On Fri, Feb 23, 2018 at 11:08 AM, Rafael J. Wysocki <rafael@xxxxxxxxxx> wrote: > On Fri, Feb 23, 2018 at 1:22 AM, Bart Van Assche <bart.vanassche@xxxxxxx> wrote: >> This patch avoids that the following is reported during boot with >> kmemleak and other kernel debugging options enabled: > > Again, it would be sort of nice to explain why you want to fix the > issue this particular way. > > We actually can't add cond_resched() to these code paths directly, > because the code in question comes from an external project, so we > need to understand the issue and see if it can be fixed differently. And BTW, the fact that it happens in Linux indicates that it very well may happen in the other OSes using ACPICA, so ideally we'd need to fix it in a more general fashion. -- To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html