summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrew Morton <akpm@linux-foundation.org>2024-04-25 14:12:09 -0700
committerAndrew Morton <akpm@linux-foundation.org>2024-04-25 14:12:09 -0700
commit6d8717842a198ba2b29a9088f42b0264a2302ac4 (patch)
tree4bb8576ee3dd8a49f6af75e1deaa1a9f4aac6576
parent29bf28a395328a3258cb7334153aec7cfcc0e881 (diff)
download25-new-6d8717842a198ba2b29a9088f42b0264a2302ac4.tar.gz
foo
-rw-r--r--patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch45
-rw-r--r--patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch32
-rw-r--r--patches/lib-add-memory-allocations-report-in-show_mem.patch4
-rw-r--r--patches/mm-simplify-thp_vma_allowable_order.patch221
-rw-r--r--patches/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch (renamed from patches/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch)0
-rw-r--r--pc/devel-series12
-rw-r--r--pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc1
-rw-r--r--pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc1
-rw-r--r--pc/mm-simplify-thp_vma_allowable_order.pc5
-rw-r--r--pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc5
-rw-r--r--txt/asm-generic-ioh-kill-vmalloch-dependency.txt2
-rw-r--r--txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt2
-rw-r--r--txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt2
-rw-r--r--txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt1
-rw-r--r--txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt2
-rw-r--r--txt/fix-missing-vmalloch-includes-fix-5.txt1
-rw-r--r--txt/fix-missing-vmalloch-includes.txt2
-rw-r--r--txt/fs-convert-alloc_inode_sb-to-a-macro.txt1
-rw-r--r--txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt18
-rw-r--r--txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt1
-rw-r--r--txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt1
-rw-r--r--txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt14
-rw-r--r--txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt2
-rw-r--r--txt/lib-add-codetag-reference-into-slabobj_ext.txt2
-rw-r--r--txt/lib-add-memory-allocations-report-in-show_mem.txt2
-rw-r--r--txt/lib-code-tagging-framework.txt2
-rw-r--r--txt/lib-code-tagging-module-support.txt2
-rw-r--r--txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt2
-rw-r--r--txt/lib-introduce-support-for-page-allocation-tagging.txt2
-rw-r--r--txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt2
-rw-r--r--txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt1
-rw-r--r--txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt1
-rw-r--r--txt/memory-failure-remove-calls-to-page_mapping.txt1
-rw-r--r--txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt1
-rw-r--r--txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt1
-rw-r--r--txt/mempool-hook-up-to-memory-allocation-profiling.txt2
-rw-r--r--txt/memprofiling-documentation.txt2
-rw-r--r--txt/mm-create-new-codetag-references-during-page-splitting.txt2
-rw-r--r--txt/mm-enable-page-allocation-tagging-fix.txt1
-rw-r--r--txt/mm-enable-page-allocation-tagging.txt1
-rw-r--r--txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt2
-rw-r--r--txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt2
-rw-r--r--txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt4
-rw-r--r--txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt1
-rw-r--r--txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt2
-rw-r--r--txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt1
-rw-r--r--txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt2
-rw-r--r--txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt2
-rw-r--r--txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt1
-rw-r--r--txt/mm-percpu-enable-per-cpu-allocation-tagging.txt2
-rw-r--r--txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt2
-rw-r--r--txt/mm-percpu-introduce-pcpuobj_ext.txt3
-rw-r--r--txt/mm-simplify-thp_vma_allowable_order.txt11
-rw-r--r--txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt1
-rw-r--r--txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt1
-rw-r--r--txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt1
-rw-r--r--txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt1
-rw-r--r--txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt1
-rw-r--r--txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt1
-rw-r--r--txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt1
-rw-r--r--txt/mm-vmalloc-enable-memory-allocation-profiling.txt2
-rw-r--r--txt/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt (renamed from txt/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt)0
-rw-r--r--txt/rhashtable-plumb-through-alloc-tag-fix.txt1
-rw-r--r--txt/rhashtable-plumb-through-alloc-tag.txt2
-rw-r--r--txt/rust-add-a-rust-helper-for-krealloc.txt2
-rw-r--r--txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt1
-rw-r--r--txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt1
67 files changed, 409 insertions, 44 deletions
diff --git a/patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch b/patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch
new file mode 100644
index 000000000..c2f114eac
--- /dev/null
+++ b/patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch
@@ -0,0 +1,45 @@
+From: Alexander Potapenko <glider@google.com>
+Subject: kmsan: compiler_types: declare __no_sanitize_or_inline
+Date: Thu, 25 Apr 2024 11:28:59 +0200
+
+It turned out that KMSAN instruments READ_ONCE_NOCHECK(), resulting in
+false positive reports, because __no_sanitize_or_inline enforced inlining.
+
+Properly declare __no_sanitize_or_inline under __SANITIZE_MEMORY__,
+so that it does not inline the annotated function.
+
+Link: https://lkml.kernel.org/r/20240425092859.3370297-1-glider@google.com
+Reported-by: syzbot+355c5bb8c1445c871ee8@syzkaller.appspotmail.com
+Link: https://lkml.kernel.org/r/000000000000826ac1061675b0e3@google.com
+Signed-off-by: Alexander Potapenko <glider@google.com>
+Reviewed-by: Marco Elver <elver@google.com>
+Cc: Dmitry Vyukov <dvyukov@google.com>
+Cc: Miguel Ojeda <ojeda@kernel.org>
+Cc: <stable@vger.kernel.org>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+---
+
+ include/linux/compiler_types.h | 11 +++++++++++
+ 1 file changed, 11 insertions(+)
+
+--- a/include/linux/compiler_types.h~kmsan-compiler_types-declare-__no_sanitize_or_inline
++++ a/include/linux/compiler_types.h
+@@ -278,6 +278,17 @@ struct ftrace_likely_data {
+ # define __no_kcsan
+ #endif
+
++#ifdef __SANITIZE_MEMORY__
++/*
++ * Similarly to KASAN and KCSAN, KMSAN loses function attributes of inlined
++ * functions, therefore disabling KMSAN checks also requires disabling inlining.
