Received: by 10.192.165.148 with SMTP id m20csp6333imm; Thu, 26 Apr 2018 14:51:47 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/Rv3/Yrm4jbNPwgAQaMIVlayrLN1V5y+kRM6tRcpG3Y5y569WiKVzh1AlykyAFX6SkLtR6 X-Received: by 10.99.140.14 with SMTP id m14mr29327091pgd.320.1524779507732; Thu, 26 Apr 2018 14:51:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524779507; cv=none; d=google.com; s=arc-20160816; b=YLv3Qd1VQHCAGLhu3prObYv4pSKRt0sFVeKGIm5lfoXeorbsvHV3AGuqD/l0VS3mjR cDN18B9NS1Z4v3B02JsB4jjjgXvabs8L5bLudIr/VBh3bKUzoPWp2GheZvGTh2iyQi9Z QmLpkHvT8/G6nWaANP+D5sYEJydHnMyUQeWiHJ3suYizArZcX+cXHDbGv8FeE88fEnnH kRdeP7aN2+m//Hd8oGHxEeq/mNS57g9xBAQmhGEcLRRiaM9mgWgt3/JDaokiE+Ke+LY8 xqKa9WQNyfb8LlEcXUhCDDmbyzqkE398RXHRmoCKZv64e3jR+B6wJwv6+iWv+JFB3IzB LdMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=D14c47+Dgttw2xXAy+4prvqjlrYF0Ed9kEYwoktYDTk=; b=eCynlGNZtmXGUuvwpEKvwEYjQhXmq6Ev0OOgUr+uf5AT1TVTwfKHVYMGu8+Fl2iYsZ dzg+eipQs52wscELVhSiJ8hrfnDj6HVB/l3VD1vHG/0A4VCDtFiPTO6UlMWWil10GNVG NmxOF0+tg0ksrbANmKDLk6/pOTp4hZdgcSo/HNOGJLanq7crVyEP7aFPwIMmdFrqgFt1 j7o7u+e84hoBuwkO3Jpc359AFvBymEt0UOcvTbL3po1Pvwhx48th5PQX9wnOLrVgOn79 KX/8SMCGlNNzLvkWiVB7eYk0c8NMgI07RxTuFbaTykdgkEyKwUgVKUdg7YuU88qBpdOk v8qg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h10si16516474pgn.30.2018.04.26.14.51.32; Thu, 26 Apr 2018 14:51:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756585AbeDZVuX (ORCPT + 99 others); Thu, 26 Apr 2018 17:50:23 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:48012 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752962AbeDZVuW (ORCPT ); Thu, 26 Apr 2018 17:50:22 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A1D5F401F9AF; Thu, 26 Apr 2018 21:50:21 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (file01.intranet.prod.int.rdu2.redhat.com [10.11.5.7]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 618DE2166BC6; Thu, 26 Apr 2018 21:50:21 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (localhost [127.0.0.1]) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4) with ESMTP id w3QLoLfI024901; Thu, 26 Apr 2018 17:50:21 -0400 Received: from localhost (mpatocka@localhost) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4/Submit) with ESMTP id w3QLoK7V024897; Thu, 26 Apr 2018 17:50:20 -0400 X-Authentication-Warning: file01.intranet.prod.int.rdu2.redhat.com: mpatocka owned process doing -bs Date: Thu, 26 Apr 2018 17:50:20 -0400 (EDT) From: Mikulas Patocka X-X-Sender: mpatocka@file01.intranet.prod.int.rdu2.redhat.com To: John Stoffel cc: James Bottomley , Michal@stoffel.org, eric.dumazet@gmail.com, mst@redhat.com, netdev@vger.kernel.org, jasowang@redhat.com, Randy Dunlap , linux-kernel@vger.kernel.org, Matthew Wilcox , Hocko , linux-mm@kvack.org, dm-devel@redhat.com, Vlastimil Babka , Andrew@stoffel.org, David Rientjes , Morton , virtualization@lists.linux-foundation.org, David Miller , edumazet@google.com Subject: Re: [dm-devel] [PATCH v5] fault-injection: introduce kvmalloc fallback options In-Reply-To: <23266.8532.619051.784274@quad.stoffel.home> Message-ID: References: <20180421144757.GC14610@bombadil.infradead.org> <20180424162906.GM17484@dhcp22.suse.cz> <20180424170349.GQ17484@dhcp22.suse.cz> <20180424173836.GR17484@dhcp22.suse.cz> <1114eda5-9b1f-4db8-2090-556b4a37c532@infradead.org> <1524694663.4100.21.camel@HansenPartnership.com> <1524697697.4100.23.camel@HansenPartnership.com> <23266.8532.619051.784274@quad.stoffel.home> User-Agent: Alpine 2.02 (LRH 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Thu, 26 Apr 2018 21:50:21 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Thu, 26 Apr 2018 21:50:21 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'mpatocka@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 26 Apr 2018, John Stoffel wrote: > >>>>> "James" == James Bottomley writes: > > James> I may be an atypical developer but I'd rather have a root canal > James> than browse through menuconfig options. The way to get people > James> to learn about new debugging options is to blog about it (or > James> write an lwn.net article) which google will find the next time > James> I ask it how I debug XXX. Google (probably as a service to > James> humanity) rarely turns up Kconfig options in response to a > James> query. > > I agree with James here. Looking at the SLAB vs SLUB Kconfig entries > tells me *nothing* about why I should pick one or the other, as an > example. > > John I see your point - and I think the misunderstanding is this. This patch is not really helping people to debug existing crashes. It is not like "you get a crash" - "you google for some keywords" - "you get a page that suggests to turn this option on" - "you turn it on and solve the crash". What this patch really does is that - it makes the kernel deliberately crash in a situation when the code violates the specification, but it would not crash otherwise or it would crash very rarely. It helps to detect specification violations. If the kernel developer (or tester) doesn't use this option, his buggy code won't crash - and if it won't crash, he won't fix the bug or report it. How is the user or developer supposed to learn about this option, if he gets no crash at all? Mikulas