Received: by 10.213.65.68 with SMTP id h4csp656399imn; Wed, 28 Mar 2018 10:16:42 -0700 (PDT) X-Google-Smtp-Source: AIpwx48jjwBKhfxRLSITUbgYvnQsdGT35xivAGuIhZkSTnJQM7gt+qA9Y6PagPAwtKWrAvBieF/B X-Received: by 10.98.52.133 with SMTP id b127mr3686452pfa.17.1522257402230; Wed, 28 Mar 2018 10:16:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522257402; cv=none; d=google.com; s=arc-20160816; b=jEmYxIuO8dddZalGegtogIUs40CIoEkXD7kYu+BwDAVKR6xmz2YrtC8OjWPlDuzdHA qwKanc0IsG9A2tdC3jPkte5zlUpB7DlSXJw2ioq6r1YNrQSdIPdZST+W/u4gZ2imgn8S sclqtGZn8MyHAIQo+OPI+fVsr95lwNNOsxXCMzgZ33D/hXLO5zoLhW5Q5ziLAdpLClmm PCl818sAzbWOnxgRiwCSzHJDjypDomEV33UXDisXDAN3RMg9gKwL4JucRXzeYiSAT5xx lHPpltYj2NQa0a7hyzEP1pR9nN1hOuvDJO8cUAAQ0szsa6PxhGZVdHy8DBM1x19eFnZl iEnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=+O359GlxU5PnM+KrDHEwGMgU6VytJpkg+Dce/ItPzVs=; b=KpPhMBI3bUjyPP9HD7QQUGfYT4mdcddXD7l2X3E0smlc/Pew17Zh5ZEil0HC180WL5 ajP3LWRycKqhlT2UnRwo/lRZHrPGUXmUc+IqxrM7/BsyiLjGOyIx7N71Pbc2xPLK8aJh 0LRqsnbFh114vjeQFegvREw+vt4yvv08xsgR6XebePuN1Sx+zIvIqO/MUvAAOx6qMo/o +QhDUZzJ7UGpvLBD7VvpK/2sAN12/oKP1ZpTcHq0g8Qyqc975L3bmdX7jRqC9gztpRVQ l9uiFAN8OrrBwSe74oPpa9TPGYLfkEOY3+piTZZLMi2eNZFhpWUHn/PvmlcpoVLfcbIN tPrw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9si2727532pgg.286.2018.03.28.10.16.27; Wed, 28 Mar 2018 10:16:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753284AbeC1Q6O (ORCPT + 99 others); Wed, 28 Mar 2018 12:58:14 -0400 Received: from mga17.intel.com ([192.55.52.151]:60690 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752342AbeC1Qzu (ORCPT ); Wed, 28 Mar 2018 12:55:50 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Mar 2018 09:55:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,372,1517904000"; d="scan'208";a="27759803" Received: from black.fi.intel.com ([10.237.72.28]) by fmsmga007.fm.intel.com with ESMTP; 28 Mar 2018 09:55:47 -0700 Received: by black.fi.intel.com (Postfix, from userid 1000) id 808DD3F0; Wed, 28 Mar 2018 19:55:43 +0300 (EEST) From: "Kirill A. Shutemov" To: Ingo Molnar , x86@kernel.org, Thomas Gleixner , "H. Peter Anvin" , Tom Lendacky Cc: Dave Hansen , Kai Huang , linux-kernel@vger.kernel.org, linux-mm@kvack.org, "Kirill A. Shutemov" , Vinayak Menon Subject: [PATCHv2 08/14] mm/page_ext: Drop definition of unused PAGE_EXT_DEBUG_POISON Date: Wed, 28 Mar 2018 19:55:34 +0300 Message-Id: <20180328165540.648-9-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180328165540.648-1-kirill.shutemov@linux.intel.com> References: <20180328165540.648-1-kirill.shutemov@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After bd33ef368135 ("mm: enable page poisoning early at boot") PAGE_EXT_DEBUG_POISON is not longer used. Remove it. Signed-off-by: Kirill A. Shutemov Cc: Vinayak Menon --- include/linux/page_ext.h | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/include/linux/page_ext.h b/include/linux/page_ext.h index ca5461efae2f..bbec618a614b 100644 --- a/include/linux/page_ext.h +++ b/include/linux/page_ext.h @@ -16,18 +16,7 @@ struct page_ext_operations { #ifdef CONFIG_PAGE_EXTENSION -/* - * page_ext->flags bits: - * - * PAGE_EXT_DEBUG_POISON is set for poisoned pages. This is used to - * implement generic debug pagealloc feature. The pages are filled with - * poison patterns and set this flag after free_pages(). The poisoned - * pages are verified whether the patterns are not corrupted and clear - * the flag before alloc_pages(). - */ - enum page_ext_flags { - PAGE_EXT_DEBUG_POISON, /* Page is poisoned */ PAGE_EXT_DEBUG_GUARD, PAGE_EXT_OWNER, #if defined(CONFIG_IDLE_PAGE_TRACKING) && !defined(CONFIG_64BIT) -- 2.16.2