Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3389024ybp; Sun, 6 Oct 2019 10:51:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqz/WPH6dB6IWfQGwE8HEFEoZepC1TFv41Zl4AIUE6255hVukCmDcI0v0SrEa3fwKWYxMqct X-Received: by 2002:aa7:d844:: with SMTP id f4mr23107993eds.269.1570384285511; Sun, 06 Oct 2019 10:51:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570384285; cv=none; d=google.com; s=arc-20160816; b=T5DbKCEFvwd8bF02BPHiY+B6YSHA+8jzEEkdqGcmo18OlnzNqSoCSVJLZGTfhI0ych r74pah2eKHq9Pz3loNUlRkJc1C4tyBsRy/3gcIZOkx39WxrtBtR40fsu5Z11VSyvyISS 0Tr7cXIGFP1R8hxg6SgGLF4PmiOqBG0UCInm/zGHhNqNd75M98R8uK0CxdmuAQfuctWT AY9n8kIOhcSSNxk7jVOyChzCnRzNaXylCiPU/55hoOC8PIpa2+pwMa5uf+orjqxqIgf2 /6EF2ql+VWrzKulVktfzU8HegVg505M9qJ86s9AUVJGCFSkaZYHbHrJlaj6GXe+e2LEN V4jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yNFS8OFO6qubvF/OdZrc1xC3dJuklaErCtu87MQjnLw=; b=IMk2UW40FUnYRG0a0+zhI0O91I0Fuf01mVeq4dWAPJ/vI7wMS1pcy+syqnqmY/q/mj MZecEkQoApirVU0MXNJ3jwRn1CisdVqH0Qzypokg+jwaIsOMcULKn7AtN5InxutM8+Cr SBFLKLOaqayYr4l/BLaMWXqmBLxVs2M3+fJ0HZwKMbHcrSe4pKJdeyLM+hiH+riOMMeC zZB5ubG3daO21liLvovRDy7bDmzpFlBWC8Mp2QzQS3tsUYuzhRD7e+yBklJbdCjNl+fc VoRpchkRcrII6gUJjfdu8RDUA8Qc2mO457lTMUj/0AqU413+1JqfIgbrrh8420pjJutw XmFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kg3YjmHO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id oq24si5945155ejb.202.2019.10.06.10.51.01; Sun, 06 Oct 2019 10:51:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kg3YjmHO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728164AbfJFRoa (ORCPT + 99 others); Sun, 6 Oct 2019 13:44:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:44672 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731118AbfJFRo3 (ORCPT ); Sun, 6 Oct 2019 13:44:29 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9BF1A20862; Sun, 6 Oct 2019 17:44:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383868; bh=2phXe2I4hy0lD35uuWJUDpgHRLdxGNb60n5qMD4KcjA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kg3YjmHOo6rwozGKKi5O1A9td5HpKjJG/eMmhfD9fEInPGeKPoK4p/D7kSAdZnMzZ lAiit5tftEO982oWBdmbfyedAqnh0ZFMZhFxDz4x2i0qoV+u2t93sCNaJhHKXXpc/V l1JNpUhLChhmWFtmpDPGulf0Bg0ib+UII78QXjXc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolas Boichat , Dmitry Vyukov , Catalin Marinas , Masahiro Yamada , Kees Cook , Petr Mladek , Thomas Gleixner , Tetsuo Handa , Joe Lawrence , Uladzislau Rezki , Andy Shevchenko , Stephen Rothwell , Andrey Ryabinin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.3 123/166] kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K Date: Sun, 6 Oct 2019 19:21:29 +0200 Message-Id: <20191006171223.673618193@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171212.850660298@linuxfoundation.org> References: <20191006171212.850660298@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Boichat [ Upstream commit b751c52bb587ae66f773b15204ef7a147467f4c7 ] The current default value (400) is too low on many systems (e.g. some ARM64 platform takes up 1000+ entries). syzbot uses 16000 as default value, and has proved to be enough on beefy configurations, so let's pick that value. This consumes more RAM on boot (each entry is 160 bytes, so in total ~2.5MB of RAM), but the memory would later be freed (early_log is __initdata). Link: http://lkml.kernel.org/r/20190730154027.101525-1-drinkcat@chromium.org Signed-off-by: Nicolas Boichat Suggested-by: Dmitry Vyukov Acked-by: Catalin Marinas Acked-by: Dmitry Vyukov Cc: Masahiro Yamada Cc: Kees Cook Cc: Petr Mladek Cc: Thomas Gleixner Cc: Tetsuo Handa Cc: Joe Lawrence Cc: Uladzislau Rezki Cc: Andy Shevchenko Cc: Stephen Rothwell Cc: Andrey Ryabinin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/Kconfig.debug | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 5960e2980a8a0..4d39540011e2e 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -596,7 +596,7 @@ config DEBUG_KMEMLEAK_EARLY_LOG_SIZE int "Maximum kmemleak early log entries" depends on DEBUG_KMEMLEAK range 200 40000 - default 400 + default 16000 help Kmemleak must track all the memory allocations to avoid reporting false positives. Since memory may be allocated or -- 2.20.1