Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3399505ybp; Sun, 6 Oct 2019 11:04:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZcvsmyjLovLRkpJsiO61izFkrUDC9zQiryvuNp07CFDFLBamdGoqg4j8lSDNW+1XeCo3f X-Received: by 2002:a50:ab58:: with SMTP id t24mr25491520edc.131.1570385089071; Sun, 06 Oct 2019 11:04:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570385089; cv=none; d=google.com; s=arc-20160816; b=TzP555oVUta1Vch58JFOTFdxIwSSCemKXKEF6H88AGUtEBI9bdFdRRZ2hiTQwxPtk0 jSxmjATLUJzIA4p6jaKeJxi72ouyyFp6wtZOxa9M/2l1phVlQF+rtKii03w5jJSEoKLh iV0dLiaDhPRQjAeh9kS5+AYmNdbeGgWZ1jlN+/FNAUukkrHoTAbroVq25TI/bj4WhKSU NCTy62/2EkSSqF+ikmDNrk8NvQG+VnhPA6JgXYWX+k3EI+Mmx4i+8OByptPdGlq7ZXbM 0g6Ep/PTIYFFR4lEIB50h8XSxd2JRP+nWHThMpD2gYjp7lSCU7vpqlRifBqUAVeov0nz +ahA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3WkS1QgHKiVYEtkpU75fPlAVsx5yK+LDL2XR5Xyw3yw=; b=PtQ19iDCzrsMni4F+RC398tR60cJxnj4WgBxIvlOgdiBNKyTXBCtPLhTxv6+Yu6s/u iHl9wrudL4kmrFWh3m+8/fOe2Q8vB2Z786wQIQL42a/EAScg/9yNy8QS8G+C1CmUmj+D dmrMSetPjcWWDZZcT31sImtQiwtt1n0HAxsczrNYKdJ3iki9iFAdSiVS0IxoZzBhqlxt mi+qFY5lzZoJZimvOKltDHy9Xqk4ccwSjq6e2V8U+Ln+tIGxatcgftcwrkGxZNYVAvkL lMI4XOpn02tGXk91c49KBPadsSlkX9yCPAZPuthn2yU8t+AMhy6lOo9SkHMKIGch5M3+ f8Dw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=voZkqRmp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id nj7si6022249ejb.262.2019.10.06.11.04.25; Sun, 06 Oct 2019 11:04:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=voZkqRmp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728341AbfJFR0s (ORCPT + 99 others); Sun, 6 Oct 2019 13:26:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:52026 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726859AbfJFR0p (ORCPT ); Sun, 6 Oct 2019 13:26:45 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D3026214D9; Sun, 6 Oct 2019 17:26:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570382805; bh=/PUV6/gLISDR5QzXmZ1W1d7c2RECLlOac0UTFTta2Hg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=voZkqRmpPGAXarJmudsCw7aJD7TLT4sR3a4C+wtDquseDr/fwLSkmjkoZQsQEvEti BB0BFPYC5+HF/xiaBW4ofg2v3Xqtwf7tMgPqAg42byyutCJ8cy6B7aKkNCzeYMX1s5 3qM4SnKGcQwVoAboK71+yD0m90hX+uww7kTfVVpc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolas Boichat , Dmitry Vyukov , Catalin Marinas , Masahiro Yamada , Kees Cook , Petr Mladek , Thomas Gleixner , Tetsuo Handa , Joe Lawrence , Uladzislau Rezki , Andy Shevchenko , Stephen Rothwell , Andrey Ryabinin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.14 47/68] kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K Date: Sun, 6 Oct 2019 19:21:23 +0200 Message-Id: <20191006171130.491140517@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171108.150129403@linuxfoundation.org> References: <20191006171108.150129403@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Boichat [ Upstream commit b751c52bb587ae66f773b15204ef7a147467f4c7 ] The current default value (400) is too low on many systems (e.g. some ARM64 platform takes up 1000+ entries). syzbot uses 16000 as default value, and has proved to be enough on beefy configurations, so let's pick that value. This consumes more RAM on boot (each entry is 160 bytes, so in total ~2.5MB of RAM), but the memory would later be freed (early_log is __initdata). Link: http://lkml.kernel.org/r/20190730154027.101525-1-drinkcat@chromium.org Signed-off-by: Nicolas Boichat Suggested-by: Dmitry Vyukov Acked-by: Catalin Marinas Acked-by: Dmitry Vyukov Cc: Masahiro Yamada Cc: Kees Cook Cc: Petr Mladek Cc: Thomas Gleixner Cc: Tetsuo Handa Cc: Joe Lawrence Cc: Uladzislau Rezki Cc: Andy Shevchenko Cc: Stephen Rothwell Cc: Andrey Ryabinin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/Kconfig.debug | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 131d5871f8c98..e1df563cdfe7e 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -570,7 +570,7 @@ config DEBUG_KMEMLEAK_EARLY_LOG_SIZE int "Maximum kmemleak early log entries" depends on DEBUG_KMEMLEAK range 200 40000 - default 400 + default 16000 help Kmemleak must track all the memory allocations to avoid reporting false positives. Since memory may be allocated or -- 2.20.1