++ *
++ * __no_sanitize_or_inline effectively prevents KMSAN from reporting errors
++ * within the function and marks all its outputs as initialized.
++ */
++# define __no_sanitize_or_inline __no_kmsan_checks notrace __maybe_unused
++#endif
++
+ #ifndef __no_sanitize_or_inline
+ #define __no_sanitize_or_inline __always_inline
+ #endif
+_
diff --git a/patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch b/patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch
new file mode 100644
index 000000000..84405803b
--- /dev/null
+++ b/patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch
@@ -0,0 +1,32 @@
+From: Kees Cook <keescook@chromium.org>
+Subject: alloc_tag: Tighten file permissions on /proc/allocinfo
+Date: Thu, 25 Apr 2024 13:08:50 -0700
+
+The /proc/allocinfo file exposes a tremendous about of information about
+kernel build details, memory allocations (obviously), and potentially even
+image layout (due to ordering). As this is intended to be consumed by
+system owners (like /proc/slabinfo), use the same file permissions as
+there: 0400.
+
+Link: https://lkml.kernel.org/r/20240425200844.work.184-kees@kernel.org
+Signed-off-by: Kees Cook <keescook@chromium.org>
+Cc: Kent Overstreet <kent.overstreet@linux.dev>
+Cc: Suren Baghdasaryan <surenb@google.com>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+---
+
+ lib/alloc_tag.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/lib/alloc_tag.c~lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5
++++ a/lib/alloc_tag.c
+@@ -90,7 +90,7 @@ static const struct seq_operations alloc
+
+ static void __init procfs_init(void)
+ {
+- proc_create_seq("allocinfo", 0444, NULL, &allocinfo_seq_op);
++ proc_create_seq("allocinfo", 0400, NULL, &allocinfo_seq_op);
+ }
+
+ static bool alloc_tag_module_unload(struct codetag_type *cttype,
+_
diff --git a/patches/lib-add-memory-allocations-report-in-show_mem.patch b/patches/lib-add-memory-allocations-report-in-show_mem.patch
index 240724ba4..ad6625657 100644
--- a/patches/lib-add-memory-allocations-report-in-show_mem.patch
+++ b/patches/lib-add-memory-allocations-report-in-show_mem.patch
@@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-33-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
@@ -106,7 +106,7 @@ Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+
static void __init procfs_init(void)
{
- proc_create_seq("allocinfo", 0444, NULL, &allocinfo_seq_op);
+ proc_create_seq("allocinfo", 0400, NULL, &allocinfo_seq_op);
--- a/lib/codetag.c~lib-add-memory-allocations-report-in-show_mem
+++ a/lib/codetag.c
@@ -36,6 +36,11 @@ void codetag_lock_module_list(struct cod
diff --git a/patches/mm-simplify-thp_vma_allowable_order.patch b/patches/mm-simplify-thp_vma_allowable_order.patch
new file mode 100644
index 000000000..56b7a19fa
--- /dev/null
+++ b/patches/mm-simplify-thp_vma_allowable_order.patch
@@ -0,0 +1,221 @@
+From: Matthew Wilcox <willy@infradead.org>
+Subject: mm: simplify thp_vma_allowable_order
+Date: Thu, 25 Apr 2024 05:00:55 +0100
+
+Combine the three boolean arguments into one flags argument for
+readability.
+
+Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
+Cc: David Hildenbrand <david@redhat.com>
+Cc: Kefeng Wang <wangkefeng.wang@huawei.com>
+Cc: Ryan Roberts <ryan.roberts@arm.com>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+---
+
+ fs/proc/task_mmu.c | 4 ++--
+ include/linux/huge_mm.h | 29 +++++++++++++++--------------
+ mm/huge_memory.c | 7 +++++--
+ mm/khugepaged.c | 16 +++++++---------
+ mm/memory.c | 10 ++++++----
+ 5 files changed, 35 insertions(+), 31 deletions(-)
+
+--- a/fs/proc/task_mmu.c~mm-simplify-thp_vma_allowable_order
++++ a/fs/proc/task_mmu.c
+@@ -871,8 +871,8 @@ static int show_smap(struct seq_file *m,
+ __show_smap(m, &mss, false);
+
+ seq_printf(m, "THPeligible: %8u\n",
+- !!thp_vma_allowable_orders(vma, vma->vm_flags, true, false,
+- true, THP_ORDERS_ALL));
++ !!thp_vma_allowable_orders(vma, vma->vm_flags,
++ TVA_SMAPS | TVA_ENFORCE_SYSFS, THP_ORDERS_ALL));
+
+ if (arch_pkeys_enabled())
+ seq_printf(m, "ProtectionKey: %8u\n", vma_pkey(vma));
+--- a/include/linux/huge_mm.h~mm-simplify-thp_vma_allowable_order
++++ a/include/linux/huge_mm.h
+@@ -81,8 +81,12 @@ extern struct kobj_attribute shmem_enabl
+ */
+ #define THP_ORDERS_ALL (THP_ORDERS_ALL_ANON | THP_ORDERS_ALL_FILE)
+
+-#define thp_vma_allowable_order(vma, vm_flags, smaps, in_pf, enforce_sysfs, order) \
+- (!!thp_vma_allowable_orders(vma, vm_flags, smaps, in_pf, enforce_sysfs, BIT(order)))
++#define TVA_SMAPS (1 << 0) /* Will be used for procfs */
++#define TVA_IN_PF (1 << 1) /* Page fault handler */
++#define TVA_ENFORCE_SYSFS (1 << 2) /* Obey sysfs configuration */
++
++#define thp_vma_allowable_order(vma, vm_flags, tva_flags, order) \
++ (!!thp_vma_allowable_orders(vma, vm_flags, tva_flags, BIT(order)))
+
+ #ifdef CONFIG_PGTABLE_HAS_HUGE_LEAVES
+ #define HPAGE_PMD_SHIFT PMD_SHIFT
+@@ -218,17 +222,15 @@ static inline bool file_thp_enabled(stru
+ }
+
+ unsigned long __thp_vma_allowable_orders(struct vm_area_struct *vma,
+- unsigned long vm_flags, bool smaps,
+- bool in_pf, bool enforce_sysfs,
++ unsigned long vm_flags,
++ unsigned long tva_flags,
+ unsigned long orders);
+
+ /**
+ * thp_vma_allowable_orders - determine hugepage orders that are allowed for vma
+ * @vma: the vm area to check
+ * @vm_flags: use these vm_flags instead of vma->vm_flags
+- * @smaps: whether answer will be used for smaps file
+- * @in_pf: whether answer will be used by page fault handler
+- * @enforce_sysfs: whether sysfs config should be taken into account
++ * @tva_flags: Which TVA flags to honour
+ * @orders: bitfield of all orders to consider
+ *
+ * Calculates the intersection of the requested hugepage orders and the allowed
+@@ -241,12 +243,12 @@ unsigned long __thp_vma_allowable_orders
+ */
+ static inline
+ unsigned long thp_vma_allowable_orders(struct vm_area_struct *vma,
+- unsigned long vm_flags, bool smaps,
+- bool in_pf, bool enforce_sysfs,
++ unsigned long vm_flags,
++ unsigned long tva_flags,
+ unsigned long orders)
+ {
+ /* Optimization to check if required orders are enabled early. */
+- if (enforce_sysfs && vma_is_anonymous(vma)) {
++ if ((tva_flags & TVA_ENFORCE_SYSFS) && vma_is_anonymous(vma)) {
+ unsigned long mask = READ_ONCE(huge_anon_orders_always);
+
+ if (vm_flags & VM_HUGEPAGE)
+@@ -260,8 +262,7 @@ unsigned long thp_vma_allowable_orders(s
+ return 0;
+ }
+
+- return __thp_vma_allowable_orders(vma, vm_flags, smaps, in_pf,
+- enforce_sysfs, orders);
++ return __thp_vma_allowable_orders(vma, vm_flags, tva_flags, orders);
+ }
+
+ enum mthp_stat_item {
+@@ -428,8 +429,8 @@ static inline unsigned long thp_vma_suit
+ }
+
+ static inline unsigned long thp_vma_allowable_orders(struct vm_area_struct *vma,
+- unsigned long vm_flags, bool smaps,
+- bool in_pf, bool enforce_sysfs,
++ unsigned long vm_flags,
++ unsigned long tva_flags,
+ unsigned long orders)
+ {
+ return 0;
+--- a/mm/huge_memory.c~mm-simplify-thp_vma_allowable_order
++++ a/mm/huge_memory.c
+@@ -81,10 +81,13 @@ unsigned long huge_anon_orders_madvise _
+ unsigned long huge_anon_orders_inherit __read_mostly;
+
+ unsigned long __thp_vma_allowable_orders(struct vm_area_struct *vma,
+- unsigned long vm_flags, bool smaps,
+- bool in_pf, bool enforce_sysfs,
++ unsigned long vm_flags,
++ unsigned long tva_flags,
+ unsigned long orders)
+ {
++ bool smaps = tva_flags & TVA_SMAPS;
++ bool in_pf = tva_flags & TVA_IN_PF;
++ bool enforce_sysfs = tva_flags & TVA_ENFORCE_SYSFS;
+ /* Check the intersection of requested and supported orders. */
+ orders &= vma_is_anonymous(vma) ?
+ THP_ORDERS_ALL_ANON : THP_ORDERS_ALL_FILE;
+--- a/mm/khugepaged.c~mm-simplify-thp_vma_allowable_order
++++ a/mm/khugepaged.c
+@@ -453,7 +453,7 @@ void khugepaged_enter_vma(struct vm_area
+ {
+ if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) &&
+ hugepage_flags_enabled()) {
+- if (thp_vma_allowable_order(vma, vm_flags, false, false, true,
++ if (thp_vma_allowable_order(vma, vm_flags, TVA_ENFORCE_SYSFS,
+ PMD_ORDER))
+ __khugepaged_enter(vma->vm_mm);
+ }
+@@ -900,6 +900,7 @@ static int hugepage_vma_revalidate(struc
+ struct collapse_control *cc)
+ {
+ struct vm_area_struct *vma;
++ unsigned long tva_flags = cc->is_khugepaged ? TVA_ENFORCE_SYSFS : 0;
+
+ if (unlikely(hpage_collapse_test_exit_or_disable(mm)))
+ return SCAN_ANY_PROCESS;
+@@ -910,8 +911,7 @@ static int hugepage_vma_revalidate(struc
+
+ if (!thp_vma_suitable_order(vma, address, PMD_ORDER))
+ return SCAN_ADDRESS_RANGE;
+- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false,
+- cc->is_khugepaged, PMD_ORDER))
++ if (!thp_vma_allowable_order(vma, vma->vm_flags, tva_flags, PMD_ORDER))
+ return SCAN_VMA_CHECK;
+ /*
+ * Anon VMA expected, the address may be unmapped then
+@@ -1501,8 +1501,7 @@ int collapse_pte_mapped_thp(struct mm_st
+ * and map it by a PMD, regardless of sysfs THP settings. As such, let's
+ * analogously elide sysfs THP settings here.
