From: Alexey Fisher <bug-track@fisher-privat.net>
To: Catalin Marinas <catalin.marinas@arm.com>
Cc: Pekka Enberg <penberg@cs.helsinki.fi>,
Kernel Testers List <kernel-testers@vger.kernel.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
Sam Ravnborg <sam@ravnborg.org>, Ingo Molnar <mingo@elte.hu>,
x86@kernel.org
Subject: Re: [PATCH] x86: _edata should include all .data.* sections on X86_64
Date: Tue, 14 Jul 2009 12:37:04 +0200 [thread overview]
Message-ID: <4A5C5FD0.3020204@fisher-privat.net> (raw)
In-Reply-To: <1247567499.28240.48.camel@pc1117.cambridge.arm.com>
Catalin Marinas schrieb:
> On Tue, 2009-07-14 at 12:13 +0200, Alexey Fisher wrote:
>> With this patch i have only 25 reports....
>> but i still have a lot of ext4 and some other reports.
>
> Apart from ext4, what are the other reports?
>
> Thanks.
>
this is complete trace from debug/kmemleak .
i will compile now latest linux-arm.org/linux-2.6.git
but i think i need step by step howto... it's really new for me.
unreferenced object 0xffff88013711c2a8 (size 64):
comm "swapper", pid 1, jiffies 4294892383
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff81263b41>] kzalloc+0xf/0x11
[<ffffffff8126416d>] acpi_add_single_object+0x5b0/0xd5a
[<ffffffff81264b32>] acpi_bus_scan+0x125/0x1af
[<ffffffff8176dcb7>] acpi_scan_init+0xc8/0xe9
[<ffffffff8176da72>] acpi_init+0x21f/0x265
[<ffffffff8100905b>] do_one_initcall+0x4b/0x190
[<ffffffff8174b6ef>] kernel_init+0x169/0x1bf
[<ffffffff8100c69a>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801349aa150 (size 96):
comm "swapper", pid 1, jiffies 4294892492
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811f815f>] new_inode_smack+0x2f/0xc0
[<ffffffff811f8215>] smack_inode_alloc_security+0x25/0x40
[<ffffffff811f0cdc>] security_inode_alloc+0x1c/0x20
[<ffffffff811135a5>] inode_init_always+0xc5/0x220
[<ffffffff8111372c>] alloc_inode+0x2c/0x50
[<ffffffff81113778>] new_inode+0x28/0xc0
[<ffffffff8111d581>] simple_fill_super+0x41/0x200
[<ffffffff811f8da5>] smk_fill_super+0x25/0x70
[<ffffffff81100ed8>] get_sb_single+0x98/0xc0
[<ffffffff811f8d73>] smk_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d14>] kern_mount_data+0x14/0x20
[<ffffffff817677d0>] init_smk_fs+0x3b/0x7b
unreferenced object 0xffff880133bf8540 (size 96):
comm "swapper", pid 1, jiffies 4294893530
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff8128b80c>] acpi_processor_register_performance+0x2ab/0x3eb
[<ffffffff8101fc51>] acpi_cpufreq_cpu_init+0xb1/0x500
[<ffffffff813b4004>] cpufreq_add_dev+0x154/0x650
[<ffffffff81300926>] sysdev_driver_register+0xa6/0x130
[<ffffffff813b3000>] cpufreq_register_driver+0x80/0x160
[<ffffffff81754348>] acpi_cpufreq_init+0x91/0xc7
[<ffffffff8100905b>] do_one_initcall+0x4b/0x190
[<ffffffff8174b6ef>] kernel_init+0x169/0x1bf
[<ffffffff8100c69a>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880133bf85e8 (size 96):
comm "swapper", pid 1, jiffies 4294893531
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff8128b80c>] acpi_processor_register_performance+0x2ab/0x3eb
[<ffffffff8101fc51>] acpi_cpufreq_cpu_init+0xb1/0x500
[<ffffffff813b4004>] cpufreq_add_dev+0x154/0x650
[<ffffffff81300926>] sysdev_driver_register+0xa6/0x130
[<ffffffff813b3000>] cpufreq_register_driver+0x80/0x160
[<ffffffff81754348>] acpi_cpufreq_init+0x91/0xc7
[<ffffffff8100905b>] do_one_initcall+0x4b/0x190
[<ffffffff8174b6ef>] kernel_init+0x169/0x1bf
[<ffffffff8100c69a>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132c48890 (size 1024):
comm "exe", pid 1612, jiffies 4294894130
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801335be738 (size 192):
comm "exe", pid 1612, jiffies 4294894130
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac708 (size 128):
comm "udevd", pid 1710, jiffies 4294894924
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac7d0 (size 128):
comm "udevd", pid 1710, jiffies 4294894924
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac898 (size 128):
comm "udevd", pid 1710, jiffies 4294894924
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac960 (size 128):
