From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757080AbZFODS6 (ORCPT ); Sun, 14 Jun 2009 23:18:58 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753974AbZFODPG (ORCPT ); Sun, 14 Jun 2009 23:15:06 -0400 Received: from mga03.intel.com ([143.182.124.21]:63595 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753027AbZFODPB (ORCPT ); Sun, 14 Jun 2009 23:15:01 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.42,220,1243839600"; d="scan'208";a="154267350" Message-Id: <20090615031255.441271726@intel.com> References: <20090615024520.786814520@intel.com> User-Agent: quilt/0.46-1 Date: Mon, 15 Jun 2009 10:45:42 +0800 From: Wu Fengguang To: Andrew Morton Cc: LKML , Andi Kleen cc: Ingo Molnar cc: Mel Gorman cc: "Wu, Fengguang" , Thomas Gleixner , "H. Peter Anvin" , Peter Zijlstra , Nick Piggin , Hugh Dickins , Andi Kleen , "riel@redhat.com" , "chris.mason@oracle.com" , "linux-mm@kvack.org" Subject: [PATCH 22/22] HWPOISON: FOR TESTING: Enable memory failure code unconditionally Content-Disposition: inline; filename=hwpoison-enable Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andi Kleen Normally the memory-failure.c code is enabled by the architecture, but for easier testing independent of architecture changes enable it unconditionally. This should not be merged into mainline. Signed-off-by: Andi Kleen --- mm/Kconfig | 2 ++ 1 file changed, 2 insertions(+) --- sound-2.6.orig/mm/Kconfig +++ sound-2.6/mm/Kconfig @@ -241,6 +241,8 @@ config KSM config MEMORY_FAILURE bool + default y + depends on MMU config HWPOISON_INJECT tristate "Poison pages injector" -- From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wu Fengguang Subject: [PATCH 22/22] HWPOISON: FOR TESTING: Enable memory failure code unconditionally Date: Mon, 15 Jun 2009 10:45:42 +0800 Message-ID: <20090615031255.441271726@intel.com> References: <20090615024520.786814520@intel.com> Return-path: Received: from mail203.messagelabs.com (mail203.messagelabs.com [216.82.254.243]) by kanga.kvack.org (Postfix) with SMTP id 2AD8C6B0096 for ; Sun, 14 Jun 2009 23:14:37 -0400 (EDT) Content-Disposition: inline; filename=hwpoison-enable Sender: owner-linux-mm@kvack.org To: Andrew Morton Cc: LKML , Andi Kleen , Ingo Molnar , Mel Gorman , "Wu, Fengguang" , Thomas Gleixner , "H. Peter Anvin" , Peter Zijlstra , Nick Piggin , Hugh Dickins , Andi Kleen , "riel@redhat.com" , "chris.mason@oracle.com" , "linux-mm@kvack.org" List-Id: linux-mm.kvack.org From: Andi Kleen Normally the memory-failure.c code is enabled by the architecture, but for easier testing independent of architecture changes enable it unconditionally. This should not be merged into mainline. Signed-off-by: Andi Kleen --- mm/Kconfig | 2 ++ 1 file changed, 2 insertions(+) --- sound-2.6.orig/mm/Kconfig +++ sound-2.6/mm/Kconfig @@ -241,6 +241,8 @@ config KSM config MEMORY_FAILURE bool + default y + depends on MMU config HWPOISON_INJECT tristate "Poison pages injector" -- -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org