Search Linux Wireless

Re: [ath9k-devel] Possible memory leak in ath9k monitor mode injection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Nov 12, 2009 at 8:35 PM, Luis R. Rodriguez
<lrodriguez@xxxxxxxxxxx> wrote:
> On Thu, Nov 12, 2009 at 11:31 AM, Johannes Berg
> <johannes@xxxxxxxxxxxxxxxx> wrote:
>> On Thu, 2009-11-12 at 20:18 +0100, Matteo Croce wrote:
>>
>>> # echo scan >/sys/kernel/debug/kmemleak ; cat
>>> /sys/kernel/debug/kmemleak
>>> kmemleak: 197 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
>>> unreferenced object 0xc5cfea80 (size 192):
>>>   comm "softirq", pid 0, jiffies 14191
>>>   backtrace:
>>>     [<ffffffff>] 0xffffffff
>>
>> that's kinda useless, can you run
>
> But if you insist on using kmemleak, try clearing the list
>
> echo clear > kmemleak
>
> Then scan
>
> echo scan > kmemleak
>
> then run your frame injection tests and then re-run scan.
>
> echo scan > kmemleak
>
> Then paste the output here.
>
>  Luis
>

root@alix:/sys/kernel/debug# rmmod inject
inject_exit Inject, exiting module
root@alix:/sys/kernel/debug# echo clear > kmemleak
root@alix:/sys/kernel/debug# echo scan >kmemleak
kmemleak: 61037 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
root@alix:/sys/kernel/debug# modprobe inject
inject_init Inject, inserting module
inject_init Inject, initializing the timer
root@alix:/sys/kernel/debug# echo scan >kmemleak
root@alix:/sys/kernel/debug# cat kmemleak
unreferenced object 0xccd48e70 (size 64):
  comm "softirq", pid 0, jiffies 3615
  hex dump (first 32 bytes):
    20 89 ed ce b9 83 d2 00 00 00 01 1b 00 80 00 04   ...............
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
unreferenced object 0xcd6f7930 (size 64):
  comm "softirq", pid 0, jiffies 11486
  hex dump (first 32 bytes):
    20 89 ed ce 6a a3 83 05 00 00 01 1b 00 80 00 04   ...j...........
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
unreferenced object 0xcbe57c40 (size 64):
  comm "softirq", pid 0, jiffies 28666
  hex dump (first 32 bytes):
    20 89 ed ce cc 52 c1 0f 00 00 01 1b 00 80 00 04   ....R..........
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
unreferenced object 0xcbe71850 (size 64):
  comm "softirq", pid 0, jiffies 28981
  hex dump (first 32 bytes):
    20 89 ed ce c9 64 f1 0f 00 00 01 1b 00 80 00 04   ....d..........
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
unreferenced object 0xcbe71f50 (size 64):
  comm "softirq", pid 0, jiffies 30041
  hex dump (first 32 bytes):
    20 89 ed ce 4a 26 93 10 00 00 01 1b 00 80 00 04   ...J&..........
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
unreferenced object 0xcb4b0230 (size 64):
  comm "softirq", pid 0, jiffies 35770
  hex dump (first 32 bytes):
    20 89 ed ce 79 66 fd 13 00 00 01 1b 00 80 00 04   ...yf..........
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
unreferenced object 0xcb4b02a0 (size 64):
  comm "softirq", pid 0, jiffies 35771
  hex dump (first 32 bytes):
    20 89 ed ce b1 8d fd 13 00 00 01 1b 00 80 00 04   ...............
    00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff>] 0xffffffff
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux