Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932609Ab1CWLSf (ORCPT ); Wed, 23 Mar 2011 07:18:35 -0400 Received: from mail-ww0-f44.google.com ([74.125.82.44]:52575 "EHLO mail-ww0-f44.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932303Ab1CWLSe (ORCPT ); Wed, 23 Mar 2011 07:18:34 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=FpBDOip2eLmRvJY2Uwgrpf49ABmdPdgd6nBQWb985h/s4lYy8hjw/lCnF2ywNdLOAi UE6RU7xSNAx4esTQcXlRtGciXO/2iPgicPUjmEaJkayancKiBmE3bTknD1wUW6LjNvp5 aFgI5nclXGnmb6ICEYiTY0oB8JXLdxD9BfKag= MIME-Version: 1.0 In-Reply-To: <1300299394-20844-1-git-send-email-dbaluta@ixiacom.com> References: <1300299394-20844-1-git-send-email-dbaluta@ixiacom.com> Date: Wed, 23 Mar 2011 13:18:32 +0200 Message-ID: Subject: Re: [PATCH] kmemleak: build kmemleak-test.c as a module-only From: Daniel Baluta To: paulmck@linux.vnet.ibm.com, Catalin Marinas Cc: akpm@linux-foundation.org, mingo@elte.hu, fweisbec@gmail.com, rdunlap@xenotime.net, linux-kernel@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 572 Lines: 16 On Wed, Mar 16, 2011 at 8:16 PM, Daniel Baluta wrote: > mm/kmemleak-test.c is used to provide an example of how kmemleak > tool works. > > Memory is leaked at module unload-time, so building the test > in kernel (Y) makes the leaks impossible and the test useless. Any comments on this? thanks, Daniel. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/