Received: by 10.192.165.148 with SMTP id m20csp4818185imm; Tue, 24 Apr 2018 08:53:09 -0700 (PDT) X-Google-Smtp-Source: AIpwx48oKXNSw+YOlt1tvLgGWAdZ7CvYhNKIcr2nvwWw00X2XBLUyIuYuaTK+c/S7FnSEnzVP5aa X-Received: by 10.101.78.134 with SMTP id b6mr20231604pgs.392.1524585189142; Tue, 24 Apr 2018 08:53:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524585189; cv=none; d=google.com; s=arc-20160816; b=mPTyl0APnCOgbrVOH6WUC7HJbjNH/7rKkuGgS02QN/HR2AmDjHCYSWBMdTYvYEonCH MOij3+JwEVpGbQ0tRGL8YzrOyH/oPjYTRVqdrRnk8LazeOgzIZVYB4eWJ8iLeO6DTzUt ZPz3dDUqyP6A9Yq9R+qTbhNBAh/8jxp7NwpPxXMLhGjqZHEZ8decQ5hBYztH+UkZeEq4 5+jfoxkQcNwuLytrUsZHseP22OeBNMM+LxwyJGDKHqDLl7cAcGVzuYTneiCCH3AKE7fF Ks5wXNVetPGuUhenxGsKWWpeXxj/Okg4gZTz/l9AqwKbz97Ld5HYjDd6S4z5dQOxzed2 ax4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:openpgp :subject:from:to:arc-authentication-results; bh=zviQlojOibucRn/wue1ByaKJePYstVziK6wiHucdI2o=; b=DHKu1udAXBs6gcgPs5u43ZXWg9rRiuBm/A0uD2D3qC133FaAM2lyBaN8axLN/vULHR 5BbYH9i1mokfZLThrh5pFMcf28/UP6Z9YwLd6Gssx2RGas2BgihxFqeGdm5jDke8d7o2 meDhe9pUJxEd4eEZZWB8LxTPtlYCZ4D+Hm2r8xbEwCZeoZLMgrF5cz4x44YKTpeFIYBa QZ6h7H3jEgdptA429v9Gkxq+cRZFgn4TM/uaLi2ALtHZ5/1l5QNIEyOHnVXvSHgedyQb 6JUo4JhanB5bCS2K2/v/DoB1QSQLdNHCpeJo1Nk+ZrN8/fCFhoD30O4INGsJNmg9v9Li Mwng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s16si9015839pgv.596.2018.04.24.08.52.52; Tue, 24 Apr 2018 08:53:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751419AbeDXPvV (ORCPT + 99 others); Tue, 24 Apr 2018 11:51:21 -0400 Received: from david.siemens.de ([192.35.17.14]:47455 "EHLO david.siemens.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750779AbeDXPvT (ORCPT ); Tue, 24 Apr 2018 11:51:19 -0400 Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id w3OFpG9X011313 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 24 Apr 2018 17:51:16 +0200 Received: from [139.25.68.37] (md1q0hnc.ad001.siemens.net [139.25.68.37] (may be forged)) by mail2.siemens.de (8.15.2/8.15.2) with ESMTP id w3OFpFAM028071; Tue, 24 Apr 2018 17:51:16 +0200 To: Catalin Marinas , "linux-mm@kvack.org" , Linux Kernel Mailing List From: Jan Kiszka Subject: [PATCH] kmemleak: Report if we need to tune KMEMLEAK_EARLY_LOG_SIZE Openpgp: preference=signencrypt Message-ID: <288b0afc-bcc3-a2aa-2791-707e625d1da7@siemens.com> Date: Tue, 24 Apr 2018 17:51:15 +0200 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ...rather than just mysteriously disabling it. Signed-off-by: Jan Kiszka --- mm/kmemleak.c | 1 + 1 file changed, 1 insertion(+) diff --git a/mm/kmemleak.c b/mm/kmemleak.c index 9a085d525bbc..156c0c69cc5c 100644 --- a/mm/kmemleak.c +++ b/mm/kmemleak.c @@ -863,6 +863,7 @@ static void __init log_early(int op_type, const void *ptr, size_t size, if (crt_early_log >= ARRAY_SIZE(early_log)) { crt_early_log++; + pr_warn("Too many early logs\n"); kmemleak_disable(); return; } -- 2.13.6