Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3376856ybp; Sun, 6 Oct 2019 10:35:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxQgMmtXJlPJMsbdD315E0QacTepeKakFMmWuPk9OI5/GoRoR0pLKakUtf6iqB0FYSN3uDr X-Received: by 2002:aa7:d9d2:: with SMTP id v18mr25385970eds.177.1570383310655; Sun, 06 Oct 2019 10:35:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570383310; cv=none; d=google.com; s=arc-20160816; b=A5M/QqwMogL29afxCapjJIey/C8iyjiXdyNJFIrxeNwWu6iCmpDRGxy6FMjoHeR2X7 OQakuF/VB3btzNWXjtc3kBZu8FRj+GVKL3N9mQ4WOxla/Fgbz7PyXE9FXKJMqRLUqx9K QmvVdcXneiz7RQsJQRl8sZFs0sGRFjOCTpx7ph6wqiT4NaFqdu86bvU4u6NHeD8JZXBD 4UXmmTvXjilcZ/tA96bWBnDbHK0TRse7QcuM2wJfXGipjP/w0NWNTzVwfz16fPb73IeL kofhc0dUBek1KNCA2TEeIdOcO0BRWkoB0GxLwPN2wOeDOAxnqMQ3QBRC43ulXlz4pSJh 4PGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=djUgL9w2BKG7lm1osRk3mIbihkJ+lpmT4jIm94bKuDU=; b=IlHblQmKlI3eZdTw7+9BP/EDTPw14RZzHBelZzpB+w0v8H4BzwDJF6fYxu1JT3VoF2 O/6U/CANFBKqcPGAgqtYSj+NrEvKnOfma2Ii6hZB1HWY3NGNAwmxSK6pCpkRHdAY66RC 6675SGNKDtXWm7UOisaqM1GFs9ONE1gwUdDX8ZDWkNHumRqpfAdr15khoTbW3/U7z+Vd cUAb0JQ8uPq6Jq0TmdNzrQeTQI5nZr2Yd4fomzHX4JbRGUoP7h9OZpmzA8aXiMFQbTrW BKVPSL4QkU4mnDln+tvp1t88xLCeU9uqj/cAxmaVNi1TTJXmkqYwTCEpQ7Idg16J5lpq ofxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XBlnZwn8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y8si7681953edd.355.2019.10.06.10.34.47; Sun, 06 Oct 2019 10:35:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XBlnZwn8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729379AbfJFRbM (ORCPT + 99 others); Sun, 6 Oct 2019 13:31:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:57224 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729364AbfJFRbI (ORCPT ); Sun, 6 Oct 2019 13:31:08 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1DB272087E; Sun, 6 Oct 2019 17:31:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383067; bh=LbLyWpx1LAX4yaF3lZ06T0Ps5gzxnKDuVca7dt58IrQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XBlnZwn8onX23s8gMAgMCKPAQytdDtIkuYP4CQgQqE3T5oV+hSJbaAPT4RfbxX4We 9QLOhwX7Q3TW1oZDW2Y63pH1IfLdJw5W+BiX5hE216w9clWMeSTdthOR+zJw9d38dH ju/AGppFHxzsmsGyPuPZSHYBoltuIE9+1YbLi2vw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolas Boichat , Dmitry Vyukov , Catalin Marinas , Masahiro Yamada , Kees Cook , Petr Mladek , Thomas Gleixner , Tetsuo Handa , Joe Lawrence , Uladzislau Rezki , Andy Shevchenko , Stephen Rothwell , Andrey Ryabinin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.19 073/106] kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K Date: Sun, 6 Oct 2019 19:21:19 +0200 Message-Id: <20191006171153.881465237@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171124.641144086@linuxfoundation.org> References: <20191006171124.641144086@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Boichat [ Upstream commit b751c52bb587ae66f773b15204ef7a147467f4c7 ] The current default value (400) is too low on many systems (e.g. some ARM64 platform takes up 1000+ entries). syzbot uses 16000 as default value, and has proved to be enough on beefy configurations, so let's pick that value. This consumes more RAM on boot (each entry is 160 bytes, so in total ~2.5MB of RAM), but the memory would later be freed (early_log is __initdata). Link: http://lkml.kernel.org/r/20190730154027.101525-1-drinkcat@chromium.org Signed-off-by: Nicolas Boichat Suggested-by: Dmitry Vyukov Acked-by: Catalin Marinas Acked-by: Dmitry Vyukov Cc: Masahiro Yamada Cc: Kees Cook Cc: Petr Mladek Cc: Thomas Gleixner Cc: Tetsuo Handa Cc: Joe Lawrence Cc: Uladzislau Rezki Cc: Andy Shevchenko Cc: Stephen Rothwell Cc: Andrey Ryabinin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/Kconfig.debug | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 3dea52f7be9c1..46a910acce3f0 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -570,7 +570,7 @@ config DEBUG_KMEMLEAK_EARLY_LOG_SIZE int "Maximum kmemleak early log entries" depends on DEBUG_KMEMLEAK range 200 40000 - default 400 + default 16000 help Kmemleak must track all the memory allocations to avoid reporting false positives. Since memory may be allocated or -- 2.20.1