From: Luiz Capitulino Date: Wed, 30 Apr 2025 20:59:47 +0000 (-0400) Subject: mm: kmemleak: mark variables as __read_mostly X-Git-Tag: v6.16-rc1~92^2~74 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=0f4286765e4364bfad479324f78cd015e402398e;p=thirdparty%2Flinux.git mm: kmemleak: mark variables as __read_mostly The variables kmemleak_enabled and kmemleak_free_enabled are read in the kmemleak alloc and free path respectively, but are only written to if/when kmemleak is disabled. Link: https://lkml.kernel.org/r/4016090e857e8c4c2ade4b20df312f7f38325c15.1746046744.git.luizcap@redhat.com Signed-off-by: Luiz Capitulino Reviewed-by: Catalin Marinas Acked-by: David Hildenbrand Signed-off-by: Andrew Morton --- diff --git a/mm/kmemleak.c b/mm/kmemleak.c index 06baa34752524..da9cee34ee1b8 100644 --- a/mm/kmemleak.c +++ b/mm/kmemleak.c @@ -210,9 +210,9 @@ static struct kmem_cache *object_cache; static struct kmem_cache *scan_area_cache; /* set if tracing memory operations is enabled */ -static int kmemleak_enabled = 1; +static int kmemleak_enabled __read_mostly = 1; /* same as above but only for the kmemleak_free() callback */ -static int kmemleak_free_enabled = 1; +static int kmemleak_free_enabled __read_mostly = 1; /* set in the late_initcall if there were no errors */ static int kmemleak_late_initialized; /* set if a fatal kmemleak error has occurred */