Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1118895imm; Thu, 6 Sep 2018 16:00:14 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaXbPYME+xgl36R3dDHGgsVcG20S+qM51WEW9NvuetMKafqdSGrBV0Vm0DGI284EkKS1L5J X-Received: by 2002:a17:902:d917:: with SMTP id c23-v6mr5058388plz.65.1536274814822; Thu, 06 Sep 2018 16:00:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536274814; cv=none; d=google.com; s=arc-20160816; b=kMab6YmPwQQmS+OrZYCdXXIXgL3oIKa5EEDkw40jilSASp9rS3oB27sGWUAE4cGh73 hJAIzJQd6VGOgFTYAdxi7dfuxOPfp0pDe/CC87IDX863EGF7fFJ7VDnu7wdrY2KHING4 nQOj/05jEfftZcMlPmDgauBdMayV/S8QoY9rRxLpiy+GXz0n1iwdHHN+b6gLWl5482FY jGZ1aj3PK26TL/d9G0uANuSc7QekCcq848RXTJ0aApvp1YPvOEEpKJLAexdXgiXpys2u oK2bZ/6rhywf2vK8K8C1J3NxAvVKJt525EQs8mXpn3fGHkwCK056b2Ti9VUaVz0gUYGf /wVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=UUdgOMlb/aRuSsrGdP5Uv0GKpN0zDE3lFaR9b9Y0F0c=; b=eenFdMyFv5U9W0Bs3tqUWZWMb2ZguBPbxXLFPo5MtEPsaYmPagoNnosrsN2Z37bpb/ k3/6i1RS1KFa+FROaau0ZAyqrZaWYOlHEHYZNI0R/IldCsUaboMHM1H4cC8t467jMMLl D8cXHzhnZUDm6dEidu4SWz5qSSF/TsPhBHBXeHFNaY3qekPzNduUqMZDTRPOJ+C7Dyai Tq70BNDO4MtNhzi/AQ4/FuITh1AEx0QcepRnUGtwS5b1U9d5u4yxgGk2JL1zwaMvStaI rjk4+FGhHu2nYFaDEXmL56gsw+G/GOAvyJXzKahpsmdqQXhOk3X/7LHoL1rtf/NIiAu/ 06xQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k5-v6si6728210pfk.2.2018.09.06.15.59.59; Thu, 06 Sep 2018 16:00:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730353AbeIFWpg (ORCPT + 99 others); Thu, 6 Sep 2018 18:45:36 -0400 Received: from mx2.suse.de ([195.135.220.15]:33536 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728354AbeIFWpf (ORCPT ); Thu, 6 Sep 2018 18:45:35 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 84669ACBB; Thu, 6 Sep 2018 18:08:56 +0000 (UTC) Date: Thu, 6 Sep 2018 20:08:54 +0200 From: Michal Hocko To: Dave Hansen Cc: Pasha Tatashin , Alexander Duyck , linux-mm , LKML , "Duyck, Alexander H" , Andrew Morton , Ingo Molnar , "Kirill A. Shutemov" Subject: Re: [PATCH v2 1/2] mm: Move page struct poisoning to CONFIG_DEBUG_VM_PAGE_INIT_POISON Message-ID: <20180906180854.GG14951@dhcp22.suse.cz> References: <20180905211041.3286.19083.stgit@localhost.localdomain> <20180905211328.3286.71674.stgit@localhost.localdomain> <20180906054735.GJ14951@dhcp22.suse.cz> <0c1c36f7-f45a-8fe9-dd52-0f60b42064a9@intel.com> <20180906151336.GD14951@dhcp22.suse.cz> <4f154937-118c-96cf-cf8e-c95a2ca68d44@microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 06-09-18 10:07:51, Dave Hansen wrote: > On 09/06/2018 09:12 AM, Pasha Tatashin wrote: > > > > I do not want to make this feature less tested. Poisoning memory allowed > > us to catch corner case bugs like these: > > > > ab1e8d8960b68f54af42b6484b5950bd13a4054b > > mm: don't allow deferred pages with NEED_PER_CPU_KM > > > > e181ae0c5db9544de9c53239eb22bc012ce75033 > > mm: zero unavailable pages before memmap init > > > > And several more that were fixed by other people. > > Just curious: were these found in the wild, or by a developer doing > normal development having turned on lots of debug options? Some of those were 0day AFAIR but my memory is quite dim. Pavel will know better. The bottom line is, however, that those bugs depend on strange or unexpected memory configurations or HW which is usually deployed outside of developers machine pool. So more people have this enabled the more likely we hit all those strange corner cases nobody even thought of. -- Michal Hocko SUSE Labs