+ */
+- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false, false,
+- PMD_ORDER))
++ if (!thp_vma_allowable_order(vma, vma->vm_flags, 0, PMD_ORDER))
+ return SCAN_VMA_CHECK;
+
+ /* Keep pmd pgtable for uffd-wp; see comment in retract_page_tables() */
+@@ -2363,8 +2362,8 @@ static unsigned int khugepaged_scan_mm_s
+ progress++;
+ break;
+ }
+- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false,
+- true, PMD_ORDER)) {
++ if (!thp_vma_allowable_order(vma, vma->vm_flags,
++ TVA_ENFORCE_SYSFS, PMD_ORDER)) {
+ skip:
+ progress++;
+ continue;
+@@ -2701,8 +2700,7 @@ int madvise_collapse(struct vm_area_stru
+
+ *prev = vma;
+
+- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false, false,
+- PMD_ORDER))
++ if (!thp_vma_allowable_order(vma, vma->vm_flags, 0, PMD_ORDER))
+ return -EINVAL;
+
+ cc = kmalloc(sizeof(*cc), GFP_KERNEL);
+--- a/mm/memory.c~mm-simplify-thp_vma_allowable_order
++++ a/mm/memory.c
+@@ -4334,8 +4334,8 @@ static struct folio *alloc_anon_folio(st
+ * for this vma. Then filter out the orders that can't be allocated over
+ * the faulting address and still be fully contained in the vma.
+ */
+- orders = thp_vma_allowable_orders(vma, vma->vm_flags, false, true, true,
+- BIT(PMD_ORDER) - 1);
++ orders = thp_vma_allowable_orders(vma, vma->vm_flags,
++ TVA_IN_PF | TVA_ENFORCE_SYSFS, BIT(PMD_ORDER) - 1);
+ orders = thp_vma_suitable_orders(vma, vmf->address, orders);
+
+ if (!orders)
+@@ -5438,7 +5438,8 @@ static vm_fault_t __handle_mm_fault(stru
+ return VM_FAULT_OOM;
+ retry_pud:
+ if (pud_none(*vmf.pud) &&
+- thp_vma_allowable_order(vma, vm_flags, false, true, true, PUD_ORDER)) {
++ thp_vma_allowable_order(vma, vm_flags,
++ TVA_IN_PF | TVA_ENFORCE_SYSFS, PUD_ORDER)) {
+ ret = create_huge_pud(&vmf);
+ if (!(ret & VM_FAULT_FALLBACK))
+ return ret;
+@@ -5472,7 +5473,8 @@ retry_pud:
+ goto retry_pud;
+
+ if (pmd_none(*vmf.pmd) &&
+- thp_vma_allowable_order(vma, vm_flags, false, true, true, PMD_ORDER)) {
++ thp_vma_allowable_order(vma, vm_flags,
++ TVA_IN_PF | TVA_ENFORCE_SYSFS, PMD_ORDER)) {
+ ret = create_huge_pmd(&vmf);
+ if (!(ret & VM_FAULT_FALLBACK))
+ return ret;
+_
diff --git a/patches/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch b/patches/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch
index dcee63f72..dcee63f72 100644
--- a/patches/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch
+++ b/patches/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch
diff --git a/pc/devel-series b/pc/devel-series
index de730877b..0f47eeb83 100644
--- a/pc/devel-series
+++ b/pc/devel-series
@@ -141,6 +141,8 @@ maintainers-update-urls-for-keys-keyrings_integrity-and-tpm-device-driver.patch
tools-fix-userspace-compilation-with-new-test_xarray-changes.patch
lib-test_xarrayc-fix-error-assumptions-on-check_xa_multi_store_adv_add.patch
#
+kmsan-compiler_types-declare-__no_sanitize_or_inline.patch
+#
### hfe
#
#ENDBRANCH mm-hotfixes-unstable
@@ -260,6 +262,8 @@ memprofiling-documentation.patch
#
mm-change-inlined-allocation-helpers-to-account-at-the-call-site.patch
#
+lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch
+#
mm-always-initialise-folio-_deferred_list.patch
mm-always-initialise-folio-_deferred_list-fix.patch
mm-remove-folio_prep_large_rmappable.patch
@@ -689,11 +693,6 @@ mm-arm64-override-clear_young_dirty_ptes-batch-helper.patch
mm-memory-add-any_dirty-optional-pointer-to-folio_pte_batch.patch
mm-madvise-optimize-lazyfreeing-with-mthp-in-madvise_free.patch
#
-#
-#
-#mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch: check review
-mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch
-#
mm-page-flags-make-pageuptodate-return-bool.patch
#
mm-memory-check-userfaultfd_wp-in-vmf_orig_pte_uffd_wp.patch
@@ -703,7 +702,6 @@ memcg-simple-cleanup-of-stats-update-functions.patch
xarray-use-bits_per_longs.patch
xarray-dont-use-proxy-headers.patch
#
-#
mm-memory-failure-remove-fsdax_pgoff-argument-from-__add_to_kill.patch
mm-memory-failure-pass-addr-to-__add_to_kill.patch
mm-return-the-address-from-page_mapped_in_vma.patch
@@ -754,6 +752,8 @@ mm-remove-stale-comment-__folio_mark_dirty.patch
#mm-fix-race-between-__split_huge_pmd_locked-and-gup-fast.patch: https://lkml.kernel.org/r/922F6794-1C32-4862-8A67-90D4F7DBC474@nvidia.com
mm-fix-race-between-__split_huge_pmd_locked-and-gup-fast.patch
#
+mm-simplify-thp_vma_allowable_order.patch
+#
#
#
#
diff --git a/pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc b/pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc
new file mode 100644
index 000000000..32ec11627
--- /dev/null
+++ b/pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc
@@ -0,0 +1 @@
+include/linux/compiler_types.h
diff --git a/pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc b/pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc
new file mode 100644
index 000000000..4aea30396
--- /dev/null
+++ b/pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc
@@ -0,0 +1 @@
+lib/alloc_tag.c
diff --git a/pc/mm-simplify-thp_vma_allowable_order.pc b/pc/mm-simplify-thp_vma_allowable_order.pc
new file mode 100644
index 000000000..bbea1500c
--- /dev/null
+++ b/pc/mm-simplify-thp_vma_allowable_order.pc
@@ -0,0 +1,5 @@
+fs/proc/task_mmu.c
+include/linux/huge_mm.h
+mm/huge_memory.c
+mm/khugepaged.c
+mm/memory.c
diff --git a/pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc b/pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc
deleted file mode 100644
index 9d3bf5073..000000000
--- a/pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc
+++ /dev/null
@@ -1,5 +0,0 @@
-include/linux/huge_mm.h
-include/linux/rmap.h
-mm/huge_memory.c
-mm/rmap.c
-mm/vmscan.c
diff --git a/txt/asm-generic-ioh-kill-vmalloch-dependency.txt b/txt/asm-generic-ioh-kill-vmalloch-dependency.txt
index 61899d600..5c9d47c7c 100644
--- a/txt/asm-generic-ioh-kill-vmalloch-dependency.txt
+++ b/txt/asm-generic-ioh-kill-vmalloch-dependency.txt
@@ -12,6 +12,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-3-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Tejun Heo <tj@kernel.org>
diff --git a/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt b/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt
index dcaf6b1aa..eb7d2c765 100644
--- a/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt
+++ b/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt
@@ -8,6 +8,7 @@ when it's not intended.
