From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail138.messagelabs.com (mail138.messagelabs.com [216.82.249.35]) by kanga.kvack.org (Postfix) with SMTP id 63DBF8D0040 for ; Wed, 30 Mar 2011 10:08:02 -0400 (EDT) Subject: Re: kmemleak for MIPS From: Catalin Marinas In-Reply-To: <1301491622.3283.46.camel@edumazet-laptop> References: <9bde694e1003020554p7c8ff3c2o4ae7cb5d501d1ab9@mail.gmail.com> <1300960540.32158.13.camel@e102109-lin.cambridge.arm.com> <1301395206.583.53.camel@e102109-lin.cambridge.arm.com> <1301399454.583.66.camel@e102109-lin.cambridge.arm.com> <1301476505.29074.47.camel@e102109-lin.cambridge.arm.com> <1301485085.29074.61.camel@e102109-lin.cambridge.arm.com> <1301488032.3283.42.camel@edumazet-laptop> <1301491622.3283.46.camel@edumazet-laptop> Date: Wed, 30 Mar 2011 15:07:48 +0100 Message-ID: <1301494068.29074.94.camel@e102109-lin.cambridge.arm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Sender: owner-linux-mm@kvack.org List-ID: To: Eric Dumazet Cc: Maxin John , Daniel Baluta , naveen yadav , linux-mips@linux-mips.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org On Wed, 2011-03-30 at 14:27 +0100, Eric Dumazet wrote: > Le mercredi 30 mars 2011 =C3=A0 14:17 +0100, Maxin John a =C3=A9crit : > > I have compiled the kernel with below given modification in .config > > > > CONFIG_CMDLINE=3D"uhash_entries=3D256" > > > > After booting with the new kernel, the "kmemleak" no longer complains > > about the "udp_table_init". > > However it do report another possible leak :) > > > > debian-mips:~# cat /sys/kernel/debug/kmemleak > > unreferenced object 0x8f085000 (size 4096): > > comm "swapper", pid 1, jiffies 4294937670 (age 1043.280s) > > hex dump (first 32 bytes): > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > > backtrace: > > [<801ac7a8>] __kmalloc+0x130/0x180 > > [<80532500>] flow_cache_cpu_prepare+0x50/0xa8 > > [<8052378c>] flow_cache_init_global+0x90/0x138 > > [<80100584>] do_one_initcall+0x174/0x1e0 > > [<8050c348>] kernel_init+0xe4/0x174 > > [<80103d4c>] kernel_thread_helper+0x10/0x18 > > debian-mips:~# >=20 > Hmm, then MIPS kmemleak port might have a problem with percpu data ? >=20 > fcp->hash_table =3D kzalloc_node(sz, GFP_KERNEL, cpu_to_node(cpu)); >=20 > fcp is a per cpu "struct flow_cache_percpu" I can't figure out what it is. Kmemleak uses this block for scanning the percpu data: =09for_each_possible_cpu(i) =09=09scan_block(__per_cpu_start + per_cpu_offset(i), =09=09=09 __per_cpu_end + per_cpu_offset(i), NULL, 1); The __per_cpu_* symbols seem to be correctly defined in the MIPS vmlinux.lds.S as it uses the PERCPU macro directly. Other chunks allocated via pcpu_mem_alloc() should be tracked by kmemleak and either reported as leaks or scanned (and not reporting subsequent blocks referred from the percpu memory). --=20 Catalin -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/ Don't email: email@kvack.org