Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp913746imm; Wed, 26 Sep 2018 08:41:49 -0700 (PDT) X-Google-Smtp-Source: ACcGV62yGeGvsQiaV4Akvkv7TR0R0awvZWHYmM6MGDlLe0ZXEBQS/XIf7P+QJd2y1cffc5py6Js5 X-Received: by 2002:a63:b705:: with SMTP id t5-v6mr5941094pgf.366.1537976509790; Wed, 26 Sep 2018 08:41:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537976509; cv=none; d=google.com; s=arc-20160816; b=TCWvJxHyV5Pj/1Qwavz2237a1uZVWkXmLhFdheapmvx7N+blimqRn6GkKwQ92KH6QI 49AJJf6r9bMGgAhvOnaZAHk0WIKO+OFfyaYf7BFStkd797G5y+FTVs2lKssWaqq22GjU HADFGnl7yh3WO52aJZJFxEAzAbVaGLEFdbTGYLcLmnJNeNDvtp4xMT+bJK3IswJJfWJg NrjGxGGaHBEZP53X3TXx+Rt9oWXQGVYAFHFTS9GhB0cN61qjRxruT/qKIXllBAxHF1mx Rfes/NeCWUO9JFi/S0jIRDlb1mHaGgJtqkAKO/Ul+8LMkOKCO3zL34i/1aELDqv3/kJU P1LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=oLeOeNY7Z1hC8edDVvHMnseF2LrQ6IarIrUuXZhd0qk=; b=t9G89ks8gYL61+zLhG1KKN/9iHvp0L/HvOio+Y8Lf483X2akg1fb+H5y1+kvVCIKz6 6nrVh1cnm1vVmg8Wi4KKigZKyDdMmE+vGEeuLNfcUzv13os/Nj3IMvl76OoETHtaAwAJ Zg44wOHZ6fplVjnia6TLosYP/Z6NkkTZvu45494BJllP62A3YOIhoH8uaL1zGnEIfmn7 gt6/dMuKQ1kLOWF0ctGA0qDriMeX5Q48YSqVGIhy49UfT11AFC/cjymXZUEbRfehQqPP 9+IJXqrn3UcO+AsrsuI42z1AGYyFRoJx45NiR3td7molAT0Se0TomDVx37iDdlE9/+qc ttOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q14-v6si5566100pgk.346.2018.09.26.08.41.30; Wed, 26 Sep 2018 08:41:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728302AbeIZVw4 (ORCPT + 99 others); Wed, 26 Sep 2018 17:52:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:49200 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726937AbeIZVw4 (ORCPT ); Wed, 26 Sep 2018 17:52:56 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id F3953ACEF; Wed, 26 Sep 2018 15:39:23 +0000 (UTC) Date: Wed, 26 Sep 2018 17:39:21 +0200 From: Michal Hocko To: Alexander Duyck Cc: linux-mm@kvack.org, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, pavel.tatashin@microsoft.com, dave.jiang@intel.com, dave.hansen@intel.com, jglisse@redhat.com, rppt@linux.vnet.ibm.com, dan.j.williams@intel.com, logang@deltatee.com, mingo@kernel.org, kirill.shutemov@linux.intel.com Subject: Re: [PATCH v5 2/4] mm: Provide kernel parameter to allow disabling page init poisoning Message-ID: <20180926153921.GC6278@dhcp22.suse.cz> References: <20180925200551.3576.18755.stgit@localhost.localdomain> <20180925201921.3576.84239.stgit@localhost.localdomain> <20180926073831.GC6278@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 26-09-18 08:24:56, Alexander Duyck wrote: > On 9/26/2018 12:38 AM, Michal Hocko wrote: > > On Tue 25-09-18 13:20:12, Alexander Duyck wrote: > > [...] > > > + vm_debug[=options] [KNL] Available with CONFIG_DEBUG_VM=y. > > > + May slow down system boot speed, especially when > > > + enabled on systems with a large amount of memory. > > > + All options are enabled by default, and this > > > + interface is meant to allow for selectively > > > + enabling or disabling specific virtual memory > > > + debugging features. > > > + > > > + Available options are: > > > + P Enable page structure init time poisoning > > > + - Disable all of the above options > > > > I agree with Dave that this is confusing as hell. So what does vm_debug > > (without any options means). I assume it's NOP and all debugging is > > enabled and that is the default. What if I want to disable _only_ the > > page struct poisoning. The weird lookcing `-' will disable all other > > options that we might gather in the future. > > With no options it works just like slub_debug and enables all available > options. So in our case it is a NOP since we wanted the debugging enabled by > default. But isn't slub_debug more about _adding_ debugging features? While you want to effectively disbale some debugging features here? So if you want to follow that pattern then it would be something like vm_debug_disable=page_poisoning,$OTHER_FUTURE_DEBUG_OPTIONS why would you want to enable something when CONFIG_DEBUG_VM=y just enables everything? > > Why cannot you simply go with [no]vm_page_poison[=on/off]? > > That is what I had to begin with, but Dave Hansen and Dan Williams suggested > that I go with a slub_debug style interface so we could extend it in the > future. Please let's not over-engineer this. If you really need an umbrella parameter then make a list of things to disable. -- Michal Hocko SUSE Labs