Link: https://lkml.kernel.org/r/20240321163705.3067592-18-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt b/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt
index 75baef2a4..dc6aaa907 100644
--- a/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt
+++ b/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt
@@ -14,6 +14,7 @@ avoid warnings implemented by CONFIG_MEM_ALLOC_PROFILING_DEBUG checks.
Link: https://lkml.kernel.org/r/20240321163705.3067592-36-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -24,7 +25,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt b/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt
index fcd1f8fda..2fa9adfe3 100644
--- a/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt
+++ b/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt
@@ -9,6 +9,7 @@ freeing.
Link: https://lkml.kernel.org/r/20240321163705.3067592-35-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt b/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt
index f138c7860..b3979069b 100644
--- a/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt
+++ b/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt
@@ -13,6 +13,7 @@ the codetag is expected to be empty.
Link: https://lkml.kernel.org/r/20240321163705.3067592-34-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -23,7 +24,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/fix-missing-vmalloch-includes-fix-5.txt b/txt/fix-missing-vmalloch-includes-fix-5.txt
index 18f912d66..1e78bcb39 100644
--- a/txt/fix-missing-vmalloch-includes-fix-5.txt
+++ b/txt/fix-missing-vmalloch-includes-fix-5.txt
@@ -22,6 +22,7 @@ mm/kasan/hw_tags.c:285:41: error: invalid use of undefined type 'struct vm_struc
Link: https://lkml.kernel.org/r/20240404124435.3121534-1-arnd@kernel.org
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Potapenko <glider@google.com>
Cc: Andrey Konovalov <andreyknvl@gmail.com>
Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com>
diff --git a/txt/fix-missing-vmalloch-includes.txt b/txt/fix-missing-vmalloch-includes.txt
index b544cdfce..e4fac9ae7 100644
--- a/txt/fix-missing-vmalloch-includes.txt
+++ b/txt/fix-missing-vmalloch-includes.txt
@@ -122,6 +122,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-2-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -132,7 +133,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Tejun Heo <tj@kernel.org>
diff --git a/txt/fs-convert-alloc_inode_sb-to-a-macro.txt b/txt/fs-convert-alloc_inode_sb-to-a-macro.txt
index a55ef683f..bde83effb 100644
--- a/txt/fs-convert-alloc_inode_sb-to-a-macro.txt
+++ b/txt/fs-convert-alloc_inode_sb-to-a-macro.txt
@@ -12,6 +12,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
Cc: Andreas Hindborg <a.hindborg@samsung.com>
diff --git a/txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt b/txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt
new file mode 100644
index 000000000..3fec1eb53
--- /dev/null
+++ b/txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt
@@ -0,0 +1,18 @@
+From: Alexander Potapenko <glider@google.com>
+Subject: kmsan: compiler_types: declare __no_sanitize_or_inline
+Date: Thu, 25 Apr 2024 11:28:59 +0200
+
+It turned out that KMSAN instruments READ_ONCE_NOCHECK(), resulting in
+false positive reports, because __no_sanitize_or_inline enforced inlining.
+
+Properly declare __no_sanitize_or_inline under __SANITIZE_MEMORY__,
+so that it does not inline the annotated function.
+
+Link: https://lkml.kernel.org/r/20240425092859.3370297-1-glider@google.com
+Reported-by: syzbot+355c5bb8c1445c871ee8@syzkaller.appspotmail.com
+Link: https://lkml.kernel.org/r/000000000000826ac1061675b0e3@google.com
+Signed-off-by: Alexander Potapenko <glider@google.com>
+Reviewed-by: Marco Elver <elver@google.com>
+Cc: Dmitry Vyukov <dvyukov@google.com>
+Cc: Miguel Ojeda <ojeda@kernel.org>
+Cc: <stable@vger.kernel.org>
diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt
index 98ae17b6b..66aebd88e 100644
--- a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt
+++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt
@@ -13,5 +13,6 @@ Link: https://lkml.kernel.org/r/20240402180933.1663992-2-surenb@google.com
Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202403290334.USWrYrMw-lkp@intel.com/
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt
index 080d4e964..8a84e9061 100644
--- a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt
+++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt
@@ -21,4 +21,5 @@ Fixes: ac906a377c67 ("lib: add allocation tagging support for memory allocation
Link: https://lore.kernel.org/lkml/6b8149f3-80e6-413c-abcb-1925ecda9d8c@gmail.com/
Signed-off-by: Klara Modin <klarasmodin@gmail.com>
Acked-by: Kent Overstreet <kent.overstreet@linux.dev>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Suren Baghdasaryan <surenb@google.com>
diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt
new file mode 100644
index 000000000..6bf72ca52
--- /dev/null
+++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt
@@ -0,0 +1,14 @@
+From: Kees Cook <keescook@chromium.org>
+Subject: alloc_tag: Tighten file permissions on /proc/allocinfo
+Date: Thu, 25 Apr 2024 13:08:50 -0700
+
+The /proc/allocinfo file exposes a tremendous about of information about
+kernel build details, memory allocations (obviously), and potentially even
+image layout (due to ordering). As this is intended to be consumed by
+system owners (like /proc/slabinfo), use the same file permissions as
+there: 0400.
