From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757080AbZFODS6 (ORCPT ); Sun, 14 Jun 2009 23:18:58 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753974AbZFODPG (ORCPT ); Sun, 14 Jun 2009 23:15:06 -0400 Received: from mga03.intel.com ([143.182.124.21]:63595 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753027AbZFODPB (ORCPT ); Sun, 14 Jun 2009 23:15:01 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.42,220,1243839600"; d="scan'208";a="154267350" Message-Id: <20090615031255.441271726@intel.com> References: <20090615024520.786814520@intel.com> User-Agent: quilt/0.46-1 Date: Mon, 15 Jun 2009 10:45:42 +0800 From: Wu Fengguang To: Andrew Morton Cc: LKML , Andi Kleen cc: Ingo Molnar cc: Mel Gorman cc: "Wu, Fengguang" , Thomas Gleixner , "H. Peter Anvin" , Peter Zijlstra , Nick Piggin , Hugh Dickins , Andi Kleen , "riel@redhat.com" , "chris.mason@oracle.com" , "linux-mm@kvack.org" Subject: [PATCH 22/22] HWPOISON: FOR TESTING: Enable memory failure code unconditionally Content-Disposition: inline; filename=hwpoison-enable Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andi Kleen Normally the memory-failure.c code is enabled by the architecture, but for easier testing independent of architecture changes enable it unconditionally. This should not be merged into mainline. Signed-off-by: Andi Kleen --- mm/Kconfig | 2 ++ 1 file changed, 2 insertions(+) --- sound-2.6.orig/mm/Kconfig +++ sound-2.6/mm/Kconfig @@ -241,6 +241,8 @@ config KSM config MEMORY_FAILURE bool + default y + depends on MMU config HWPOISON_INJECT tristate "Poison pages injector" --