From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EA862C33CB2 for ; Fri, 31 Jan 2020 06:14:19 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id AE60A206A2 for ; Fri, 31 Jan 2020 06:14:19 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="cPrKXCzo" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org AE60A206A2 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linux-foundation.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 570256B052F; Fri, 31 Jan 2020 01:14:19 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 4FAC76B0531; Fri, 31 Jan 2020 01:14:19 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3C1D76B0532; Fri, 31 Jan 2020 01:14:19 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0184.hostedemail.com [216.40.44.184]) by kanga.kvack.org (Postfix) with ESMTP id 1B5046B052F for ; Fri, 31 Jan 2020 01:14:19 -0500 (EST) Received: from smtpin19.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id BEE41824999B for ; Fri, 31 Jan 2020 06:14:18 +0000 (UTC) X-FDA: 76436914596.19.chalk89_259aba08bc60a X-HE-Tag: chalk89_259aba08bc60a X-Filterd-Recvd-Size: 2662 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf17.hostedemail.com (Postfix) with ESMTP for ; Fri, 31 Jan 2020 06:14:18 +0000 (UTC) Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 75B2E20663; Fri, 31 Jan 2020 06:14:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580451257; bh=c0a8HEeTbFavRPnOKtfHBMXLWhMVJESywEWh7DhUsJQ=; h=Date:From:To:Subject:In-Reply-To:From; b=cPrKXCzouO7Sil/ezOWHWp2eZlek8ktIR7ci0+0/LkesCPNZEWtVFhchpXLxLPzJO Ghptklk2ZtyuQQrcTo+eMRIv8QyDKhDEeeDyCkaxRP/CZ7pRjmELfodDApm9ktjs72 zTcfq/gKO5LfpOyb7QxuK8k8sqBE3f3qnOMIG/WM= Date: Thu, 30 Jan 2020 22:14:17 -0800 From: Andrew Morton To: akpm@linux-foundation.org, cl@linux.com, dwagner@suse.de, linux-mm@kvack.org, mm-commits@vger.kernel.org, tobin@kernel.org, torvalds@linux-foundation.org Subject: [patch 058/118] tools/vm/slabinfo: fix sanity checks enabling Message-ID: <20200131061417.tqdPF1W2m%akpm@linux-foundation.org> In-Reply-To: <20200130221021.5f0211c56346d5485af07923@linux-foundation.org> User-Agent: s-nail v14.8.16 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Daniel Wagner Subject: tools/vm/slabinfo: fix sanity checks enabling The sysfs file name for enabling sanity checking is called 'sanity_checks' and not 'sanity'. The name of the file has never changed since the introduction of the slub allocator. Obviously, most people turn the checks on via the command line option and not during runtime using slabinfo. Link: http://lkml.kernel.org/r/20200116131642.642-1-dwagner@suse.de Signed-off-by: Daniel Wagner Reviewed-by: Andrew Morton Cc: "Tobin C. Harding" Cc: Christoph Lameter Signed-off-by: Andrew Morton --- tools/vm/slabinfo.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/tools/vm/slabinfo.c~tools-vm-slabinfo-fix-sanity-checks-enabling +++ a/tools/vm/slabinfo.c @@ -720,11 +720,11 @@ static void slab_debug(struct slabinfo * return; if (sanity && !s->sanity_checks) { - set_obj(s, "sanity", 1); + set_obj(s, "sanity_checks", 1); } if (!sanity && s->sanity_checks) { if (slab_empty(s)) - set_obj(s, "sanity", 0); + set_obj(s, "sanity_checks", 0); else fprintf(stderr, "%s not empty cannot disable sanity checks\n", s->name); } _