Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2165773imm; Thu, 27 Sep 2018 08:24:53 -0700 (PDT) X-Google-Smtp-Source: ACcGV60SkSrmFVi/kFKH70OdVKR87h3lGQ+cu1U/jav3YPFivvaHLGE7pQJwEfqVVfDFQnlmWlnZ X-Received: by 2002:a17:902:4001:: with SMTP id b1-v6mr11615241pld.312.1538061893790; Thu, 27 Sep 2018 08:24:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538061893; cv=none; d=google.com; s=arc-20160816; b=C3J1XDpfRr+ULNh4dQqW13T1sC3PML7cHezP6mb+TeM7lGbMoKcjrmeCFgpA8nsopX /LhpQZcR6uIn0X2Cl6pgw/i31P47sFL7dFhQEB8dT9f6LrvFqssO9fLxpyjlC0QiHCnL FVE5pd5J6vJPnnvF9wU748zdeeGP7aJ+IuIMRGF0H8rOSjoCkLW31lOyLD+CsIhYgaBc ru1EvL4kEWHy8bKiV3w+j7veVpfAZNmnEg+8/TfaxjqaC5EECFo/s3XCrTL/tZm92fQm lEzvYt9olzTaRaA7tdHWe7M+iMSatdXH62SA44uH8XBJX4OG7TVWSs5yQVi/ciuefYzJ Ggcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:feedback-id:mime-version:user-agent :references:message-id:in-reply-to:subject:cc:to:from:date :dkim-signature; bh=y+nq5Gex4Qh5vzFCsIkNn2jzC0A7latWbQHbrlNUYvk=; b=WVGRkvJGjEfiJ6uZ+C5qZ2+9KBAz27Q4qXzVTNP3gLstvPEDInE/QONo1E/ofVguOR gYydThZR8PRxM8FyZ4uhvK4YTq7axTcyORpivufWSEQJaaozCDjLclte0SrFL0+D9sah odGyvW9Rw42Z5tc4vaJYybj4l/6na27FV0h+wHG6iTDTRAw/kAMoj5gphXNPGqQXQhc6 Z7QUPh9d6G1kgSS9CTWZPYkGs/0zzs9K3XAUtbOW96dmqkuMglRMcakE5FYc2LBbJvMl LnoaM9O31leJnPFRGIBc7hqwxgj6X/NLu1Nm2COymRvY43ByuVXeJ9kyeG1Umj4C2Hdi V6Xw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazonses.com header.s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug header.b="Yq/1lsZf"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ce15-v6si2490793plb.391.2018.09.27.08.24.37; Thu, 27 Sep 2018 08:24:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazonses.com header.s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug header.b="Yq/1lsZf"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728167AbeI0VlH (ORCPT + 99 others); Thu, 27 Sep 2018 17:41:07 -0400 Received: from a9-114.smtp-out.amazonses.com ([54.240.9.114]:44240 "EHLO a9-114.smtp-out.amazonses.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727318AbeI0VlH (ORCPT ); Thu, 27 Sep 2018 17:41:07 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1538061741; h=Date:From:To:cc:Subject:In-Reply-To:Message-ID:References:MIME-Version:Content-Type:Feedback-ID; bh=y+nq5Gex4Qh5vzFCsIkNn2jzC0A7latWbQHbrlNUYvk=; b=Yq/1lsZfoNWy0ub9TsbAOYWNjgR3m7Es3uWowwX1UbVivG/0EaVNFMLT+9aKqyjb RdezOHcfBeMPsw/UPiXwDm1Qg6heyDk8Ij2JYhv+RcxouEAcmfi6R7wpSn/VN8srdmA HHH77cdTEY5PqYwlOkWEJ0UF/kZfPRnNp5RcBRAk= Date: Thu, 27 Sep 2018 15:22:21 +0000 From: Christopher Lameter X-X-Sender: cl@nuc-kabylake To: Dmitry Vyukov cc: Dmitry Torokhov , syzbot+87829a10073277282ad1@syzkaller.appspotmail.com, Pekka Enberg , "linux-input@vger.kernel.org" , lkml , Henrik Rydberg , syzkaller-bugs , Linux-MM Subject: Re: WARNING: kmalloc bug in input_mt_init_slots In-Reply-To: Message-ID: <010001661b9fad1d-cdbfabdb-5553-446f-bcde-585e42837415-000000@email.amazonses.com> References: <000000000000e5f76c057664e73d@google.com> <010001660c1fafb2-6d0dc7e1-d898-4589-874c-1be1af94e22d-000000@email.amazonses.com> <010001660c4a8bbe-91200766-00df-48bd-bc60-a03da2ccdb7d-000000@email.amazonses.com> <20180924184158.GA156847@dtor-ws> <01000166110bb882-0b1fa048-fe1c-4139-a1ba-702754bbc267-000000@email.amazonses.com> <010001661b631a3e-f398fc0a-127c-4c6e-b6ca-b2bd63bc4a9a-000000@email.amazonses.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-SES-Outgoing: 2018.09.27-54.240.9.114 Feedback-ID: 1.us-east-1.fQZZZ0Xtj2+TD7V5apTT/NrT6QKuPgzCT/IC7XYgDKI=:AmazonSES Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 27 Sep 2018, Dmitry Vyukov wrote: > On Thu, Sep 27, 2018 at 4:16 PM, Christopher Lameter wrote: > > On Thu, 27 Sep 2018, Dmitry Vyukov wrote: > > > >> On Tue, Sep 25, 2018 at 4:04 PM, Christopher Lameter wrote: > >> > On Tue, 25 Sep 2018, Dmitry Vyukov wrote: > >> > > >> >> Assuming that the size is large enough to fail in all allocators, is > >> >> this warning still useful? How? Should we remove it? > >> > > >> > Remove it. It does not make sense because we check earlier if possible > >> > without the warn. > >> > >> Mailed "mm: don't warn about large allocations for slab" to remove the warning. > >> > > > > Hoe it arrives here at some point. > > It's here: > https://lore.kernel.org/patchwork/patch/992660/ > Please post on the mailing list and NAK to the patch. Testing against KMALLOC_MAX_CACHE_SIZE is not ok.