Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2990217ybl; Sun, 1 Sep 2019 04:22:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqwHQCgu5k5R1d01aneSayzIjqZl/xoBJbNXEru0ouahlRU/wg5E6k9sghYALZg4/iSpQwwC X-Received: by 2002:aa7:9508:: with SMTP id b8mr12450935pfp.36.1567336979092; Sun, 01 Sep 2019 04:22:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567336979; cv=none; d=google.com; s=arc-20160816; b=Tnh6R7AxQm2kZAvO+qMvDFQO7yEamlt2Wxmqdml9zXovUMoJfnenXDtn0p9Z4aaixG XG23n1oXjeYZEJOpJhZkRyXm6//m4HMlgJZxm0u/RMDHqDhA940tRF+pjJDG9V5W8u+i lQVC/K27o4jzVrT3qIYAnKkErVDz1esTybnIt+EONeDJqx8O2aHcz/oJ+46QPBdF9DFc fOePhV3M+V1J0gaHLq08Jbf/wnq9cJuTGkdZyAzB0fd2UJ5ZUohhgdZ1Oc9af1JaOUUm KhKLaN+4I/y3teb5UpIT278GjWSOwxQOAIc3oAG6eHy/gZzzki6bLI4BBcGX8+AdG5VO Qypg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=IjDdyuOQgLuT3184VSKRXlvRsmDWHD0aJB3DZ76GJYY=; b=kWabxWGR4MUpEjsId/Yfn/B8lyrRRCAIJCfY4tSp6sb1MTP/2nYnRaIty6MKpvS9RI k5MNAX+nRGzr0Wd7Dpaq95uJOEr1XFuB0he7x6nKG+LI622YzTc8hyXAA0RmjkoIvGwb urUZwe5l6vlOVM1Z5Y9+typ32DiElg9CYUP4OFwUBohkyD2Mflzr3LUSzKdtM/WxPjOl lVVh+ibRsQBu1gEqVrOY0la20OAbOooJ1w+5U+xpONAu5e4EaU/EDy+K40ezK9f+NID/ ra8++RtZ4VEEra3n9Vg1hQt0RuOLPH4Ff3zMa/e3uV3z2ANuM9bMN5BEFDvpN0OJ+Uba Ridg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 205si8776126pge.295.2019.09.01.04.22.08; Sun, 01 Sep 2019 04:22:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728878AbfIAKtp (ORCPT + 99 others); Sun, 1 Sep 2019 06:49:45 -0400 Received: from inca-roads.misterjones.org ([213.251.177.50]:49681 "EHLO inca-roads.misterjones.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728523AbfIAKtp (ORCPT ); Sun, 1 Sep 2019 06:49:45 -0400 Received: from 78.163-31-62.static.virginmediabusiness.co.uk ([62.31.163.78] helo=why) by cheepnis.misterjones.org with esmtpsa (TLSv1.2:AES256-GCM-SHA384:256) (Exim 4.80) (envelope-from ) id 1i4NQQ-0001RB-Iw; Sun, 01 Sep 2019 12:49:38 +0200 Date: Sun, 1 Sep 2019 11:49:36 +0100 From: Marc Zyngier To: Changbin Du Cc: Thomas Gleixner , Andrew Morton , yamada.masahiro@socionext.com, LKML Subject: Re: [PATCH] genirq: move debugfs option to kernel hacking Message-ID: <20190901114936.5e2f3490@why> In-Reply-To: <20190901101032.7pysfrpincyrci35@mail.google.com> References: <20190901035539.2957-1-changbin.du@gmail.com> <20190901101032.7pysfrpincyrci35@mail.google.com> Organization: Approximate X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 62.31.163.78 X-SA-Exim-Rcpt-To: changbin.du@gmail.com, tglx@linutronix.de, akpm@linux-foundation.org, yamada.masahiro@socionext.com, linux-kernel@vger.kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on cheepnis.misterjones.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 1 Sep 2019 18:10:33 +0800 Changbin Du wrote: > On Sun, Sep 01, 2019 at 08:23:02AM +0200, Thomas Gleixner wrote: > > On Sun, 1 Sep 2019, Changbin Du wrote: > > > > > Just like the other generic debug options, move the irq one to > > > 'Kernel hacking' menu. > > > > Why? > > > > Kernel hacking is a inscrutable mess where you can waste a lot of time to > > find what you are looking for. > > > yes, the 'kernel hacking' menu has many items now and are not well structured. > Let me see if it can be improved. > > > If I want to debug interrupts then having the option right there where all > > other interrupt related configuration is makes tons of sense. > > > > I would be less opposed to this when the kernel hacking menu would be > > halfways well structured, but you just chose another random place for that > > option which is worse than what we have now. > > > We already have an irq debug option CONFIG_DEBUG_SHIRQ here. Maybe we can group > them into a submenu. DEBUG_SHIRQ is extremely different from GENERIC_IRQ_DEBUGFS. The former is a test option, verifying that endpoint drivers have a correct behaviour. The latter is a dump of the kernel internals, which is mostly for people dealing with the internals of the IRQ subsystem. Preserving this distinction between the users of the IRQ API on one side and the debugging of the IRQ subsystem on the other is important. Moving these two things close together could make it even more confusing for the users (who usually do not need to mess with the IRQ subsystem's internals...). Thanks, M. -- Without deviation from the norm, progress is not possible.