Received: by 10.192.165.148 with SMTP id m20csp2073413imm; Thu, 26 Apr 2018 06:00:07 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqiXaVdAbYJ9ZLp9DUW521VIoRQ2AUlI0yQYL6i6urlFUSyCNR+bsfZ+jbsEptbtGc3wDRi X-Received: by 10.101.99.90 with SMTP id p26mr6600643pgv.163.1524747607819; Thu, 26 Apr 2018 06:00:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524747607; cv=none; d=google.com; s=arc-20160816; b=0DG8C8x3RcuHODEzI8ASKrlFOU1Q7roZhNkrmJ3ekOS2QdgORvXM3bxruHGtlpG9ve i9ZAyxagTBQNoMDxzgdlngVTy4Ewl18RqrVW1fba/7GrhxiLwCcwY7XDajnvFQF2Z7IH N1Z2UBF10voknpg2QSynaI2K//dFAONEy22uecgQ39xebvrH5Wi0CXQccmdq8RTKTyrp 1q4xOGwE/QkVFpCOo8cI+hlOaMblcQ+Qtf6dZx5RT+f+9g0vY6nQAJvsaOoQPwvJMW6p pxqMyJX7S3k/4A/I2Op9fW4vwdc5qSXhc1I/1HmhVyy3dUZy0Vh+m4XoV0RWiSUb0iIm XyNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=GFstArsWSW/B0hUjOPjGoeRkM/+GXx2r4Hno3pTuEJc=; b=gmgotzXP634e3HGFirluMlRzgKRAtaj9ob16PSJuXqas+GcuQA7o0hANmezHQ8UFxW zyIAPP4lBPoXTQbjpyDciNWPAkZzkJbmkXaYTYWFD6WKnJD05ds+zD+HD+KUEt36+q0C x/+6IctIkp4OUZjbCGAveYeH3fbluxZUHiHSbzey64k1oOJt4mU8l2FFyAQRRHoWlY65 +KhbwTQumFO/6CWf810rNvTA4dwsDRdTvnbSDpgJkZcOLThiJSVLBKVT73jpdKwgRFLs C+UCnGpq1T8D+AobzMy3i7fItsy155oFvJ1IN/l7g9X4oi/INZt02d3dBZDOd/pVYKlJ JJAQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q137si14786671pfc.68.2018.04.26.05.59.53; Thu, 26 Apr 2018 06:00:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756318AbeDZM63 (ORCPT + 99 others); Thu, 26 Apr 2018 08:58:29 -0400 Received: from mx2.suse.de ([195.135.220.15]:35251 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756163AbeDZM6W (ORCPT ); Thu, 26 Apr 2018 08:58:22 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id CF274ACA4; Thu, 26 Apr 2018 12:58:20 +0000 (UTC) Date: Thu, 26 Apr 2018 14:58:17 +0200 From: Michal Hocko To: Mikulas Patocka Cc: James Bottomley , David Rientjes , dm-devel@redhat.com, eric.dumazet@gmail.com, mst@redhat.com, netdev@vger.kernel.org, jasowang@redhat.com, Randy Dunlap , linux-kernel@vger.kernel.org, Matthew Wilcox , linux-mm@kvack.org, edumazet@google.com, Andrew Morton , virtualization@lists.linux-foundation.org, David Miller , Vlastimil Babka Subject: Re: [dm-devel] [PATCH v5] fault-injection: introduce kvmalloc fallback options Message-ID: <20180426125817.GO17484@dhcp22.suse.cz> References: <20180424170349.GQ17484@dhcp22.suse.cz> <20180424173836.GR17484@dhcp22.suse.cz> <1114eda5-9b1f-4db8-2090-556b4a37c532@infradead.org> <1524694663.4100.21.camel@HansenPartnership.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 25-04-18 18:42:57, Mikulas Patocka wrote: > > > On Wed, 25 Apr 2018, James Bottomley wrote: [...] > > Kconfig proliferation, conversely, is a bit of a nightmare from both > > the user and the tester's point of view, so we're trying to avoid it > > unless absolutely necessary. > > > > James > > I already offered that we don't need to introduce a new kernel option and > we can bind this feature to any other kernel option, that is enabled in > the debug kernel, for example CONFIG_DEBUG_SG. Michal said no and he said > that he wants a new kernel option instead. Just for the record. I didn't say I _want_ a config option. Do not misinterpret my words. I've said that a config option would be acceptable if there is no way to deliver the functionality via kernel package automatically. You haven't provided any argument that would explain why the kernel package cannot add a boot option. Maybe there are some but I do not see them right now. -- Michal Hocko SUSE Labs