Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp4237219imm; Tue, 25 Sep 2018 13:51:19 -0700 (PDT) X-Google-Smtp-Source: ACcGV60aXCz7dyfGn2AfiLARBIP5qTBmeM6wmmr2QaZF9XooWgI2zhuvasphifVVXYurGjROxUZg X-Received: by 2002:a63:f711:: with SMTP id x17-v6mr2622836pgh.322.1537908679217; Tue, 25 Sep 2018 13:51:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537908679; cv=none; d=google.com; s=arc-20160816; b=UAJiJLkQJSkE0kw5UiH+KowP7Sgqea2DJiPTdUfKJCvY+wCf6ODZDkiHi5G8j9HnnI TX5TRWwrC1h4BlyZnuDE1mYxAhp/gIn9AvFuCi/iZEEc6+PxE1XRbcUDBAbayLyttXS0 +A2mBtJl+zO6kkG5fBEDElt3DVsf9wnlUuYhDB6eBoo8n/qUunVX0lURBDvCHFjAH4cV k0qfQgpvikjE/55MFMNINlEkw4NXhi0NuLLj0PIgvbaY9cdxFwSB9z1/MHIbo/cgxJDd u55c4Q+Oh1j0c1lRasvvspxr6FDraL6MdRMV5DLxXjgnO2QhQheKkmGQ3RK7MHPvOA72 jHXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=LKccGORdh+4z4CTTdhthjQBawW62KNZC1Hw6CcHwAo4=; b=OaI9n2szUQkF/2LrVFHJJ1kkhR6bmf7KhykCscfBbL/X2a10RtFAjU7HA/4sKeK1nZ NX/iE0hbjMDZUN6u7ECwFys/Vpsu7xcQgRvsESfx2BVWCQCYZp+J9i3sgGoPcqXycdWs zhPofPaKoYJEEHoPUhUknFWj6Ej6X8P3u38Uqwa968bITnlO9OVsz21k+058qGG+hjDm jAwYJnF/wUiNvrtxDQmVBkGki9/3e/iZiIdN9XR2E1frgrQRIig4Gz3M7k6EUrHSXOTC ZSB7CrVzOUIHQdvJQxHC+1cyqFLFg6yC2FXuAY7b8cj1USdIyJ8Ha0Arl9cQyJeI9A59 y3MA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a1-v6si3275498pga.130.2018.09.25.13.51.03; Tue, 25 Sep 2018 13:51:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726369AbeIZC6a (ORCPT + 99 others); Tue, 25 Sep 2018 22:58:30 -0400 Received: from mga01.intel.com ([192.55.52.88]:22392 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726242AbeIZC6a (ORCPT ); Tue, 25 Sep 2018 22:58:30 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Sep 2018 13:49:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,303,1534834800"; d="scan'208";a="94756981" Received: from ahduyck-mobl.amr.corp.intel.com (HELO [10.7.198.152]) ([10.7.198.152]) by orsmga002.jf.intel.com with ESMTP; 25 Sep 2018 13:38:43 -0700 Subject: Re: [PATCH v5 2/4] mm: Provide kernel parameter to allow disabling page init poisoning To: Dave Hansen , linux-mm@kvack.org, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org Cc: pavel.tatashin@microsoft.com, mhocko@suse.com, dave.jiang@intel.com, jglisse@redhat.com, rppt@linux.vnet.ibm.com, dan.j.williams@intel.com, logang@deltatee.com, mingo@kernel.org, kirill.shutemov@linux.intel.com References: <20180925200551.3576.18755.stgit@localhost.localdomain> <20180925201921.3576.84239.stgit@localhost.localdomain> <13285e05-fb90-b948-6f96-777f94079657@intel.com> From: Alexander Duyck Message-ID: <8faf3acc-e47e-8ef9-a1a0-c0d6ebfafa1e@linux.intel.com> Date: Tue, 25 Sep 2018 13:38:43 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.0 MIME-Version: 1.0 In-Reply-To: <13285e05-fb90-b948-6f96-777f94079657@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/25/2018 1:26 PM, Dave Hansen wrote: > On 09/25/2018 01:20 PM, Alexander Duyck wrote: >> + vm_debug[=options] [KNL] Available with CONFIG_DEBUG_VM=y. >> + May slow down system boot speed, especially when >> + enabled on systems with a large amount of memory. >> + All options are enabled by default, and this >> + interface is meant to allow for selectively >> + enabling or disabling specific virtual memory >> + debugging features. >> + >> + Available options are: >> + P Enable page structure init time poisoning >> + - Disable all of the above options > > Can we have vm_debug=off for turning things off, please? That seems to > be pretty standard. No. The simple reason for that is that you had requested this work like the slub_debug. If we are going to do that then each individual letter represents a feature. That is why the "-" represents off. We cannot have letters represent flags, and letters put together into words. For example slub_debug=OFF would turn on sanity checks and turn off debugging for caches that would have causes higher minimum slab orders. Either I can do this as a single parameter that supports on/off semantics, or I can support it as a slub_debug type parameter that does flags based on the input options. I would rather not muddy things by trying to do both. > Also, we need to document the defaults. I think the default is "all > debug options are enabled", but it would be nice to document that. In the description I call out "All options are enabled by default, and this interface is meant to allow for selectively enabling or disabling".