23 Jun, 2015
1 commit
-
Recently wikipedia announced to secure access to the servers.
Now all http access re-route to https.Signed-off-by: Masanari Iida
Signed-off-by: Jonathan Corbet
25 Oct, 2014
1 commit
-
This patch add a case with CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF=y.
Signed-off-by: Masanari Iida
Acked-by: Catalin Marinas
Signed-off-by: Jonathan Corbet
26 Aug, 2014
1 commit
-
Signed-off-by: Rahul Bedarkar
Acked-by: Randy Dunlap
Signed-off-by: Jiri Kosina
07 Jun, 2014
1 commit
-
The memory allocation stack trace is not always useful for debugging a
memory leak (e.g. radix_tree_preload). This function, when called,
updates the stack trace for an already allocated object.Signed-off-by: Catalin Marinas
Cc: Johannes Weiner
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
04 Apr, 2014
2 commits
-
Update Documentatin/kmemleak.txt to reflect the following changes:
Commit b69ec42b1b19 ("Kconfig: clean up the long arch list for the
DEBUG_KMEMLEAK config option") made it so that we can't check supported
architectures by read Kconfig.debug.Commit 85d3a316c71 ("kmemleak: use rbtree instead of prio tree")
converted kmemleak to use rbtree instead of prio tree.Signed-off-by: Wang YanQing
Cc: Catalin Marinas
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds -
Currently if kmemleak is disabled, the kmemleak objects can never be
freed, no matter if it's disabled by a user or due to fatal errors.Those objects can be a big waste of memory.
OBJS ACTIVE USE OBJ SIZE SLABS OBJ/SLAB CACHE SIZE NAME
1200264 1197433 99% 0.30K 46164 26 369312K kmemleak_objectWith this patch, after kmemleak was disabled you can reclaim memory
with:# echo clear > /sys/kernel/debug/kmemleak
Also inform users about this with a printk.
Signed-off-by: Li Zefan
Acked-by: Catalin Marinas
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
03 Dec, 2011
1 commit
-
This patch adds kmemleak callbacks from the percpu allocator, reducing a
number of false positives caused by kmemleak not scanning such memory
blocks. The percpu chunks are never reported as leaks because of current
kmemleak limitations with the __percpu pointer not pointing directly to
the actual chunks.Reported-by: Huajun Li
Acked-by: Christoph Lameter
Acked-by: Tejun Heo
Signed-off-by: Catalin Marinas
16 Jun, 2011
1 commit
-
Instead of listing the architectures that are supported by
kmemleak in Documentation/kmemleak.txt, just refer people to
the list of supported architecutures in lib/Kconfig.debug so
that Documentation/kmemleak.txt does not need more updates
for this.Signed-off-by: Maxin B. John
Signed-off-by: Randy Dunlap
Signed-off-by: Linus Torvalds
05 Apr, 2011
1 commit
-
Besides x86 and arm, kmemleak now supports powerpc, sparc, sh,
microblaze and tile.Signed-off-by: Daniel Baluta
Acked-by: Catalin Marinas
Signed-off-by: Randy Dunlap
Signed-off-by: Linus Torvalds
08 Sep, 2009
1 commit
-
In an ideal world your kmemleak output will be small, when its
not (usually during initial bootup) you can use the clear command
to ingore previously reported and unreferenced kmemleak objects. We
do this by painting all currently reported unreferenced objects grey.
We paint them grey instead of black to allow future scans on the same
objects as such objects could still potentially reference newly
allocated objects in the future.To test a critical section on demand with a clean
/sys/kernel/debug/kmemleak you can do:echo clear > /sys/kernel/debug/kmemleak
test your kernel or modules
echo scan > /sys/kernel/debug/kmemleakThen as usual to get your report with:
cat /sys/kernel/debug/kmemleak
Signed-off-by: Luis R. Rodriguez
Signed-off-by: Catalin Marinas
27 Aug, 2009
1 commit
-
By writing dump= to the kmemleak file, kmemleak will look up an
object with that address and dump the information it has about it to
syslog. This is useful in debugging memory leaks.Signed-off-by: Catalin Marinas
27 Jun, 2009
3 commits
-
Since there is a kernel thread for automatically scanning the memory, it
makes sense for the debug/kmemleak file to only show its findings. This
patch also adds support for "echo scan > debug/kmemleak" to trigger an
intermediate memory scan and eliminates the kmemleak_mutex (scan_mutex
covers all the cases now).Signed-off-by: Catalin Marinas
-
Because of false positives, the memory scanning thread may print too
much information. This patch changes the scanning thread to only print
the number of newly suspected leaks. Further information can be read
from the /sys/kernel/debug/kmemleak file.Signed-off-by: Catalin Marinas
-
This is to reduce the number of false positives reported.
Signed-off-by: Catalin Marinas
25 Jun, 2009
1 commit
-
(feature suggested by Sergey Senozhatsky)
Kmemleak needs to track all the memory allocations but some of these
happen before kmemleak is initialised. These are stored in an internal
buffer which may be exceeded in some kernel configurations. This patch
adds a configuration option with a default value of 400 and also removes
the stack dump when the early log buffer is exceeded.Signed-off-by: Catalin Marinas
Acked-by: Sergey Senozhatsky
12 Jun, 2009
1 commit
-
This patch adds the Documentation/kmemleak.txt file with some
information about how kmemleak works.Signed-off-by: Catalin Marinas