diff options
author | Andrew Morton <akpm@linux-foundation.org> | 2024-04-25 14:12:09 -0700 |
---|---|---|
committer | Andrew Morton <akpm@linux-foundation.org> | 2024-04-25 14:12:09 -0700 |
commit | 6d8717842a198ba2b29a9088f42b0264a2302ac4 (patch) | |
tree | 4bb8576ee3dd8a49f6af75e1deaa1a9f4aac6576 | |
parent | 29bf28a395328a3258cb7334153aec7cfcc0e881 (diff) | |
download | 25-new-6d8717842a198ba2b29a9088f42b0264a2302ac4.tar.gz |
foo
67 files changed, 409 insertions, 44 deletions
diff --git a/patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch b/patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch new file mode 100644 index 000000000..c2f114eac --- /dev/null +++ b/patches/kmsan-compiler_types-declare-__no_sanitize_or_inline.patch @@ -0,0 +1,45 @@ +From: Alexander Potapenko <glider@google.com> +Subject: kmsan: compiler_types: declare __no_sanitize_or_inline +Date: Thu, 25 Apr 2024 11:28:59 +0200 + +It turned out that KMSAN instruments READ_ONCE_NOCHECK(), resulting in +false positive reports, because __no_sanitize_or_inline enforced inlining. + +Properly declare __no_sanitize_or_inline under __SANITIZE_MEMORY__, +so that it does not inline the annotated function. + +Link: https://lkml.kernel.org/r/20240425092859.3370297-1-glider@google.com +Reported-by: syzbot+355c5bb8c1445c871ee8@syzkaller.appspotmail.com +Link: https://lkml.kernel.org/r/000000000000826ac1061675b0e3@google.com +Signed-off-by: Alexander Potapenko <glider@google.com> +Reviewed-by: Marco Elver <elver@google.com> +Cc: Dmitry Vyukov <dvyukov@google.com> +Cc: Miguel Ojeda <ojeda@kernel.org> +Cc: <stable@vger.kernel.org> +Signed-off-by: Andrew Morton <akpm@linux-foundation.org> +--- + + include/linux/compiler_types.h | 11 +++++++++++ + 1 file changed, 11 insertions(+) + +--- a/include/linux/compiler_types.h~kmsan-compiler_types-declare-__no_sanitize_or_inline ++++ a/include/linux/compiler_types.h +@@ -278,6 +278,17 @@ struct ftrace_likely_data { + # define __no_kcsan + #endif + ++#ifdef __SANITIZE_MEMORY__ ++/* ++ * Similarly to KASAN and KCSAN, KMSAN loses function attributes of inlined ++ * functions, therefore disabling KMSAN checks also requires disabling inlining. ++ * ++ * __no_sanitize_or_inline effectively prevents KMSAN from reporting errors ++ * within the function and marks all its outputs as initialized. ++ */ ++# define __no_sanitize_or_inline __no_kmsan_checks notrace __maybe_unused ++#endif ++ + #ifndef __no_sanitize_or_inline + #define __no_sanitize_or_inline __always_inline + #endif +_ diff --git a/patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch b/patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch new file mode 100644 index 000000000..84405803b --- /dev/null +++ b/patches/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch @@ -0,0 +1,32 @@ +From: Kees Cook <keescook@chromium.org> +Subject: alloc_tag: Tighten file permissions on /proc/allocinfo +Date: Thu, 25 Apr 2024 13:08:50 -0700 + +The /proc/allocinfo file exposes a tremendous about of information about +kernel build details, memory allocations (obviously), and potentially even +image layout (due to ordering). As this is intended to be consumed by +system owners (like /proc/slabinfo), use the same file permissions as +there: 0400. + +Link: https://lkml.kernel.org/r/20240425200844.work.184-kees@kernel.org +Signed-off-by: Kees Cook <keescook@chromium.org> +Cc: Kent Overstreet <kent.overstreet@linux.dev> +Cc: Suren Baghdasaryan <surenb@google.com> +Signed-off-by: Andrew Morton <akpm@linux-foundation.org> +--- + + lib/alloc_tag.