comm "udevd", pid 1710, jiffies 4294894924
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329aca28 (size 128):
comm "udevd", pid 1710, jiffies 4294894925
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329acaf0 (size 128):
comm "udevd", pid 1710, jiffies 4294894925
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329acbb8 (size 128):
comm "udevd", pid 1710, jiffies 4294894925
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ace10 (size 128):
comm "udevd", pid 1710, jiffies 4294894925
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
[<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88012f48d440 (size 64):
comm "mount", pid 2393, jiffies 4294896562
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132815158 (size 1024):
comm "mount", pid 2393, jiffies 4294896569
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801328159e8 (size 1024):
comm "mount", pid 2393, jiffies 4294896569
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132816b08 (size 1024):
comm "mount", pid 2393, jiffies 4294896569
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801328155a0 (size 1024):
comm "mount", pid 2393, jiffies 4294896569
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132812f18 (size 1024):
comm "mount", pid 2393, jiffies 4294896583
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132811568 (size 1024):
comm "mount", pid 2393, jiffies 4294896583
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132811120 (size 1024):
comm "mount", pid 2393, jiffies 4294896583
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132810cd8 (size 1024):
comm "mount", pid 2393, jiffies 4294896583
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132810890 (size 1024):
comm "mount", pid 2393, jiffies 4294896583
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132810448 (size 1024):
comm "mount", pid 2393, jiffies 4294896583
backtrace:
[<ffffffff810fbaca>] create_object+0x13a/0x2c0
[<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
[<ffffffff810f596b>] __kmalloc+0x11b/0x210
[<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
[<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
[<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
[<ffffffff81195413>] ext4_get_sb+0x13/0x20
[<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
[<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
[<ffffffff81118ee7>] do_mount+0x307/0x8b0
[<ffffffff8111951f>] sys_mount+0x8f/0xe0
[<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
next prev parent reply other threads:[~2009-07-14 10:37 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-07-14 6:08 60 memory leaks.. or is it some thing wrong with kmemleak? Alexey Fisher
2009-07-14 7:19 ` Pekka Enberg
2009-07-14 8:28 ` Alexey Fisher
2009-07-14 9:39 ` Catalin Marinas
2009-07-14 9:52 ` [PATCH] x86: _edata should include all .data.* sections on X86_64 Catalin Marinas
2009-07-14 10:13 ` Alexey Fisher
2009-07-14 10:31 ` Catalin Marinas
2009-07-14 10:37 ` Alexey Fisher [this message]
2009-07-14 12:26 ` ext4 memory leak (was Re: [PATCH] x86: _edata should include all .data.* sections on X86_64) Catalin Marinas
2009-07-15 8:03 ` Aneesh Kumar K.V
2009-07-15 8:54 ` Alexey Fisher
2009-07-18 11:55 ` Ingo Molnar
2009-07-18 13:30 ` Alexey Fisher
2009-07-18 22:44 ` Catalin Marinas
2009-07-18 22:33 ` Catalin Marinas
2009-07-15 10:33 ` Catalin Marinas
2009-07-14 12:42 ` [PATCH] x86: _edata should include all .data.* sections on X86_64 Catalin Marinas
2009-07-16 20:23 ` Sam Ravnborg
2009-07-18 12:06 ` [tip:x86/urgent] x86: Include all of .data.* sections in _edata on 64-bit tip-bot for Catalin Marinas
2009-07-18 20:29 ` [kmemleak] 60 wornings on sysfs_new_dirent+0x10c Alexey Fisher
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4A5C5FD0.3020204@fisher-privat.net \
--to=bug-track@fisher-privat.net \
--cc=catalin.marinas@arm.com \
--cc=kernel-testers@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@elte.hu \
--cc=penberg@cs.helsinki.fi \
--cc=sam@ravnborg.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox