Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755759AbZJSJPv (ORCPT ); Mon, 19 Oct 2009 05:15:51 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751197AbZJSJPu (ORCPT ); Mon, 19 Oct 2009 05:15:50 -0400 Received: from mail-yw0-f202.google.com ([209.85.211.202]:37433 "EHLO mail-yw0-f202.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751350AbZJSJPu (ORCPT ); Mon, 19 Oct 2009 05:15:50 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=G9esJmmfzrGz2YNAUH+NkuH+0KNkF5nauJR5hH5eai8BGw1IuBPsVrvFedNN2w2Z7C SO669ViBvOQc1ox1y5bL0m86hzcN1n/y8LDpL7SS2PYQFTDLoiCKJmhvsMblj7jagona j66D3RLYoimpLGZOtepYqcKO0QQufdPE0WJMA= MIME-Version: 1.0 In-Reply-To: <1255711285.3008.59.camel@pc1117.cambridge.arm.com> References: <4AD6EF65.6080602@cn.fujitsu.com> <1255605778.10164.49.camel@pc1117.cambridge.arm.com> <1255690674.3008.24.camel@pc1117.cambridge.arm.com> <1255711285.3008.59.camel@pc1117.cambridge.arm.com> Date: Mon, 19 Oct 2009 11:15:54 +0200 Message-ID: Subject: Re: Leaks in trace reported by kmemleak From: Zdenek Kabelac To: Catalin Marinas Cc: Li Zefan , Linux Kernel Mailing List , Steven Rostedt , Frederic Weisbecker , Ingo Molnar Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1014 Lines: 25 2009/10/16 Catalin Marinas : > On Fri, 2009-10-16 at 17:07 +0200, Zdenek Kabelac wrote: >> So I've tested this modified version and it gives much better result >> with respect to amount of leaked objects > > BTW, I created this tree with kmemleak patches to be pushed upstream: > > git://git.kernel.org/pub/scm/linux/kernel/git/cmarinas/kmemleak.git > > It would be easier to test. Yes this branch worked well - and there were no leaks from i915 or kvm modules for trace. What is however interesting is the false positive leak for dma_debug_init(). Which is sometimes listed and sometimes not - the memory is allocated just once in the code during boot, so it's strange that pointers to that area are sometimes out of kmemleak scan. Zdenek -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/