mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-09-02 08:32:55 +00:00

The kmemleak-test.c module is meant to leak some pointers for debugging the kmemleak detection, pointer information dumping. It's no use if it prints the hashed values of such pointers. Change the printk() format from %p to %px. While at it, also display the raw __percpu pointer rather than this_cpu_ptr() since kmemleak now tracks such pointers independently of the standard allocations. Link: https://lkml.kernel.org/r/20250206114537.2597764-3-catalin.marinas@arm.com Signed-off-by: Catalin Marinas <catalin.marinas@arm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
103 lines
2.8 KiB
C
103 lines
2.8 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* samples/kmemleak/kmemleak-test.c
|
|
*
|
|
* Copyright (C) 2008 ARM Limited
|
|
* Written by Catalin Marinas <catalin.marinas@arm.com>
|
|
*/
|
|
|
|
#define pr_fmt(fmt) "kmemleak: " fmt
|
|
|
|
#include <linux/init.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/module.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/vmalloc.h>
|
|
#include <linux/list.h>
|
|
#include <linux/percpu.h>
|
|
#include <linux/fdtable.h>
|
|
|
|
#include <linux/kmemleak.h>
|
|
|
|
struct test_node {
|
|
long header[25];
|
|
struct list_head list;
|
|
long footer[25];
|
|
};
|
|
|
|
static LIST_HEAD(test_list);
|
|
static DEFINE_PER_CPU(void *, kmemleak_test_pointer);
|
|
|
|
/*
|
|
* Some very simple testing. This function needs to be extended for
|
|
* proper testing.
|
|
*/
|
|
static int kmemleak_test_init(void)
|
|
{
|
|
struct test_node *elem;
|
|
int i;
|
|
|
|
pr_info("Kmemleak testing\n");
|
|
|
|
/* make some orphan objects */
|
|
pr_info("kmalloc(32) = 0x%px\n", kmalloc(32, GFP_KERNEL));
|
|
pr_info("kmalloc(32) = 0x%px\n", kmalloc(32, GFP_KERNEL));
|
|
pr_info("kmalloc(1024) = 0x%px\n", kmalloc(1024, GFP_KERNEL));
|
|
pr_info("kmalloc(1024) = 0x%px\n", kmalloc(1024, GFP_KERNEL));
|
|
pr_info("kmalloc(2048) = 0x%px\n", kmalloc(2048, GFP_KERNEL));
|
|
pr_info("kmalloc(2048) = 0x%px\n", kmalloc(2048, GFP_KERNEL));
|
|
pr_info("kmalloc(4096) = 0x%px\n", kmalloc(4096, GFP_KERNEL));
|
|
pr_info("kmalloc(4096) = 0x%px\n", kmalloc(4096, GFP_KERNEL));
|
|
#ifndef CONFIG_MODULES
|
|
pr_info("kmem_cache_alloc(files_cachep) = 0x%px\n",
|
|
kmem_cache_alloc(files_cachep, GFP_KERNEL));
|
|
pr_info("kmem_cache_alloc(files_cachep) = 0x%px\n",
|
|
kmem_cache_alloc(files_cachep, GFP_KERNEL));
|
|
#endif
|
|
pr_info("vmalloc(64) = 0x%px\n", vmalloc(64));
|
|
pr_info("vmalloc(64) = 0x%px\n", vmalloc(64));
|
|
pr_info("vmalloc(64) = 0x%px\n", vmalloc(64));
|
|
pr_info("vmalloc(64) = 0x%px\n", vmalloc(64));
|
|
pr_info("vmalloc(64) = 0x%px\n", vmalloc(64));
|
|
|
|
/*
|
|
* Add elements to a list. They should only appear as orphan
|
|
* after the module is removed.
|
|
*/
|
|
for (i = 0; i < 10; i++) {
|
|
elem = kzalloc(sizeof(*elem), GFP_KERNEL);
|
|
pr_info("kzalloc(sizeof(*elem)) = 0x%px\n", elem);
|
|
if (!elem)
|
|
return -ENOMEM;
|
|
INIT_LIST_HEAD(&elem->list);
|
|
list_add_tail(&elem->list, &test_list);
|
|
}
|
|
|
|
for_each_possible_cpu(i) {
|
|
per_cpu(kmemleak_test_pointer, i) = kmalloc(129, GFP_KERNEL);
|
|
pr_info("kmalloc(129) = 0x%px\n",
|
|
per_cpu(kmemleak_test_pointer, i));
|
|
}
|
|
|
|
pr_info("__alloc_percpu(64, 4) = 0x%px\n", __alloc_percpu(64, 4));
|
|
|
|
return 0;
|
|
}
|
|
module_init(kmemleak_test_init);
|
|
|
|
static void __exit kmemleak_test_exit(void)
|
|
{
|
|
struct test_node *elem, *tmp;
|
|
|
|
/*
|
|
* Remove the list elements without actually freeing the
|
|
* memory.
|
|
*/
|
|
list_for_each_entry_safe(elem, tmp, &test_list, list)
|
|
list_del(&elem->list);
|
|
}
|
|
module_exit(kmemleak_test_exit);
|
|
|
|
MODULE_DESCRIPTION("Sample module to leak memory for kmemleak testing");
|
|
MODULE_LICENSE("GPL");
|