Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp420029imm; Wed, 26 Sep 2018 00:38:57 -0700 (PDT) X-Google-Smtp-Source: ACcGV62Dil4/y6vdRkLgPYfsRpUGSAg7Vlc+kmgX5lgVFXiZpokP6h4yLxAZ7C7sy6D2Sr/+Ms+F X-Received: by 2002:a63:d556:: with SMTP id v22-v6mr4227393pgi.357.1537947537719; Wed, 26 Sep 2018 00:38:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537947537; cv=none; d=google.com; s=arc-20160816; b=dbp7YDf/7pvFXRrWXXLehrBmOqgXesR5WT9f3QhORzqtVD/Uf0FGuSW0bYC7kAIlUX e6UuEJYk//fGDY57fhdvYYyzow13QMxpZRLCI0el6bu+1HaF8T357A05EnN+L8YOdW4Y ibzLzzP+SSBhvh27Rmej6Y+Eh69K6GQbZNZzIvvPTISZVuxk2rpg/vHkmZPQhRklYD5A 6s55RoZOUpBo00Z7+UfGSg/NL5owuSF69Kt10X/aummPoiH5GkPbqj+x+6FS5RThFcUX BU+1vZukVlce/D01S0AnAhU67SfxPmzOzkZCEK24QsYUOoxzIVy37PRLz8UIWvlmY/WD bUAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=sB3aPQASy946APV+Dz/yH4/s0sHy8e1phAg82twzvqQ=; b=1KkfL8/oWBzTdN5HN0glETXapISs6BVuH2kvKPBuQ7oDlb3faW8N97teawrg6r1Ea7 p19RHuUVEGY8OyDxUvCZh6YP7PodXhXBNeMZSPvKAQbPQ0NqfsMQnT0Zq2x4TgPxCGZB 6Fkk/m+17lxtTp3njebOkbwyttjKuXR2Y4yQmfI1aKi+/THf745GYPE58erkTEfxmjNB s51kq8UFZvyDzVGodXrX67uJgpNEa5xnJ4/ITEEEORMAXZkwK7sWxQifBhRB0NMO5Ct1 k+ltDWKaqQY3C7LvBIoSVal//t2fRqPkI3eYYTCExnQ6wOkQYdcMcQ/iOwH2e8cpnz6f D4Sg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z125-v6si4351475pfz.10.2018.09.26.00.38.41; Wed, 26 Sep 2018 00:38:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727043AbeIZNuK (ORCPT + 99 others); Wed, 26 Sep 2018 09:50:10 -0400 Received: from mx2.suse.de ([195.135.220.15]:51202 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726401AbeIZNuK (ORCPT ); Wed, 26 Sep 2018 09:50:10 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 963D6ADDF; Wed, 26 Sep 2018 07:38:33 +0000 (UTC) Date: Wed, 26 Sep 2018 09:38:31 +0200 From: Michal Hocko To: Alexander Duyck Cc: linux-mm@kvack.org, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, pavel.tatashin@microsoft.com, dave.jiang@intel.com, dave.hansen@intel.com, jglisse@redhat.com, rppt@linux.vnet.ibm.com, dan.j.williams@intel.com, logang@deltatee.com, mingo@kernel.org, kirill.shutemov@linux.intel.com Subject: Re: [PATCH v5 2/4] mm: Provide kernel parameter to allow disabling page init poisoning Message-ID: <20180926073831.GC6278@dhcp22.suse.cz> References: <20180925200551.3576.18755.stgit@localhost.localdomain> <20180925201921.3576.84239.stgit@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180925201921.3576.84239.stgit@localhost.localdomain> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 25-09-18 13:20:12, Alexander Duyck wrote: [...] > + vm_debug[=options] [KNL] Available with CONFIG_DEBUG_VM=y. > + May slow down system boot speed, especially when > + enabled on systems with a large amount of memory. > + All options are enabled by default, and this > + interface is meant to allow for selectively > + enabling or disabling specific virtual memory > + debugging features. > + > + Available options are: > + P Enable page structure init time poisoning > + - Disable all of the above options I agree with Dave that this is confusing as hell. So what does vm_debug (without any options means). I assume it's NOP and all debugging is enabled and that is the default. What if I want to disable _only_ the page struct poisoning. The weird lookcing `-' will disable all other options that we might gather in the future. Why cannot you simply go with [no]vm_page_poison[=on/off]? -- Michal Hocko SUSE Labs