hex_dump(KERN_WARNING, pr_fmt(HEX_PREFIX), prefix_type,
> > + rowsize, groupsize, buf, len, ascii);
> > +}
>
> This will print to the logs OR to the debugfs file, won't it?
No, the information is always available in the debugfs file, even after
this patch. The dmesg printing is in addition to that. The code is
called with and without seq == NULL in different code paths.
Powered by blists - more mailing lists