On Thu, Nov 12, 2009 at 8:35 PM, Luis R. Rodriguez <lrodriguez@xxxxxxxxxxx> wrote: > On Thu, Nov 12, 2009 at 11:31 AM, Johannes Berg > <johannes@xxxxxxxxxxxxxxxx> wrote: >> On Thu, 2009-11-12 at 20:18 +0100, Matteo Croce wrote: >> >>> # echo scan >/sys/kernel/debug/kmemleak ; cat >>> /sys/kernel/debug/kmemleak >>> kmemleak: 197 new suspected memory leaks (see /sys/kernel/debug/kmemleak) >>> unreferenced object 0xc5cfea80 (size 192): >>> comm "softirq", pid 0, jiffies 14191 >>> backtrace: >>> [<ffffffff>] 0xffffffff >> >> that's kinda useless, can you run > > But if you insist on using kmemleak, try clearing the list > > echo clear > kmemleak > > Then scan > > echo scan > kmemleak > > then run your frame injection tests and then re-run scan. > > echo scan > kmemleak > > Then paste the output here. > > Luis > root@alix:/sys/kernel/debug# rmmod inject inject_exit Inject, exiting module root@alix:/sys/kernel/debug# echo clear > kmemleak root@alix:/sys/kernel/debug# echo scan >kmemleak kmemleak: 61037 new suspected memory leaks (see /sys/kernel/debug/kmemleak) root@alix:/sys/kernel/debug# modprobe inject inject_init Inject, inserting module inject_init Inject, initializing the timer root@alix:/sys/kernel/debug# echo scan >kmemleak root@alix:/sys/kernel/debug# cat kmemleak unreferenced object 0xccd48e70 (size 64): comm "softirq", pid 0, jiffies 3615 hex dump (first 32 bytes): 20 89 ed ce b9 83 d2 00 00 00 01 1b 00 80 00 04 ............... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff unreferenced object 0xcd6f7930 (size 64): comm "softirq", pid 0, jiffies 11486 hex dump (first 32 bytes): 20 89 ed ce 6a a3 83 05 00 00 01 1b 00 80 00 04 ...j........... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff unreferenced object 0xcbe57c40 (size 64): comm "softirq", pid 0, jiffies 28666 hex dump (first 32 bytes): 20 89 ed ce cc 52 c1 0f 00 00 01 1b 00 80 00 04 ....R.......... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff unreferenced object 0xcbe71850 (size 64): comm "softirq", pid 0, jiffies 28981 hex dump (first 32 bytes): 20 89 ed ce c9 64 f1 0f 00 00 01 1b 00 80 00 04 ....d.......... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff unreferenced object 0xcbe71f50 (size 64): comm "softirq", pid 0, jiffies 30041 hex dump (first 32 bytes): 20 89 ed ce 4a 26 93 10 00 00 01 1b 00 80 00 04 ...J&.......... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff unreferenced object 0xcb4b0230 (size 64): comm "softirq", pid 0, jiffies 35770 hex dump (first 32 bytes): 20 89 ed ce 79 66 fd 13 00 00 01 1b 00 80 00 04 ...yf.......... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff unreferenced object 0xcb4b02a0 (size 64): comm "softirq", pid 0, jiffies 35771 hex dump (first 32 bytes): 20 89 ed ce b1 8d fd 13 00 00 01 1b 00 80 00 04 ............... 00 00 00 80 80 80 80 80 80 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff>] 0xffffffff -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html