Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1814467ybn; Thu, 26 Sep 2019 02:37:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqz5sShM5AwAIfwy/N00te+SvqLkzQxFfuMuHO/DYAXPe9yY+VWAILb45KKnUdsbGxBQkfkp X-Received: by 2002:a17:906:1542:: with SMTP id c2mr2138451ejd.120.1569490640129; Thu, 26 Sep 2019 02:37:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569490640; cv=none; d=google.com; s=arc-20160816; b=g7HfueX1VzTSDQU2/P4yXTBBS40eR/pcIBpHveTnYYB6VisKaDp7a9WAB/5g9RiO6b CZ+wyagnd+3GLC12J3RZiaVYK+rIH4hqVPA+Cbl0x7IrkLLnHKB8rSqEM8V1cb7vyXrA Wgx1/1S00hZigvdbucbivA5SrxH5o2FR7icArIA8iWtVQTq2keBM6kc9hbJKknlp7ynj Lc2UAxG9Tj6t9ndw3uZ1o/1FW4seMbigaY1s3Ubw0F7SCk8XfHniSFmDYATH9u56sQOg PiOAUEjN4YunK1qczhHq+a64SBrGSqhqwbZCmFOD25iOLlQVWVFmZVuzjPbWTHsZl2Mc kbTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=buV8D8CUfYS91bafKWI6d5AWOw4/TAITNh6s6Q4KAog=; b=PDs5Oqds/kAsUlkJppXCPE333O9ASwdd+8lAvy0Nfyhax9fQCluqffXooQUU89oWrC 6QwGEpwxwfdzcl+9DkeufWYIpJkIE5ZAyuaJO1yAuT/3HO04GQb43wVR/yA3r0X88l7J XCkLD2U8g+g7kuzqpNKTelR8slfvg4u10AXLjxCI0mAmcbw8ptwmpY82EP2J+SIgewoc dLLomcmNAHYY165ToZ1ZpR5RzrNNJt9By+dzNe35LG5zhG4KOXsMAPrjyXi0xDFz7Gw5 qBNeosIHY5YdahI+oY0i1kdbpdF0urBs4HiOTtCB3v5C4si+6vQTzcML+jsQVMar1VWS pB0g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64si1172764edf.34.2019.09.26.02.36.57; Thu, 26 Sep 2019 02:37:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437185AbfIYObV (ORCPT + 99 others); Wed, 25 Sep 2019 10:31:21 -0400 Received: from mx1.redhat.com ([209.132.183.28]:38402 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437147AbfIYObU (ORCPT ); Wed, 25 Sep 2019 10:31:20 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6D35B3C928; Wed, 25 Sep 2019 14:31:20 +0000 (UTC) Received: from builder (ovpn-121-117.rdu2.redhat.com [10.10.121.117]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 46D035C21F; Wed, 25 Sep 2019 14:31:20 +0000 (UTC) Received: from builder.jcline.org.com (localhost [IPv6:::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by builder (Postfix) with ESMTPS id 50B2EEA72E7; Wed, 25 Sep 2019 14:31:19 +0000 (UTC) From: Jeremy Cline To: Catalin Marinas , Jonathan Corbet Cc: linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Jeremy Cline Subject: [PATCH] docs: kmemleak: DEBUG_KMEMLEAK_EARLY_LOG_SIZE changed names Date: Wed, 25 Sep 2019 14:31:14 +0000 Message-Id: <20190925143114.19698-1-jcline@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Wed, 25 Sep 2019 14:31:20 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit c5665868183f ("mm: kmemleak: use the memory pool for early allocations") renamed CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE to CONFIG_DEBUG_KMEMLEAK_MEM_POOL_SIZE. Update the documentation reference to reflect that. Signed-off-by: Jeremy Cline --- Documentation/dev-tools/kmemleak.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/dev-tools/kmemleak.rst b/Documentation/dev-tools/kmemleak.rst index 3621cd5e1eef..3a289e8a1d12 100644 --- a/Documentation/dev-tools/kmemleak.rst +++ b/Documentation/dev-tools/kmemleak.rst @@ -69,7 +69,7 @@ the kernel command line. Memory may be allocated or freed before kmemleak is initialised and these actions are stored in an early log buffer. The size of this buffer -is configured via the CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE option. +is configured via the CONFIG_DEBUG_KMEMLEAK_MEM_POOL_SIZE option. If CONFIG_DEBUG_KMEMLEAK_DEFAULT_OFF are enabled, the kmemleak is disabled by default. Passing ``kmemleak=on`` on the kernel command -- 2.21.0