Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753110AbdI0P0G (ORCPT ); Wed, 27 Sep 2017 11:26:06 -0400 Received: from omzsmtpe02.verizonbusiness.com ([199.249.25.209]:5485 "EHLO omzsmtpe02.verizonbusiness.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752187AbdI0P0F (ORCPT ); Wed, 27 Sep 2017 11:26:05 -0400 From: "Levin, Alexander (Sasha Levin)" X-Host: discovery.odc.vzwcorp.com To: Michal Hocko CC: "akpm@linux-foundation.org" , "linux-kernel@vger.kernel.org" , Steven Rostedt , "David S . Miller" Subject: Re: [PATCH] mm: kill kmemcheck again Thread-Topic: [PATCH] mm: kill kmemcheck again Thread-Index: AQHTN6TBjr0R4NdlOEuHKTedFEYtHA== Date: Wed, 27 Sep 2017 15:24:48 +0000 Message-ID: <20170927152445.pe5ah3hq5hwup75z@sasha-lappy> References: <20170927112723.16862-1-alexander.levin@verizon.com> <20170927150207.swmcarc4lqlklohr@dhcp22.suse.cz> In-Reply-To: <20170927150207.swmcarc4lqlklohr@dhcp22.suse.cz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: NeoMutt/20170113 (1.7.2) x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.144.60.250] Content-Type: text/plain; charset="us-ascii" Content-ID: <2B4C723B4AFF6E43827D3276B0E631CB@vzwcorp.com> MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by nfs id v8RFRM8I028709 Content-Length: 448 Lines: 15 On Wed, Sep 27, 2017 at 05:02:07PM +0200, Michal Hocko wrote: >This is just too large to review manually. How have you generated the >patch? Manualy. Note that most of it (~95%) is the result of 'rm arch/x86/mm/kmemcheck'. Otherwise, I just removed all uses of __GFP_NOWARN/SLAB_NOWARN, and calls to various annotations throughout the code. I'm not sure about i386 breakage, will take a look, doesn't seem to be too obvious. -- Thanks, Sasha