Return-path: Received: from mail-iw0-f178.google.com ([209.85.223.178]:65209 "EHLO mail-iw0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753682AbZKLTgP convert rfc822-to-8bit (ORCPT ); Thu, 12 Nov 2009 14:36:15 -0500 Received: by iwn8 with SMTP id 8so2033909iwn.33 for ; Thu, 12 Nov 2009 11:36:21 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <43e72e890911121135v150e33cbwcaa284ba998d2656@mail.gmail.com> References: <40101cc30911120618m5d9acd34pf6aa9ec89c6c40b8@mail.gmail.com> <20091112154440.GD19349@tux> <43e72e890911120749n72360f0btfb058ab3a521eabb@mail.gmail.com> <40101cc30911121118h17db32a1y61edac1a4c0aec24@mail.gmail.com> <1258054304.3899.36.camel@johannes.local> <43e72e890911121135v150e33cbwcaa284ba998d2656@mail.gmail.com> From: "Luis R. Rodriguez" Date: Thu, 12 Nov 2009 11:36:01 -0800 Message-ID: <43e72e890911121136s2c1280q4c1fd3fd87090ff9@mail.gmail.com> Subject: Re: [ath9k-devel] Possible memory leak in ath9k monitor mode injection To: Johannes Berg Cc: Matteo Croce , Lorenzo Bianconi , "linux-wireless@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: On Thu, Nov 12, 2009 at 11:35 AM, Luis R. Rodriguez wrote: > On Thu, Nov 12, 2009 at 11:31 AM, Johannes Berg > wrote: >> On Thu, 2009-11-12 at 20:18 +0100, Matteo Croce wrote: >> >>> # echo scan >/sys/kernel/debug/kmemleak ; cat >>> /sys/kernel/debug/kmemleak >>> kmemleak: 197 new suspected memory leaks (see /sys/kernel/debug/kmemleak) >>> unreferenced object 0xc5cfea80 (size 192): >>>   comm "softirq", pid 0, jiffies 14191 >>>   backtrace: >>>     [] 0xffffffff >> >> that's kinda useless, can you run > > But if you insist on using kmemleak, try clearing the list > > echo clear > kmemleak > > Then scan > > echo scan > kmemleak > > then run your frame injection tests and then re-run scan. > > echo scan > kmemleak > > Then paste the output here. You need a kernel with debugging too to get a good valuable trace. Luis