Received: by 10.192.165.148 with SMTP id m20csp4821656imm; Tue, 24 Apr 2018 08:56:34 -0700 (PDT) X-Google-Smtp-Source: AIpwx48+toIGqUDbG8NdXEZ5kkBPsTC/rv2UmO3S6ZFrRXQjKO1KfkbLGLJSXf+SLwYpzRGWWY6G X-Received: by 2002:a17:902:5801:: with SMTP id m1-v6mr25819803pli.325.1524585394855; Tue, 24 Apr 2018 08:56:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524585394; cv=none; d=google.com; s=arc-20160816; b=sJoa49xqadX4pW9faoy/wybZeVBF96r4E6MfxB1M7Yhy0TCLdTpPy87p14DSqZubUt vVrQIckPk/YnXtWdnrmltdLTLcga1qmARs0HI0zvj2TQMEVs9a+xuANsHEHrPVPNzqV+ Q0aVLkxXdTmUcHD2zjgsSvg73nHzV7W0+gfaKgDV1wx5hFz+ultrARWO5NlgmJ1EBee7 viHf6/FqvLwmTRz6jwK4TiSL7wBpFuLkRsDpdXc6w6OxyOlUL4JiPiQy+b5jIb7w80zq HnR/ocefuR+PLqFa8cQ1zO/ffcfWLZgGE7Bmu/c9BrDFmhlYBH/BLSFldrHHiez9tfSH 4ufQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=4JiNT114htYka7qHxE+Yb6PVr5iqxWVdJQjTNQaOcpY=; b=tsYindtobhpVgRzbrtP93QbaiE02pM3SVHGOL/4kH8uM6XLH3D5c6LkegcwAhYNT3q jd03iECgbtLOSgN2+QaH0YPFyOeFFNnaIYNNXv0nLnp/i+u8XQNut47LUgAKCcTaLjVo s3POMCU2yQBpeV6IFFrCr66Am+yD9PQvxJ+34Y93jEtcqdJ2bLQ89xYg+g64AI8Uz+VS 9VkevzP1UUwXB0GfimhhmUYce49g0IlnGz3V5bgAzUpS3cs2RRN8xDAyXTVdNjP2Ph4V Ot7UoDdP14Mcdvuf+tJTN4i82mEAWriSgcTcwaCYE2CRwCfIUyvcQaWzLLNkGDVagHpK YLVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a23si8661977pgv.429.2018.04.24.08.56.19; Tue, 24 Apr 2018 08:56:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751231AbeDXPzL (ORCPT + 99 others); Tue, 24 Apr 2018 11:55:11 -0400 Received: from foss.arm.com ([217.140.101.70]:55886 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750757AbeDXPzJ (ORCPT ); Tue, 24 Apr 2018 11:55:09 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B3D001435; Tue, 24 Apr 2018 08:55:08 -0700 (PDT) Received: from armageddon.cambridge.arm.com (armageddon.cambridge.arm.com [10.1.206.84]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EC7BB3F25D; Tue, 24 Apr 2018 08:55:07 -0700 (PDT) Date: Tue, 24 Apr 2018 16:55:05 +0100 From: Catalin Marinas To: Jan Kiszka Cc: "linux-mm@kvack.org" , Linux Kernel Mailing List Subject: Re: [PATCH] kmemleak: Report if we need to tune KMEMLEAK_EARLY_LOG_SIZE Message-ID: <20180424155504.frbxmzq4dw3veudu@armageddon.cambridge.arm.com> References: <288b0afc-bcc3-a2aa-2791-707e625d1da7@siemens.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <288b0afc-bcc3-a2aa-2791-707e625d1da7@siemens.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 24, 2018 at 05:51:15PM +0200, Jan Kiszka wrote: > ...rather than just mysteriously disabling it. > > Signed-off-by: Jan Kiszka > --- > mm/kmemleak.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/mm/kmemleak.c b/mm/kmemleak.c > index 9a085d525bbc..156c0c69cc5c 100644 > --- a/mm/kmemleak.c > +++ b/mm/kmemleak.c > @@ -863,6 +863,7 @@ static void __init log_early(int op_type, const void *ptr, size_t size, > > if (crt_early_log >= ARRAY_SIZE(early_log)) { > crt_early_log++; > + pr_warn("Too many early logs\n"); That's already printed, though later where we have an idea of how big the early log needs to be: if (crt_early_log > ARRAY_SIZE(early_log)) pr_warn("Early log buffer exceeded (%d), please increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE\n", crt_early_log); -- Catalin