lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 9 May 2012 09:27:28 +0300 (EEST)
From:	Pekka Enberg <penberg@...nel.org>
To:	Anbu Manikandan <canbumanikandan@...il.com>
cc:	Catalin Marinas <catalin.marinas@....com>,
	linux-kernel@...r.kernel.org
Subject: Re: Kmemleak feature

On Tue, 8 May 2012, Anbu Manikandan wrote:
> I am very much interested in learning about kmemleak feature in linux
> 3.0-RT kernel.
> I have already read the kmemleak document (Documentation/kmemleak.txt)
> provided in the kernel source.
> 
> Furthermore, I would like to understand the internal functionality of
> kmemleak source code.
> Could you please share some documents, links or presentations to
> understand the kmemleak internal functionality?

Catalin is the main author of kmemleak. I'm not aware of such 
presentations.

> One more thing, I have tried kmemleak test module in an ARM Target
> board(CortexA9 SMP Dual core Board) with 3.0-RT kernel and found that
> memory leak entries are not properly shown in
> sys/kernel/debug/kmemleak file.
> Instead of getting 25 memory leak entries in
> /sys/kernel/debug/kmemleak file, I have got only 5 memory leaks
> entries.
> May be the other memory leaks are called as false negatives as per the
> kmemleak document.
> Please suggest some way to overcome this problem.

I'm CC'ing LKML.

			Pekka
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