Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932665Ab1CWLXS (ORCPT ); Wed, 23 Mar 2011 07:23:18 -0400 Received: from mail-gy0-f174.google.com ([209.85.160.174]:34902 "EHLO mail-gy0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932654Ab1CWLXP (ORCPT ); Wed, 23 Mar 2011 07:23:15 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; b=cSrG2ULSKBdtGf2cXMQQ7IAPXceJ6NGjpnBHbJ7dki3va25A6XyRWoIUTSsjjZ0Zo1 GePZCYNM4amFTVydkOGmE8zX6LFtviHZyGW2dZsO9enOOBpEneSitd7YAGkKsf/799dH jtt0+7WOE8+7XRX/CPfz84Ry8URtvWA3I8rxI= MIME-Version: 1.0 In-Reply-To: References: <1300299394-20844-1-git-send-email-dbaluta@ixiacom.com> Date: Wed, 23 Mar 2011 13:23:14 +0200 X-Google-Sender-Auth: oJ7OVx7uOWmAzLymwgGoSyMlUYo Message-ID: Subject: Re: [PATCH] kmemleak: build kmemleak-test.c as a module-only From: Pekka Enberg To: Daniel Baluta Cc: paulmck@linux.vnet.ibm.com, Catalin Marinas , akpm@linux-foundation.org, mingo@elte.hu, fweisbec@gmail.com, rdunlap@xenotime.net, linux-kernel@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 709 Lines: 18 On Wed, Mar 23, 2011 at 1:18 PM, Daniel Baluta wrote: > On Wed, Mar 16, 2011 at 8:16 PM, Daniel Baluta wrote: >> mm/kmemleak-test.c is used to provide an example of how kmemleak >> tool works. >> >> Memory is leaked at module unload-time, so building the test >> in kernel (Y) makes the leaks impossible and the test useless. > > Any comments on this? Looks good to me. Acked-by: Pekka Enberg -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/