+
+Link: https://lkml.kernel.org/r/20240425200844.work.184-kees@kernel.org
+Signed-off-by: Kees Cook <keescook@chromium.org>
+Cc: Kent Overstreet <kent.overstreet@linux.dev>
+Cc: Suren Baghdasaryan <surenb@google.com>
diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt
index 3fa749eae..30765ab69 100644
--- a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt
+++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt
@@ -19,6 +19,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-14-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -29,7 +30,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/lib-add-codetag-reference-into-slabobj_ext.txt b/txt/lib-add-codetag-reference-into-slabobj_ext.txt
index 3d6140479..a2969e314 100644
--- a/txt/lib-add-codetag-reference-into-slabobj_ext.txt
+++ b/txt/lib-add-codetag-reference-into-slabobj_ext.txt
@@ -10,6 +10,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -20,7 +21,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/lib-add-memory-allocations-report-in-show_mem.txt b/txt/lib-add-memory-allocations-report-in-show_mem.txt
index 239b3d7d5..125e4771f 100644
--- a/txt/lib-add-memory-allocations-report-in-show_mem.txt
+++ b/txt/lib-add-memory-allocations-report-in-show_mem.txt
@@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-33-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/lib-code-tagging-framework.txt b/txt/lib-code-tagging-framework.txt
index 141f19877..8e496524c 100644
--- a/txt/lib-code-tagging-framework.txt
+++ b/txt/lib-code-tagging-framework.txt
@@ -11,6 +11,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-11-surenb@google.com
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -21,7 +22,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/lib-code-tagging-module-support.txt b/txt/lib-code-tagging-module-support.txt
index 2fa80c063..fb8777b03 100644
--- a/txt/lib-code-tagging-module-support.txt
+++ b/txt/lib-code-tagging-module-support.txt
@@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-12-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt b/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt
index fd584b813..d21c1ba95 100644
--- a/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt
+++ b/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt
@@ -28,6 +28,7 @@ early boot parameter.
Link: https://lkml.kernel.org/r/20240321163705.3067592-16-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -38,7 +39,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/lib-introduce-support-for-page-allocation-tagging.txt b/txt/lib-introduce-support-for-page-allocation-tagging.txt
index 3b3b5af74..fa62a9455 100644
--- a/txt/lib-introduce-support-for-page-allocation-tagging.txt
+++ b/txt/lib-introduce-support-for-page-allocation-tagging.txt
@@ -11,6 +11,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -21,7 +22,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt b/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt
index 551eb27d0..35a77479c 100644
--- a/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt
+++ b/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt
@@ -8,6 +8,7 @@ code tag would cause UAF.
Link: https://lkml.kernel.org/r/20240321163705.3067592-13-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt
index cf3ac0e8c..deb7b4bb1 100644
--- a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt
+++ b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt
@@ -13,4 +13,5 @@ drop the entries to non-existing files.
Link: https://lkml.kernel.org/r/20240411064717.51140-1-lukas.bulwahn@redhat.com
Signed-off-by: Lukas Bulwahn <lukas.bulwahn@redhat.com>
Acked-by: Kent Overstreet <kent.overstreet@linux.dev>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Suren Baghdasaryan <surenb@google.com>
diff --git a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt
index 386e675ff..49b258894 100644
--- a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt
+++ b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt
@@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-37-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/memory-failure-remove-calls-to-page_mapping.txt b/txt/memory-failure-remove-calls-to-page_mapping.txt
index de1fa4e58..9fd908011 100644
--- a/txt/memory-failure-remove-calls-to-page_mapping.txt
+++ b/txt/memory-failure-remove-calls-to-page_mapping.txt
@@ -8,4 +8,5 @@ Link: https://lkml.kernel.org/r/20240423225552.4113447-4-willy@infradead.org
Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
Reviewed-by: Sidhartha Kumar <sidhartha.kumar@oracle.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
+Acked-by: Miaohe Lin <linmiaohe@huawei.com>
Cc: Eric Biggers <ebiggers@google.com>
diff --git a/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt b/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt
index 9eb69174d..2e9dd3ef8 100644
--- a/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt
+++ b/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt
@@ -9,3 +9,4 @@ Link: https://lkml.kernel.org/r/20240402180835.1661905-1-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202404010132.6v0zt6oa-lkp@intel.com/
+Tested-by: Kees Cook <keescook@chromium.org>
diff --git a/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt b/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt
index 7d92c2ef5..cdb47ec8f 100644
--- a/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt
+++ b/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt
@@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-4-surenb@google.com
Fixes: 01d3a2ac5e7f ("mempool: hook up to memory allocation profiling")
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Tested-by: Randy Dunlap <rdunlap@infradead.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
diff --git a/txt/mempool-hook-up-to-memory-allocation-profiling.txt b/txt/mempool-hook-up-to-memory-allocation-profiling.txt
index 80ba32fda..8181f6eda 100644
--- a/txt/mempool-hook-up-to-memory-allocation-profiling.txt
+++ b/txt/mempool-hook-up-to-memory-allocation-profiling.txt
@@ -12,6 +12,7 @@ alloc_hooks() in fewer places.
Link: https://lkml.kernel.org/r/20240321163705.3067592-27-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/memprofiling-documentation.txt b/txt/memprofiling-documentation.txt
index 78cff9fff..ca2c32118 100644
--- a/txt/memprofiling-documentation.txt
+++ b/txt/memprofiling-documentation.txt
@@ -7,6 +7,7 @@ Provide documentation for memory allocation profiling.
