Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp6023625ybn; Sun, 29 Sep 2019 10:40:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqwpx4pikKXOF9V/a/679YuIyCfW4zGA41eYePyhRuFfCdK2OeGBHs8OtnmwMPQiD+oSmsCn X-Received: by 2002:a50:c3c7:: with SMTP id i7mr15678358edf.138.1569778804325; Sun, 29 Sep 2019 10:40:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569778804; cv=none; d=google.com; s=arc-20160816; b=bYzeoEWZJfTJq8FhxRQ3uJwefhpfNJbHi0oW9n2ifuPYmNDOaNYP9c0t3QLQiukx5m JwRRkTxUSi71jsNo4V6Q3ASWMAycls3s0h2LK7wnWbOZ0+sgD2c2Y2gb3momrTpZ1Vdy 3yT2IPMF0R5P0AMqmpI8gSd7MYAMUOqdky55ROm2lfxA0ZMUPZ4axS5MMalxAstj7m2K 1a+tSAEj6IodRpCiiyeziawtfeAKOK8HwLhqA9ALgRM6P0WrW8YeR9M79uWfcnQUcgjs AUSZahfF+uJ3wLMq+7JTeDPwmxq97nUMoKzwbRfda2bWbae7s+FSqaEr2PAfS2e6t/S5 282Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=djUgL9w2BKG7lm1osRk3mIbihkJ+lpmT4jIm94bKuDU=; b=sJFASzcUEueTRyqwt8w1hIMbYG/nmaK6eO7rY2HtaMmikrq3bG1gudmomwPhKwkt4i +8m9XQqug7OpSzZ1HbCkAECHJZN2X7neUKhq5Xf9l9ntyoUOrbABmAteTvcNogaTgI1D P9TwJpPTTswCupeLCljeDJ8RnQaFPEjOYPwqtMLod/3991LzLQYcemJvzTa+mOd7WOjY wpQOMLQAz3QxCEJM4i8SzqEWwAOkk7ozdTlQGxm/xee8tcVdrlC42cqvjm1B4qY8tdqQ dCvEmiwXi5fLv5GEKWYQAoaWY8Wl261zh4YXAswVb9iRDm8+ltFh0FbVkcc4Os8ITgTh 86FA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="NWgCjjO/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a24si5808584ejg.127.2019.09.29.10.39.40; Sun, 29 Sep 2019 10:40:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="NWgCjjO/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729741AbfI2RjT (ORCPT + 99 others); Sun, 29 Sep 2019 13:39:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:47428 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729686AbfI2RfT (ORCPT ); Sun, 29 Sep 2019 13:35:19 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4A4AA21928; Sun, 29 Sep 2019 17:35:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569778519; bh=LbLyWpx1LAX4yaF3lZ06T0Ps5gzxnKDuVca7dt58IrQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NWgCjjO/LcOvy8KLBYfiT8INw7frChduEL2iZbQHmQkpdnuvFWBtm6TvM97nLrbga iGa1j2evFoYO7NVGtQqwTmVZ+PhdWCvF5Jb3ucJnm2ei+7Rkft8sBHdHx4dd/ZIzn0 HCgthJPQYdOkhw56/Rs5K0C4ol64GURczbr714g8= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Nicolas Boichat , Dmitry Vyukov , Catalin Marinas , Masahiro Yamada , Kees Cook , Petr Mladek , Thomas Gleixner , Tetsuo Handa , Joe Lawrence , Uladzislau Rezki , Andy Shevchenko , Stephen Rothwell , Andrey Ryabinin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH AUTOSEL 4.19 29/33] kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K Date: Sun, 29 Sep 2019 13:34:17 -0400 Message-Id: <20190929173424.9361-29-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190929173424.9361-1-sashal@kernel.org> References: <20190929173424.9361-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Boichat [ Upstream commit b751c52bb587ae66f773b15204ef7a147467f4c7 ] The current default value (400) is too low on many systems (e.g. some ARM64 platform takes up 1000+ entries). syzbot uses 16000 as default value, and has proved to be enough on beefy configurations, so let's pick that value. This consumes more RAM on boot (each entry is 160 bytes, so in total ~2.5MB of RAM), but the memory would later be freed (early_log is __initdata). Link: http://lkml.kernel.org/r/20190730154027.101525-1-drinkcat@chromium.org Signed-off-by: Nicolas Boichat Suggested-by: Dmitry Vyukov Acked-by: Catalin Marinas Acked-by: Dmitry Vyukov Cc: Masahiro Yamada Cc: Kees Cook Cc: Petr Mladek Cc: Thomas Gleixner Cc: Tetsuo Handa Cc: Joe Lawrence Cc: Uladzislau Rezki Cc: Andy Shevchenko Cc: Stephen Rothwell Cc: Andrey Ryabinin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/Kconfig.debug | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 3dea52f7be9c1..46a910acce3f0 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -570,7 +570,7 @@ config DEBUG_KMEMLEAK_EARLY_LOG_SIZE int "Maximum kmemleak early log entries" depends on DEBUG_KMEMLEAK range 200 40000 - default 400 + default 16000 help Kmemleak must track all the memory allocations to avoid reporting false positives. Since memory may be allocated or -- 2.20.1