Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3380657ybp; Sun, 6 Oct 2019 10:40:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqzaanANcZrtFw//ZXjSlTNjSeIUW3yy2nQhN+nscQcpBaHKLRbCNE9V58BRzQy8u4nQFbAc X-Received: by 2002:a17:906:af57:: with SMTP id ly23mr20883836ejb.269.1570383603378; Sun, 06 Oct 2019 10:40:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570383603; cv=none; d=google.com; s=arc-20160816; b=WHKnLazXMs4ZsZTm1Yfp928S7pyRr0FOokoupbcbgY313/1U8T7+ybrXvjWratFs+y ns3S60xtXtnVQnTIiU8dtb94jhk1C/Op855RwdcPkdpf1F1Qb/YNG5+QR2I2wFVivzqk o5pFR+j7CQG0Vn2E2i1OzBApvbCq90y4UwsLjw1B4WCw7ECotpkXEL5NecrvPnIEzICD 6TBw/+mUbLarXIWwwidBBzxffI0rU1jnxk1uib6htjFWiRAcJ01ua2ZP6ZsOhsXXDlYJ Euy/3tv/dmGn8lhGe7tE0AaBeCQq7uNgOfulbeaK8IB0CTKnee5hOKLaP9TvKHs71zr4 sJ6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=QTHHYFs7qng6xnnC1xByF4Lah53RsJ7T2zilg7EgZoY=; b=UleeB7WEuCVL88fjwJK3AndJbiwaINYEf1Ldra1qzWXyDEgH6Om4WeBBCsbVul6S4E 3j3lymGbnIepuSvbTVfz2c4W0OTeDzLaqTNpGZce5GHAER/o1CRzqudcgNqqNACmdRFm K4mOrvGpsKWpugSllqWySF+sstviELXAcFuf0b98wK5NwqgpjcilTCFH1P7fuOVDqoIw rtNpzfP6QGGYGsbSwz4k0GW3SGQ/6WOJlBPJ3tsC2DZbf2J0WxvzzBASRbxIGwC/7jol o55J4NxCtcnyJ0rFLKuYvsFgLE2HsdBV+yo5EEOLdNyXzr8b+Ncx6/jYCDwL7VmxcWDR RvPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n2tIN4L4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id oc20si5767383ejb.260.2019.10.06.10.39.39; Sun, 06 Oct 2019 10:40:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n2tIN4L4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730587AbfJFRiT (ORCPT + 99 others); Sun, 6 Oct 2019 13:38:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:37476 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729990AbfJFRiR (ORCPT ); Sun, 6 Oct 2019 13:38:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F01CF2053B; Sun, 6 Oct 2019 17:38:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383497; bh=BU1jzN53PqmlJ8ONEqVVq43OmhXY/UNCrwZY04OTspg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n2tIN4L4M8k6dtm1jwsfa+HkDKcU2rBNY05US2HCqQRAmIpM9HFLcGC2sA+b2DZnE 50dmpTClZfq/mZM6G0eLgKjjm1TfaY6r1mBd73zlhi1GsbPTzVZHIrU6DvUH0f/ghW DRpjjs/ZZcsSzQL4twg7no9GiG9vcc5m5Q/gBzug= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolas Boichat , Dmitry Vyukov , Catalin Marinas , Masahiro Yamada , Kees Cook , Petr Mladek , Thomas Gleixner , Tetsuo Handa , Joe Lawrence , Uladzislau Rezki , Andy Shevchenko , Stephen Rothwell , Andrey Ryabinin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.2 124/137] kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K Date: Sun, 6 Oct 2019 19:21:48 +0200 Message-Id: <20191006171219.630329117@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171209.403038733@linuxfoundation.org> References: <20191006171209.403038733@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Boichat [ Upstream commit b751c52bb587ae66f773b15204ef7a147467f4c7 ] The current default value (400) is too low on many systems (e.g. some ARM64 platform takes up 1000+ entries). syzbot uses 16000 as default value, and has proved to be enough on beefy configurations, so let's pick that value. This consumes more RAM on boot (each entry is 160 bytes, so in total ~2.5MB of RAM), but the memory would later be freed (early_log is __initdata). Link: http://lkml.kernel.org/r/20190730154027.101525-1-drinkcat@chromium.org Signed-off-by: Nicolas Boichat Suggested-by: Dmitry Vyukov Acked-by: Catalin Marinas Acked-by: Dmitry Vyukov Cc: Masahiro Yamada Cc: Kees Cook Cc: Petr Mladek Cc: Thomas Gleixner Cc: Tetsuo Handa Cc: Joe Lawrence Cc: Uladzislau Rezki Cc: Andy Shevchenko Cc: Stephen Rothwell Cc: Andrey Ryabinin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/Kconfig.debug | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index cbdfae3798965..120ec6f64bbc3 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -599,7 +599,7 @@ config DEBUG_KMEMLEAK_EARLY_LOG_SIZE int "Maximum kmemleak early log entries" depends on DEBUG_KMEMLEAK range 200 40000 - default 400 + default 16000 help Kmemleak must track all the memory allocations to avoid reporting false positives. Since memory may be allocated or -- 2.20.1