From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752861AbcD0JAk (ORCPT ); Wed, 27 Apr 2016 05:00:40 -0400 Received: from s3.sipsolutions.net ([5.9.151.49]:50086 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751411AbcD0JAh (ORCPT ); Wed, 27 Apr 2016 05:00:37 -0400 Message-ID: <1461747634.3723.4.camel@sipsolutions.net> Subject: kmemleak - percpu reliability? From: Johannes Berg To: Catalin Marinas Cc: linux-kernel Date: Wed, 27 Apr 2016 11:00:34 +0200 Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.18.5.1-1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Yesterday I found the bug fixed by this commit: https://git.kernel.org/cgit/linux/kernel/git/jberg/mac80211.git/commit/?id=e6436be21e77e3659b4ff7e357ab5a8342d132d2 The first case can easily be reproduced by running: # iw wlan0 interface add wlan0 type monitor (reusing the name "wlan0" twice, the command should fail) I tried to see what happens with kmemleak, but for some reason it won't report it even with forced rescan etc. Am I missing something? Thanks, johannes