Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp2524413ima; Mon, 22 Oct 2018 11:09:42 -0700 (PDT) X-Google-Smtp-Source: ACcGV63dqRPJ3OuL2hR5ILKbwwcs1/Rc1OKLujJJtr/Ydnhvq0mRjRv1SLFCKwUvAHTOlm+aycI5 X-Received: by 2002:a63:d52:: with SMTP id 18-v6mr44409625pgn.107.1540231781974; Mon, 22 Oct 2018 11:09:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540231781; cv=none; d=google.com; s=arc-20160816; b=PWtvU0iNN8rGCu0AEUHzO1DBtouLC164g+47a0UDeHwAn9uC0Ltyz2GoQAKTDVeqOY VAEytmP/R1MP2vCnwMoSDyWf5UDV3tm3FwU9TQH455hZZ6/glCLLHpkE622J/PESBMZr cev8VGeTE/RRvNBUmCpfJa7wTmMoIt/C135UOodd2jkz8kcS7JaXmj8iN3iQZXTKQsLH 4mCfS3Ai+hQhLNWVnrOV3L8LNNOzpqjrRA+GoTxJC2roTfuRgEQe4kqaG/7JNvd4mmMA aN49Y+9UpaqvLkKISX9I2rXLCG95WYVcMmUzx7DpmI1Dc3lao+pXWhNSdYMXA+tVFeZ9 RSjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:mime-version:message-id :date:subject:cc:to:from; bh=gUUILHBVOLMP9cQJM58PswCXRezagqDyQqQND/HH+NE=; b=ao46pS/t0kg1WDtXiC6Tv84418m0aOCnqdSjVKNwJfjlrFHnOVeIyEB/n1UpBGmrjs 9VCmJ2AbaYWu2TViho8GTwZ5ME1pM40YRRn8PS3hWPY1rs4zZ3CXEMQ6PA4qcoJy2DuW lApiYURqvtXN3DzqNXBwL5UC48Tkka1kUlD74tPGDMa0pYuncuM0HU0wY1wJAv4vdLBQ pMTOBrXi9mQU4eVCIoWwMeBFJ700DFseofbJks3lEI7GbBPMOz3NHsit+6h5oIVD+jfA 4hmGTe9LkAVCd9LMtQ+4X7UNtINkMfWJ6NH7fQoi051+8Im1fOHtnvw8JKPIbx7siXUl ozrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=SRKtTg9A; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2-v6si6362813pgc.430.2018.10.22.11.09.23; Mon, 22 Oct 2018 11:09:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=SRKtTg9A; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728848AbeJWC2e (ORCPT + 99 others); Mon, 22 Oct 2018 22:28:34 -0400 Received: from hqemgate15.nvidia.com ([216.228.121.64]:17073 "EHLO hqemgate15.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728319AbeJWC2d (ORCPT ); Mon, 22 Oct 2018 22:28:33 -0400 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqemgate15.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Mon, 22 Oct 2018 11:08:52 -0700 Received: from HQMAIL105.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Mon, 22 Oct 2018 11:08:59 -0700 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Mon, 22 Oct 2018 11:08:59 -0700 Received: from HQMAIL108.nvidia.com (172.18.146.13) by HQMAIL105.nvidia.com (172.20.187.12) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 22 Oct 2018 18:08:59 +0000 Received: from hqnvemgw02.nvidia.com (172.16.227.111) by HQMAIL108.nvidia.com (172.18.146.13) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Mon, 22 Oct 2018 18:08:59 +0000 Received: from prpatel-System-Product-Name.nvidia.com (Not Verified[10.24.229.63]) by hqnvemgw02.nvidia.com with Trustwave SEG (v7,5,8,10121) id ; Mon, 22 Oct 2018 11:08:59 -0700 From: Prateek Patel To: CC: , , , , , , , , Sri Krishna chowdary Subject: [PATCH V2] kmemleak: Add config to select auto scan Date: Mon, 22 Oct 2018 23:38:43 +0530 Message-ID: <1540231723-7087-1-git-send-email-prpatel@nvidia.com> X-Mailer: git-send-email 2.1.4 X-NVConfidentiality: public MIME-Version: 