Link: https://lkml.kernel.org/r/20240321163705.3067592-38-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -17,7 +18,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/mm-create-new-codetag-references-during-page-splitting.txt b/txt/mm-create-new-codetag-references-during-page-splitting.txt
index 71abbe0c5..dd8b84a88 100644
--- a/txt/mm-create-new-codetag-references-during-page-splitting.txt
+++ b/txt/mm-create-new-codetag-references-during-page-splitting.txt
@@ -12,6 +12,7 @@ individual pages get freed.
Link: https://lkml.kernel.org/r/20240321163705.3067592-20-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/mm-enable-page-allocation-tagging-fix.txt b/txt/mm-enable-page-allocation-tagging-fix.txt
index 783648257..97a488472 100644
--- a/txt/mm-enable-page-allocation-tagging-fix.txt
+++ b/txt/mm-enable-page-allocation-tagging-fix.txt
@@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-3-surenb@google.com
Fixes: 6522e08ac1c6 ("mm: enable page allocation tagging")
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Tested-by: Randy Dunlap <rdunlap@infradead.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
diff --git a/txt/mm-enable-page-allocation-tagging.txt b/txt/mm-enable-page-allocation-tagging.txt
index 44c023be0..33a03f2b1 100644
--- a/txt/mm-enable-page-allocation-tagging.txt
+++ b/txt/mm-enable-page-allocation-tagging.txt
@@ -11,6 +11,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Reviewed-by: Kees Cook <keescook@chromium.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt b/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt
index dafe0314b..a747908fd 100644
--- a/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt
+++ b/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt
@@ -13,6 +13,7 @@ pages.
Link: https://lkml.kernel.org/r/20240321163705.3067592-21-surenb@google.com
Reported-by: Vlastimil Babka <vbabka@suse.cz>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -23,7 +24,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt b/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt
index e4704d84b..eddd69bc9 100644
--- a/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt
+++ b/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt
@@ -73,5 +73,5 @@ the end that will fix this crash for me.
Link: https://lkml.kernel.org/r/ZikjPB0Dt5HA8-uL@x1n
Signed-off-by: Peter Xu <peterx@redhat.com>
+Reviewed-by: Matthew Wilcox (Oracle) <willy@infradead.org>
Cc: Alex Williamson <alex.williamson@redhat.com>
-Cc: Matthew Wilcox (Oracle) <willy@infradead.org>
diff --git a/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt b/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt
index 2945f8d9f..87803912c 100644
--- a/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt
+++ b/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt
@@ -14,9 +14,7 @@ This patch (of 5):
free_unref_folios() can now handle non-hugetlb large folios, so keep
normal large folios in the batch. hugetlb folios still need to be handled
-specially. I believe that folios freed using put_pages_list() cannot be
-accounted to a memcg (or the small folios would trip the "page still
-charged to cgroup" warning), but put an assertion in to check that.
+specially.
Link: https://lkml.kernel.org/r/20240405153228.2563754-1-willy@infradead.org
Link: https://lkml.kernel.org/r/20240405153228.2563754-2-willy@infradead.org
diff --git a/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt b/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt
index c8bc7998c..0881eeb39 100644
--- a/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt
+++ b/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt
@@ -10,6 +10,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt b/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt
index af4c2d5c6..d721a9344 100644
--- a/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt
+++ b/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt
@@ -12,6 +12,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-7-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt b/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt
index bf6973376..604f9952b 100644
--- a/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt
+++ b/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt
@@ -8,6 +8,7 @@ guarded with a certain ifdeffery, do the same for add_to_free_list().
Link: https://lkml.kernel.org/r/20240423161506.2637177-1-andriy.shevchenko@linux.intel.com
Signed-off-by: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
+Reviewed-by: Miaohe Lin <linmiaohe@huawei.com>
Cc: Baolin Wang <baolin.wang@linux.alibaba.com>
Cc: Johannes Weiner <hannes@cmpxchg.org>
Cc: Vlastimil Babka <vbabka@suse.cz>
diff --git a/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt b/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt
index 6c70ada33..5e86fdaa3 100644
--- a/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt
+++ b/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt
@@ -17,6 +17,7 @@ CONFIG_MEM_ALLOC_PROFILING.
Link: https://lkml.kernel.org/r/20240321163705.3067592-22-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -27,7 +28,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
diff --git a/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt b/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt
index 068ccb5a5..2ade06f0e 100644
--- a/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt
+++ b/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt
@@ -9,6 +9,7 @@ the newly introduced codetag are added.
Link: https://lkml.kernel.org/r/20240321163705.3067592-29-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -19,7 +20,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt b/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt
index 1d6b85005..90d80fe32 100644
--- a/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt
+++ b/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt
@@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-6-surenb@google.com
Fixes: b3942167cb9f ("mm: percpu: enable per-cpu allocation tagging")
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Tested-by: Randy Dunlap <rdunlap@infradead.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
diff --git a/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt b/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt
index 68e94c079..1d713972a 100644
--- a/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt
+++ b/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt
@@ -8,6 +8,7 @@ to record allocations and deallocations done by these functions.
Link: https://lkml.kernel.org/r/20240321163705.3067592-30-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt b/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt
index 37b9e95e9..1bd2ce3f9 100644
--- a/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt
+++ b/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt
@@ -10,6 +10,7 @@ dynamically.
Link: https://lkml.kernel.org/r/20240321163705.3067592-17-surenb@google.com
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Tejun Heo <tj@kernel.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
@@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Vlastimil Babka <vbabka@suse.cz>
diff --git a/txt/mm-percpu-introduce-pcpuobj_ext.txt b/txt/mm-percpu-introduce-pcpuobj_ext.txt
index 7311ba21c..88e82c816 100644
--- a/txt/mm-percpu-introduce-pcpuobj_ext.txt
+++ b/txt/mm-percpu-introduce-pcpuobj_ext.txt
@@ -13,7 +13,7 @@ previous slabobj_ext patch.
