Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751707AbWHSK16 (ORCPT ); Sat, 19 Aug 2006 06:27:58 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751710AbWHSK16 (ORCPT ); Sat, 19 Aug 2006 06:27:58 -0400 Received: from py-out-1112.google.com ([64.233.166.181]:4892 "EHLO py-out-1112.google.com") by vger.kernel.org with ESMTP id S1751707AbWHSK15 (ORCPT ); Sat, 19 Aug 2006 06:27:57 -0400 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=sP68dI06UqvdI+BkQ3xW9MquxmT+JFpJ7XUPfCcyI2X3l353zYEGkAluCoPQHuFhyXT3FU/hgjz1SZWTivijGST4IEgLbEDCtdGwOpM+7nKKDIRkV3PpjKVa1HE8Zk4xocxE4ZeoFht/lCso5vvgvI8B7cuMWcH5Hz57TUAxAV4= Message-ID: Date: Sat, 19 Aug 2006 11:27:57 +0100 From: "Catalin Marinas" To: "Michal Piotrowski" Subject: Re: [PATCH 2.6.18-rc4 00/10] Kernel memory leak detector 0.9 Cc: linux-kernel@vger.kernel.org In-Reply-To: <6bffcb0e0608181549o3034398fob3763d3ce0869cfe@mail.gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <20060812215857.17709.79502.stgit@localhost.localdomain> <6bffcb0e0608180655j50332247m8ed393c37d570ee4@mail.gmail.com> <6bffcb0e0608180715v27015481vb7c603c4be356a21@mail.gmail.com> <6bffcb0e0608180942l12e342epd60dffbb5c5d4b3e@mail.gmail.com> <6bffcb0e0608181438m3406de08q9a168d486127aef@mail.gmail.com> <6bffcb0e0608181549o3034398fob3763d3ce0869cfe@mail.gmail.com> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1063 Lines: 29 On 18/08/06, Michal Piotrowski wrote: > This is interesting. Is it too large? > orphan pointer 0xfe09f000 (size 4194304): > c016cb9c: <__vmalloc_node> > c016cbb2: <__vmalloc> > c016cbc7: > fdd3bbe1: > fdd23b73: > c0149fea: Looking at the code, I don't think it is too large. Anyway, it is just a temporary false positive as it seems to only be present in some of the files in your tarball. > A large collection of false positives :) > http://www.stardust.webpages.pl/files/o_bugs/kmemleak-0.9/ml_collection/ml1.tar Thanks, but some of them look like real leaks :-) - delayacct_tsk_init - I'll post a separate e-mail for this. Have you seen any crashes or lockdep reports with the latest kmemleak patches? -- Catalin - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/