1.0 Content-Type: text/plain DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1540231732; bh=gUUILHBVOLMP9cQJM58PswCXRezagqDyQqQND/HH+NE=; h=X-PGP-Universal:From:To:CC:Subject:Date:Message-ID:X-Mailer: X-NVConfidentiality:MIME-Version:Content-Type; b=SRKtTg9Aep7PEy5+fYnCwtGIRiek1mII8Aed7pKbye0fg2btgER4iW3ukD0VOHoiV Xj63dwSXkLCYZVyv42W92ai+wYR0wXEMmN3KCvQcHacb3qSrcUQiDkUSfpqVdaZ5A6 qXPhFfmgqYAkqoXdQ2mhzyixT8FAiucC7vWGW44KwMgytNqGWb5Zs6olEKjsiVqjYW m0ij0J+b0G1xDn4gzDyBXjxgIMrc19rTcJ5baUikCn0J1rvg3PwSYdgHNVTLwCVtlg X439OJdFFXMHaenz+YIqw2rJuGIZLorrKV2ALlMTye18Zk0vKfKOdKEkw4hPaH2A6T jqSHaDCZAwMxA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sri Krishna chowdary Kmemleak scan can be cpu intensive and can stall user tasks at times. To prevent this, add config DEBUG_KMEMLEAK_AUTO_SCAN to enable/disable auto scan on boot up. Also protect first_run with DEBUG_KMEMLEAK_AUTO_SCAN as this is meant for only first automatic scan. Signed-off-by: Sri Krishna chowdary Signed-off-by: Sachin Nikam Signed-off-by: Prateek --- v2: * change config name to DEBUG_KMEMLEAK_AUTO_SCAN from DEBUG_KMEMLEAK_SCAN_ON * use IS_ENABLED(...) instead of #ifdef ... * update commit message according to config name --- lib/Kconfig.debug | 15 +++++++++++++++ mm/kmemleak.c | 10 ++++++---- 2 files changed, 21 insertions(+), 4 deletions(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index c958013..a14166d 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -593,6 +593,21 @@ config DEBUG_KMEMLEAK_DEFAULT_OFF Say Y here to disable kmemleak by default. It can then be enabled on the command line via kmemleak=on. +config DEBUG_KMEMLEAK_AUTO_SCAN + bool "Enable kmemleak auto scan thread on boot up" + default y + depends on DEBUG_KMEMLEAK + help + Depending on the cpu, kmemleak scan may be cpu intensive and can + stall user tasks at times. This option enables/disables automatic + kmemleak scan at boot up. + + Say N here to disable kmemleak auto scan thread to stop automatic + scanning. Disabling this option disables automatic reporting of + memory leaks. + + If unsure, say Y. + config DEBUG_STACK_USAGE bool "Stack utilization instrumentation" depends on DEBUG_KERNEL && !IA64 diff --git a/mm/kmemleak.c b/mm/kmemleak.c index 877de4f..a614930 100644 --- a/mm/kmemleak.c +++ b/mm/kmemleak.c @@ -1647,7 +1647,7 @@ static void kmemleak_scan(void) */ static int kmemleak_scan_thread(void *arg) { - static int first_run = 1; + static int first_run = IS_ENABLED(CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN); pr_info("Automatic memory scanning thread started\n"); set_user_nice(current, 10); @@ -2141,9 +2141,11 @@ static int __init kmemleak_late_init(void) return -ENOMEM; } - mutex_lock(&scan_mutex); - start_scan_thread(); - mutex_unlock(&scan_mutex); + if (IS_ENABLED(CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN)) { + mutex_lock(&scan_mutex); + start_scan_thread(); + mutex_unlock(&scan_mutex); + } pr_info("Kernel memory leak detector initialized\n"); -- 2.1.4