From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753994AbZFTDUo (ORCPT ); Fri, 19 Jun 2009 23:20:44 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752726AbZFTDUD (ORCPT ); Fri, 19 Jun 2009 23:20:03 -0400 Received: from mga03.intel.com ([143.182.124.21]:5938 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751817AbZFTDUB (ORCPT ); Fri, 19 Jun 2009 23:20:01 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.42,257,1243839600"; d="scan'208";a="156644143" Message-Id: <20090620031626.763180363@intel.com> References: <20090620031608.624240019@intel.com> User-Agent: quilt/0.46-1 Date: Sat, 20 Jun 2009 11:16:23 +0800 From: Wu Fengguang To: Andrew Morton Cc: LKML , Andi Kleen cc: Ingo Molnar Cc: Minchan Kim cc: Mel Gorman cc: "Wu, Fengguang" , Thomas Gleixner , "H. Peter Anvin" , Peter Zijlstra , Nick Piggin , Hugh Dickins , Andi Kleen , "riel@redhat.com" , "chris.mason@oracle.com" , "linux-mm@kvack.org" Subject: [PATCH 15/15] HWPOISON: FOR TESTING: Enable memory failure code unconditionally Content-Disposition: inline; filename=hwpoison-enable Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andi Kleen Normally the memory-failure.c code is enabled by the architecture, but for easier testing independent of architecture changes enable it unconditionally. This should not be merged into mainline. Signed-off-by: Andi Kleen --- mm/Kconfig | 2 ++ 1 file changed, 2 insertions(+) --- sound-2.6.orig/mm/Kconfig +++ sound-2.6/mm/Kconfig @@ -241,6 +241,8 @@ config KSM config MEMORY_FAILURE bool + default y + depends on MMU config HWPOISON_INJECT tristate "Hardware poison pages injector" --