Link: https://lkml.kernel.org/r/20240321163705.3067592-28-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
-Cc: Andrew Morton <akpm@linux-foundation.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Tejun Heo <tj@kernel.org>
Cc: Christoph Lameter <cl@linux.com>
@@ -26,7 +26,6 @@ Cc: Benno Lossin <benno.lossin@proton.me>
Cc: "Björn Roy Baron" <bjorn3_gh@protonmail.com>
Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/mm-simplify-thp_vma_allowable_order.txt b/txt/mm-simplify-thp_vma_allowable_order.txt
new file mode 100644
index 000000000..40bfc6c24
--- /dev/null
+++ b/txt/mm-simplify-thp_vma_allowable_order.txt
@@ -0,0 +1,11 @@
+From: Matthew Wilcox <willy@infradead.org>
+Subject: mm: simplify thp_vma_allowable_order
+Date: Thu, 25 Apr 2024 05:00:55 +0100
+
+Combine the three boolean arguments into one flags argument for
+readability.
+
+Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
+Cc: David Hildenbrand <david@redhat.com>
+Cc: Kefeng Wang <wangkefeng.wang@huawei.com>
+Cc: Ryan Roberts <ryan.roberts@arm.com>
diff --git a/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt b/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt
index eeab075b4..4724690d2 100644
--- a/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt
+++ b/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt
@@ -10,6 +10,7 @@ Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt
index 0d484bd30..5b7087705 100644
--- a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt
+++ b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt
@@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-7-surenb@google.com
Fixes: bc7b83f5e4bf ("mm/slab: enable slab allocation tagging for kmalloc and friends")
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Tested-by: Randy Dunlap <rdunlap@infradead.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
diff --git a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt
index 5d90e152d..5094a4612 100644
--- a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt
+++ b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt
@@ -10,6 +10,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Reviewed-by: Kees Cook <keescook@chromium.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt b/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt
index c501f94fe..23704ef4d 100644
--- a/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt
+++ b/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt
@@ -14,6 +14,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt b/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt
index f03718e80..b9cb0975a 100644
--- a/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt
+++ b/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt
@@ -11,6 +11,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt
index 620c698ac..405300c6f 100644
--- a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt
+++ b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt
@@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-5-surenb@google.com
Fixes: ed49858097c1 ("mm: vmalloc: enable memory allocation profiling")
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Tested-by: Randy Dunlap <rdunlap@infradead.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
diff --git a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt
index 491d5a442..8ed90a623 100644
--- a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt
+++ b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt
@@ -23,3 +23,4 @@ Closes: https://lore.kernel.org/all/20240323180506.195396-1-sj@kernel.org/
Tested-by: SeongJae Park <sj@kernel.org>
Reviewed-by: Johannes Berg <johannes@sipsolutions.net
Acked-by: Richard Weinberger <richard@nod.at>
+Tested-by: Kees Cook <keescook@chromium.org>
diff --git a/txt/mm-vmalloc-enable-memory-allocation-profiling.txt b/txt/mm-vmalloc-enable-memory-allocation-profiling.txt
index ed51123f1..be4856087 100644
--- a/txt/mm-vmalloc-enable-memory-allocation-profiling.txt
+++ b/txt/mm-vmalloc-enable-memory-allocation-profiling.txt
@@ -10,6 +10,7 @@ feature.
Link: https://lkml.kernel.org/r/20240321163705.3067592-31-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -20,7 +21,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt b/txt/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt
index 66667fbf6..66667fbf6 100644
--- a/txt/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt
+++ b/txt/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt
diff --git a/txt/rhashtable-plumb-through-alloc-tag-fix.txt b/txt/rhashtable-plumb-through-alloc-tag-fix.txt
index 0c243a87d..58ef80802 100644
--- a/txt/rhashtable-plumb-through-alloc-tag-fix.txt
+++ b/txt/rhashtable-plumb-through-alloc-tag-fix.txt
@@ -22,4 +22,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-2-surenb@google.com
Fixes: 11c91be0e244 ("rhashtable: plumb through alloc tag")
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Tested-by: Randy Dunlap <rdunlap@infradead.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
diff --git a/txt/rhashtable-plumb-through-alloc-tag.txt b/txt/rhashtable-plumb-through-alloc-tag.txt
index 424139cb4..353c4fd03 100644
--- a/txt/rhashtable-plumb-through-alloc-tag.txt
+++ b/txt/rhashtable-plumb-through-alloc-tag.txt
@@ -8,6 +8,7 @@ allocations will be accounted to the code that initialized the rhashtable.
Link: https://lkml.kernel.org/r/20240321163705.3067592-32-surenb@google.com
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
@@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
Cc: Gary Guo <gary@garyguo.net>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Miguel Ojeda <ojeda@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
diff --git a/txt/rust-add-a-rust-helper-for-krealloc.txt b/txt/rust-add-a-rust-helper-for-krealloc.txt
index 9b103fb0b..77a6caa03 100644
--- a/txt/rust-add-a-rust-helper-for-krealloc.txt
+++ b/txt/rust-add-a-rust-helper-for-krealloc.txt
@@ -14,6 +14,7 @@ Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Alice Ryhl <aliceryhl@google.com>
Acked-by: Miguel Ojeda <ojeda@kernel.org>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Wedson Almeida Filho <wedsonaf@gmail.com>
Cc: Boqun Feng <boqun.feng@gmail.com>
@@ -24,7 +25,6 @@ Cc: Andreas Hindborg <a.hindborg@samsung.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Christoph Lameter <cl@linux.com>
Cc: Dennis Zhou <dennis@kernel.org>
-Cc: Kees Cook <keescook@chromium.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Tejun Heo <tj@kernel.org>
diff --git a/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt b/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt
index 2731f40a1..dccf9c364 100644
--- a/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt
+++ b/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt
@@ -11,6 +11,7 @@ Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>
diff --git a/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt b/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt
index c7c50eb2c..3c7b060d6 100644
--- a/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt
+++ b/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt
@@ -9,6 +9,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
+Tested-by: Kees Cook <keescook@chromium.org>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Alex Gaynor <alex.gaynor@gmail.com>
Cc: Alice Ryhl <aliceryhl@google.com>