Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755881AbZGCMUM (ORCPT ); Fri, 3 Jul 2009 08:20:12 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752601AbZGCMUA (ORCPT ); Fri, 3 Jul 2009 08:20:00 -0400 Received: from courier.cs.helsinki.fi ([128.214.9.1]:53450 "EHLO mail.cs.helsinki.fi" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752484AbZGCMUA (ORCPT ); Fri, 3 Jul 2009 08:20:00 -0400 Subject: Re: [PATCH] kmemleak: Trace the kmalloc_large* functions in slub From: Pekka Enberg To: Catalin Marinas Cc: linux-kernel@vger.kernel.org, Christoph Lameter In-Reply-To: <20090703121825.18771.79975.stgit@pc1117.cambridge.arm.com> References: <20090703121825.18771.79975.stgit@pc1117.cambridge.arm.com> Date: Fri, 03 Jul 2009 15:20:01 +0300 Message-Id: <1246623601.4807.17.camel@penberg-laptop> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 7bit X-Mailer: Evolution 2.24.3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 693 Lines: 16 On Fri, 2009-07-03 at 13:18 +0100, Catalin Marinas wrote: > The kmalloc_large() and kmalloc_large_node() functions were missed when > adding the kmemleak hooks to the slub allocator. However, they should be > traced to avoid false positives. > > Signed-off-by: Catalin Marinas > Cc: Christoph Lameter > Cc: Pekka Enberg Acked-by: Pekka Enberg -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/