Received: by 10.192.165.148 with SMTP id m20csp4841001imm; Tue, 24 Apr 2018 09:12:14 -0700 (PDT) X-Google-Smtp-Source: AIpwx49OhMQL53S3jPadtEJrXpeeRS4kC6CUlRJKoQu/3x+hmZX8fFe/ru0N5Xkm5cOQvgedUGrh X-Received: by 10.98.219.5 with SMTP id f5mr15710212pfg.137.1524586334498; Tue, 24 Apr 2018 09:12:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524586334; cv=none; d=google.com; s=arc-20160816; b=ckfZ1IG3ueKkPpgDHrMnu54f+bTrHT6Y9s4+zJ89Wya7TToUCTW8ixec9lVcD0mTPz 3OibT/bYX8fCpME1y5Qh2ZOmiT9eVNABUfkmuMPEp2C/O7lYV88LHXfbO8H7bt3zJhTR 010mmWwIr9utQAz/lQ0AtsVjz1TweAYEj5aUPxmhoq3R2g2AtKHvJKSxW8m4Wlwr8QwY 9eFZtFdoCkcbqtw0I1JCAPcu6XdRPKgh2MLeXVV89gnxXA7E0Cngy2XWkoZ8EZcVetOb 4P2RPdsyf5NE9thVWwwwJpQwV2wELdMH/9Ir2u/dzG2eDu4qhz1d1gMYtHqB+3rGKFUe Fe7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject :arc-authentication-results; bh=T2PpRhRsehXEEDKJ8wbKidw1u2fhALOnyGwj0rOhS2c=; b=w1wAVmcIe7uh/4YstuuswC31WJ0ocjT8rZhekaUAgH4K5uAcP4l2Y4fhv1czrrCUX6 P6d5dp2cQR/WO+71PYMb3UEXtT1T9sRU8WM8YdndgKjC/q0I0fRHCPnonz6SMEHv6Z30 ap0UBFyH9pIRISoDZukZl1hKVKJi1pwQi5d7WiOEGPXWevRbAUb2/gLcd7h4o1Pi//mZ q1DuiW0+hm2krP3Lo2qKMaO44hcZwGKmyY+MnJR6onWv/A01bO0TDvQGUp/+1N7+1QZd vSHRp5RKY1HjolekiQGsk7b7Pg4+Bad4AR6q1PXC1j6LBasTTKAge8wMhBLfki1sJPrz olnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1-v6si1284667pln.445.2018.04.24.09.12.00; Tue, 24 Apr 2018 09:12:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751420AbeDXQKU (ORCPT + 99 others); Tue, 24 Apr 2018 12:10:20 -0400 Received: from thoth.sbs.de ([192.35.17.2]:52275 "EHLO thoth.sbs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750938AbeDXQKT (ORCPT ); Tue, 24 Apr 2018 12:10:19 -0400 Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id w3OGAFi4002962 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 24 Apr 2018 18:10:15 +0200 Received: from [139.25.68.37] (md1q0hnc.ad001.siemens.net [139.25.68.37] (may be forged)) by mail2.siemens.de (8.15.2/8.15.2) with ESMTP id w3OGAFRn011368; Tue, 24 Apr 2018 18:10:15 +0200 Subject: Re: [PATCH] kmemleak: Report if we need to tune KMEMLEAK_EARLY_LOG_SIZE To: Catalin Marinas Cc: "linux-mm@kvack.org" , Linux Kernel Mailing List References: <288b0afc-bcc3-a2aa-2791-707e625d1da7@siemens.com> <20180424155504.frbxmzq4dw3veudu@armageddon.cambridge.arm.com> From: Jan Kiszka Openpgp: preference=signencrypt Message-ID: Date: Tue, 24 Apr 2018 18:10:14 +0200 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 In-Reply-To: <20180424155504.frbxmzq4dw3veudu@armageddon.cambridge.arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-04-24 17:55, Catalin Marinas wrote: > On Tue, Apr 24, 2018 at 05:51:15PM +0200, Jan Kiszka wrote: >> ...rather than just mysteriously disabling it. >> >> Signed-off-by: Jan Kiszka >> --- >> mm/kmemleak.c | 1 + >> 1 file changed, 1 insertion(+) >> >> diff --git a/mm/kmemleak.c b/mm/kmemleak.c >> index 9a085d525bbc..156c0c69cc5c 100644 >> --- a/mm/kmemleak.c >> +++ b/mm/kmemleak.c >> @@ -863,6 +863,7 @@ static void __init log_early(int op_type, const void *ptr, size_t size, >> >> if (crt_early_log >= ARRAY_SIZE(early_log)) { >> crt_early_log++; >> + pr_warn("Too many early logs\n"); > > That's already printed, though later where we have an idea of how big the early > log needs to be: > > if (crt_early_log > ARRAY_SIZE(early_log)) > pr_warn("Early log buffer exceeded (%d), please increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE\n", > crt_early_log); > Well, that's good, but where you read "detector disabled", there is no hint on that. I missed that because subsystems tend to not do any further actions after telling they are off. BTW, my system (virtual ARM64 target) required 26035 entries, which is a few orders of magnitude above the default and pretty close the the limit. What's causing this? Other debug options? Jan -- Siemens AG, Corporate Technology, CT RDA IOT SES-DE Corporate Competence Center Embedded Linux