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- a/lib/alloc_tag.c~lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5 ++++ a/lib/alloc_tag.c +@@ -90,7 +90,7 @@ static const struct seq_operations alloc + + static void __init procfs_init(void) + { +- proc_create_seq("allocinfo", 0444, NULL, &allocinfo_seq_op); ++ proc_create_seq("allocinfo", 0400, NULL, &allocinfo_seq_op); + } + + static bool alloc_tag_module_unload(struct codetag_type *cttype, +_ diff --git a/patches/lib-add-memory-allocations-report-in-show_mem.patch b/patches/lib-add-memory-allocations-report-in-show_mem.patch index 240724ba4..ad6625657 100644 --- a/patches/lib-add-memory-allocations-report-in-show_mem.patch +++ b/patches/lib-add-memory-allocations-report-in-show_mem.patch @@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-33-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> @@ -106,7 +106,7 @@ Signed-off-by: Andrew Morton <akpm@linux-foundation.org> + static void __init procfs_init(void) { - proc_create_seq("allocinfo", 0444, NULL, &allocinfo_seq_op); + proc_create_seq("allocinfo", 0400, NULL, &allocinfo_seq_op); --- a/lib/codetag.c~lib-add-memory-allocations-report-in-show_mem +++ a/lib/codetag.c @@ -36,6 +36,11 @@ void codetag_lock_module_list(struct cod diff --git a/patches/mm-simplify-thp_vma_allowable_order.patch b/patches/mm-simplify-thp_vma_allowable_order.patch new file mode 100644 index 000000000..56b7a19fa --- /dev/null +++ b/patches/mm-simplify-thp_vma_allowable_order.patch @@ -0,0 +1,221 @@ +From: Matthew Wilcox <willy@infradead.org> +Subject: mm: simplify thp_vma_allowable_order +Date: Thu, 25 Apr 2024 05:00:55 +0100 + +Combine the three boolean arguments into one flags argument for +readability. + +Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org> +Cc: David Hildenbrand <david@redhat.com> +Cc: Kefeng Wang <wangkefeng.wang@huawei.com> +Cc: Ryan Roberts <ryan.roberts@arm.com> +Signed-off-by: Andrew Morton <akpm@linux-foundation.org> +--- + + fs/proc/task_mmu.c | 4 ++-- + include/linux/huge_mm.h | 29 +++++++++++++++-------------- + mm/huge_memory.c | 7 +++++-- + mm/khugepaged.c | 16 +++++++--------- + mm/memory.c | 10 ++++++---- + 5 files changed, 35 insertions(+), 31 deletions(-) + +--- a/fs/proc/task_mmu.c~mm-simplify-thp_vma_allowable_order ++++ a/fs/proc/task_mmu.c +@@ -871,8 +871,8 @@ static int show_smap(struct seq_file *m, + __show_smap(m, &mss, false); + + seq_printf(m, "THPeligible: %8u\n", +- !!thp_vma_allowable_orders(vma, vma->vm_flags, true, false, +- true, THP_ORDERS_ALL)); ++ !!thp_vma_allowable_orders(vma, vma->vm_flags, ++ TVA_SMAPS | TVA_ENFORCE_SYSFS, THP_ORDERS_ALL)); + + if (arch_pkeys_enabled()) + seq_printf(m, "ProtectionKey: %8u\n", vma_pkey(vma)); +--- a/include/linux/huge_mm.h~mm-simplify-thp_vma_allowable_order ++++ a/include/linux/huge_mm.h +@@ -81,8 +81,12 @@ extern struct kobj_attribute shmem_enabl + */ + #define THP_ORDERS_ALL (THP_ORDERS_ALL_ANON | THP_ORDERS_ALL_FILE) + +-#define thp_vma_allowable_order(vma, vm_flags, smaps, in_pf, enforce_sysfs, order) \ +- (!!thp_vma_allowable_orders(vma, vm_flags, smaps, in_pf, enforce_sysfs, BIT(order))) ++#define TVA_SMAPS (1 << 0) /* Will be used for procfs */ ++#define TVA_IN_PF (1 << 1) /* Page fault handler */ ++#define TVA_ENFORCE_SYSFS (1 << 2) /* Obey sysfs configuration */ ++ ++#define thp_vma_allowable_order(vma, vm_flags, tva_flags, order) \ ++ (!!thp_vma_allowable_orders(vma, vm_flags, tva_flags, BIT(order))) + + #ifdef CONFIG_PGTABLE_HAS_HUGE_LEAVES + #define HPAGE_PMD_SHIFT PMD_SHIFT +@@ -218,17 +222,15 @@ static inline bool file_thp_enabled(stru + } + + unsigned long __thp_vma_allowable_orders(struct vm_area_struct *vma, +- unsigned long vm_flags, bool smaps, +- bool in_pf, bool enforce_sysfs, ++ unsigned long vm_flags, ++ unsigned long tva_flags, + unsigned long orders); + + /** + * thp_vma_allowable_orders - determine hugepage orders that are allowed for vma + * @vma: the vm area to check + * @vm_flags: use these vm_flags instead of vma->vm_flags +- * @smaps: whether answer will be used for smaps file +- * @in_pf: whether answer will be used by page fault handler +- * @enforce_sysfs: whether sysfs config should be taken into account ++ * @tva_flags: Which TVA flags to honour + * @orders: bitfield of all orders to consider + * + * Calculates the intersection of the requested hugepage orders and the allowed +@@ -241,12 +243,12 @@ unsigned long __thp_vma_allowable_orders + */ + static inline + unsigned long thp_vma_allowable_orders(struct vm_area_struct *vma, +- unsigned long vm_flags, bool smaps, +- bool in_pf, bool enforce_sysfs, ++ unsigned long vm_flags, ++ unsigned long tva_flags, + unsigned long orders) + { + /* Optimization to check if required orders are enabled early. */ +- if (enforce_sysfs && vma_is_anonymous(vma)) { ++ if ((tva_flags & TVA_ENFORCE_SYSFS) && vma_is_anonymous(vma)) { + unsigned long mask = READ_ONCE(huge_anon_orders_always); + + if (vm_flags & VM_HUGEPAGE) +@@ -260,8 +262,7 @@ unsigned long thp_vma_allowable_orders(s + return 0; + } + +- return __thp_vma_allowable_orders(vma, vm_flags, smaps, in_pf, +- enforce_sysfs, orders); ++ return __thp_vma_allowable_orders(vma, vm_flags, tva_flags, orders); + } + + enum mthp_stat_item { +@@ -428,8 +429,8 @@ static inline unsigned long thp_vma_suit + } + + static inline unsigned long thp_vma_allowable_orders(struct vm_area_struct *vma, +- unsigned long vm_flags, bool smaps, +- bool in_pf, bool enforce_sysfs, ++ unsigned long vm_flags, ++ unsigned long tva_flags, + unsigned long orders) + { + return 0; +--- a/mm/huge_memory.c~mm-simplify-thp_vma_allowable_order ++++ a/mm/huge_memory.c +@@ -81,10 +81,13 @@ unsigned long huge_anon_orders_madvise _ + unsigned long huge_anon_orders_inherit __read_mostly; + + unsigned long __thp_vma_allowable_orders(struct vm_area_struct *vma, +- unsigned long vm_flags, bool smaps, +- bool in_pf, bool enforce_sysfs, ++ unsigned long vm_flags, ++ unsigned long tva_flags, + unsigned long orders) + { ++ bool smaps = tva_flags & TVA_SMAPS; ++ bool in_pf = tva_flags & TVA_IN_PF; ++ bool enforce_sysfs = tva_flags & TVA_ENFORCE_SYSFS; + /* Check the intersection of requested and supported orders. */ + orders &= vma_is_anonymous(vma) ? + THP_ORDERS_ALL_ANON : THP_ORDERS_ALL_FILE; +--- a/mm/khugepaged.c~mm-simplify-thp_vma_allowable_order ++++ a/mm/khugepaged.c +@@ -453,7 +453,7 @@ void khugepaged_enter_vma(struct vm_area + { + if (!test_bit(MMF_VM_HUGEPAGE, &vma->vm_mm->flags) && + hugepage_flags_enabled()) { +- if (thp_vma_allowable_order(vma, vm_flags, false, false, true, ++ if (thp_vma_allowable_order(vma, vm_flags, TVA_ENFORCE_SYSFS, + PMD_ORDER)) + __khugepaged_enter(vma->vm_mm); + } +@@ -900,6 +900,7 @@ static int hugepage_vma_revalidate(struc + struct collapse_control *cc) + { + struct vm_area_struct *vma; ++ unsigned long tva_flags = cc->is_khugepaged ? TVA_ENFORCE_SYSFS : 0; + + if (unlikely(hpage_collapse_test_exit_or_disable(mm))) + return SCAN_ANY_PROCESS; +@@ -910,8 +911,7 @@ static int hugepage_vma_revalidate(struc + + if (!thp_vma_suitable_order(vma, address, PMD_ORDER)) + return SCAN_ADDRESS_RANGE; +- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false, +- cc->is_khugepaged, PMD_ORDER)) ++ if (!thp_vma_allowable_order(vma, vma->vm_flags, tva_flags, PMD_ORDER)) + return SCAN_VMA_CHECK; + /* + * Anon VMA expected, the address may be unmapped then +@@ -1501,8 +1501,7 @@ int collapse_pte_mapped_thp(struct mm_st + * and map it by a PMD, regardless of sysfs THP settings. As such, let's + * analogously elide sysfs THP settings here. + */ +- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false, false, +- PMD_ORDER)) ++ if (!thp_vma_allowable_order(vma, vma->vm_flags, 0, PMD_ORDER)) + return SCAN_VMA_CHECK; + + /* Keep pmd pgtable for uffd-wp; see comment in retract_page_tables() */ +@@ -2363,8 +2362,8 @@ static unsigned int khugepaged_scan_mm_s + progress++; + break; + } +- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false, +- true, PMD_ORDER)) { ++ if (!thp_vma_allowable_order(vma, vma->vm_flags, ++ TVA_ENFORCE_SYSFS, PMD_ORDER)) { + skip: + progress++; + continue; +@@ -2701,8 +2700,7 @@ int madvise_collapse(struct vm_area_stru + + *prev = vma; + +- if (!thp_vma_allowable_order(vma, vma->vm_flags, false, false, false, +- PMD_ORDER)) ++ if (!thp_vma_allowable_order(vma, vma->vm_flags, 0, PMD_ORDER)) + return -EINVAL; + + cc = kmalloc(sizeof(*cc), GFP_KERNEL); +--- a/mm/memory.c~mm-simplify-thp_vma_allowable_order ++++ a/mm/memory.c +@@ -4334,8 +4334,8 @@ static struct folio *alloc_anon_folio(st + * for this vma. Then filter out the orders that can't be allocated over + * the faulting address and still be fully contained in the vma. + */ +- orders = thp_vma_allowable_orders(vma, vma->vm_flags, false, true, true, +- BIT(PMD_ORDER) - 1); ++ orders = thp_vma_allowable_orders(vma, vma->vm_flags, ++ TVA_IN_PF | TVA_ENFORCE_SYSFS, BIT(PMD_ORDER) - 1); + orders = thp_vma_suitable_orders(vma, vmf->address, orders); + + if (!orders) +@@ -5438,7 +5438,8 @@ static vm_fault_t __handle_mm_fault(stru + return VM_FAULT_OOM; + retry_pud: + if (pud_none(*vmf.pud) && +- thp_vma_allowable_order(vma, vm_flags, false, true, true, PUD_ORDER)) { ++ thp_vma_allowable_order(vma, vm_flags, ++ TVA_IN_PF | TVA_ENFORCE_SYSFS, PUD_ORDER)) { + ret = create_huge_pud(&vmf); + if (!(ret & VM_FAULT_FALLBACK)) + return ret; +@@ -5472,7 +5473,8 @@ retry_pud: + goto retry_pud; + + if (pmd_none(*vmf.pmd) && +- thp_vma_allowable_order(vma, vm_flags, false, true, true, PMD_ORDER)) { ++ thp_vma_allowable_order(vma, vm_flags, ++ TVA_IN_PF | TVA_ENFORCE_SYSFS, PMD_ORDER)) { + ret = create_huge_pmd(&vmf); + if (!(ret & VM_FAULT_FALLBACK)) + return ret; +_ diff --git a/patches/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch b/patches/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch index dcee63f72..dcee63f72 100644 --- a/patches/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch +++ b/patches/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch diff --git a/pc/devel-series b/pc/devel-series index de730877b..0f47eeb83 100644 --- a/pc/devel-series +++ b/pc/devel-series @@ -141,6 +141,8 @@ maintainers-update-urls-for-keys-keyrings_integrity-and-tpm-device-driver.patch tools-fix-userspace-compilation-with-new-test_xarray-changes.patch lib-test_xarrayc-fix-error-assumptions-on-check_xa_multi_store_adv_add.patch # +kmsan-compiler_types-declare-__no_sanitize_or_inline.patch +# ### hfe # #ENDBRANCH mm-hotfixes-unstable @@ -260,6 +262,8 @@ memprofiling-documentation.patch # mm-change-inlined-allocation-helpers-to-account-at-the-call-site.patch # +lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.patch +# mm-always-initialise-folio-_deferred_list.patch mm-always-initialise-folio-_deferred_list-fix.patch mm-remove-folio_prep_large_rmappable.patch @@ -689,11 +693,6 @@ mm-arm64-override-clear_young_dirty_ptes-batch-helper.patch mm-memory-add-any_dirty-optional-pointer-to-folio_pte_batch.patch mm-madvise-optimize-lazyfreeing-with-mthp-in-madvise_free.patch # -# -# -#mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch: check review -mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.patch -# mm-page-flags-make-pageuptodate-return-bool.patch # mm-memory-check-userfaultfd_wp-in-vmf_orig_pte_uffd_wp.patch @@ -703,7 +702,6 @@ memcg-simple-cleanup-of-stats-update-functions.patch xarray-use-bits_per_longs.patch xarray-dont-use-proxy-headers.patch # -# mm-memory-failure-remove-fsdax_pgoff-argument-from-__add_to_kill.patch mm-memory-failure-pass-addr-to-__add_to_kill.patch mm-return-the-address-from-page_mapped_in_vma.patch @@ -754,6 +752,8 @@ mm-remove-stale-comment-__folio_mark_dirty.patch #mm-fix-race-between-__split_huge_pmd_locked-and-gup-fast.patch: https://lkml.kernel.org/r/922F6794-1C32-4862-8A67-90D4F7DBC474@nvidia.com mm-fix-race-between-__split_huge_pmd_locked-and-gup-fast.patch # +mm-simplify-thp_vma_allowable_order.patch +# # # # diff --git a/pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc b/pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc new file mode 100644 index 000000000..32ec11627 --- /dev/null +++ b/pc/kmsan-compiler_types-declare-__no_sanitize_or_inline.pc @@ -0,0 +1 @@ +include/linux/compiler_types.h diff --git a/pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc b/pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc new file mode 100644 index 000000000..4aea30396 --- /dev/null +++ b/pc/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.pc @@ -0,0 +1 @@ +lib/alloc_tag.c diff --git a/pc/mm-simplify-thp_vma_allowable_order.pc b/pc/mm-simplify-thp_vma_allowable_order.pc new file mode 100644 index 000000000..bbea1500c --- /dev/null +++ b/pc/mm-simplify-thp_vma_allowable_order.pc @@ -0,0 +1,5 @@ +fs/proc/task_mmu.c +include/linux/huge_mm.h +mm/huge_memory.c +mm/khugepaged.c +mm/memory.c diff --git a/pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc b/pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc deleted file mode 100644 index 9d3bf5073..000000000 --- a/pc/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.pc +++ /dev/null @@ -1,5 +0,0 @@ -include/linux/huge_mm.h -include/linux/rmap.h -mm/huge_memory.c -mm/rmap.c -mm/vmscan.c diff --git a/txt/asm-generic-ioh-kill-vmalloch-dependency.txt b/txt/asm-generic-ioh-kill-vmalloch-dependency.txt index 61899d600..5c9d47c7c 100644 --- a/txt/asm-generic-ioh-kill-vmalloch-dependency.txt +++ b/txt/asm-generic-ioh-kill-vmalloch-dependency.txt @@ -12,6 +12,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-3-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Tejun Heo <tj@kernel.org> diff --git a/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt b/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt index dcaf6b1aa..eb7d2c765 100644 --- a/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt +++ b/txt/change-alloc_pages-name-in-dma_map_ops-to-avoid-name-conflicts.txt @@ -8,6 +8,7 @@ when it's not intended. Link: https://lkml.kernel.org/r/20240321163705.3067592-18-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt b/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt index 75baef2a4..dc6aaa907 100644 --- a/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt +++ b/txt/codetag-debug-introduce-objexts_alloc_fail-to-mark-failed-slab_ext-allocations.txt @@ -14,6 +14,7 @@ avoid warnings implemented by CONFIG_MEM_ALLOC_PROFILING_DEBUG checks. Link: https://lkml.kernel.org/r/20240321163705.3067592-36-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -24,7 +25,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt b/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt index fcd1f8fda..2fa9adfe3 100644 --- a/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt +++ b/txt/codetag-debug-mark-codetags-for-reserved-pages-as-empty.txt @@ -9,6 +9,7 @@ freeing. Link: https://lkml.kernel.org/r/20240321163705.3067592-35-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt b/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt index f138c7860..b3979069b 100644 --- a/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt +++ b/txt/codetag-debug-skip-objext-checking-when-its-for-objext-itself.txt @@ -13,6 +13,7 @@ the codetag is expected to be empty. Link: https://lkml.kernel.org/r/20240321163705.3067592-34-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -23,7 +24,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/fix-missing-vmalloch-includes-fix-5.txt b/txt/fix-missing-vmalloch-includes-fix-5.txt index 18f912d66..1e78bcb39 100644 --- a/txt/fix-missing-vmalloch-includes-fix-5.txt +++ b/txt/fix-missing-vmalloch-includes-fix-5.txt @@ -22,6 +22,7 @@ mm/kasan/hw_tags.c:285:41: error: invalid use of undefined type 'struct vm_struc Link: https://lkml.kernel.org/r/20240404124435.3121534-1-arnd@kernel.org Signed-off-by: Arnd Bergmann <arnd@arndb.de> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Potapenko <glider@google.com> Cc: Andrey Konovalov <andreyknvl@gmail.com> Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com> diff --git a/txt/fix-missing-vmalloch-includes.txt b/txt/fix-missing-vmalloch-includes.txt index b544cdfce..e4fac9ae7 100644 --- a/txt/fix-missing-vmalloch-includes.txt +++ b/txt/fix-missing-vmalloch-includes.txt @@ -122,6 +122,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-2-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -132,7 +133,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Tejun Heo <tj@kernel.org> diff --git a/txt/fs-convert-alloc_inode_sb-to-a-macro.txt b/txt/fs-convert-alloc_inode_sb-to-a-macro.txt index a55ef683f..bde83effb 100644 --- a/txt/fs-convert-alloc_inode_sb-to-a-macro.txt +++ b/txt/fs-convert-alloc_inode_sb-to-a-macro.txt @@ -12,6 +12,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> Cc: Andreas Hindborg <a.hindborg@samsung.com> diff --git a/txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt b/txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt new file mode 100644 index 000000000..3fec1eb53 --- /dev/null +++ b/txt/kmsan-compiler_types-declare-__no_sanitize_or_inline.txt @@ -0,0 +1,18 @@ +From: Alexander Potapenko <glider@google.com> +Subject: kmsan: compiler_types: declare __no_sanitize_or_inline +Date: Thu, 25 Apr 2024 11:28:59 +0200 + +It turned out that KMSAN instruments READ_ONCE_NOCHECK(), resulting in +false positive reports, because __no_sanitize_or_inline enforced inlining. + +Properly declare __no_sanitize_or_inline under __SANITIZE_MEMORY__, +so that it does not inline the annotated function. + +Link: https://lkml.kernel.org/r/20240425092859.3370297-1-glider@google.com +Reported-by: syzbot+355c5bb8c1445c871ee8@syzkaller.appspotmail.com +Link: https://lkml.kernel.org/r/000000000000826ac1061675b0e3@google.com +Signed-off-by: Alexander Potapenko <glider@google.com> +Reviewed-by: Marco Elver <elver@google.com> +Cc: Dmitry Vyukov <dvyukov@google.com> +Cc: Miguel Ojeda <ojeda@kernel.org> +Cc: <stable@vger.kernel.org> diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt index 98ae17b6b..66aebd88e 100644 --- a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt +++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-2.txt @@ -13,5 +13,6 @@ Link: https://lkml.kernel.org/r/20240402180933.1663992-2-surenb@google.com Reported-by: kernel test robot <lkp@intel.com> Closes: https://lore.kernel.org/oe-kbuild-all/202403290334.USWrYrMw-lkp@intel.com/ Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Stephen Rothwell <sfr@canb.auug.org.au> diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt index 080d4e964..8a84e9061 100644 --- a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt +++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-3.txt @@ -21,4 +21,5 @@ Fixes: ac906a377c67 ("lib: add allocation tagging support for memory allocation Link: https://lore.kernel.org/lkml/6b8149f3-80e6-413c-abcb-1925ecda9d8c@gmail.com/ Signed-off-by: Klara Modin <klarasmodin@gmail.com> Acked-by: Kent Overstreet <kent.overstreet@linux.dev> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Suren Baghdasaryan <surenb@google.com> diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt new file mode 100644 index 000000000..6bf72ca52 --- /dev/null +++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling-fix-5.txt @@ -0,0 +1,14 @@ +From: Kees Cook <keescook@chromium.org> +Subject: alloc_tag: Tighten file permissions on /proc/allocinfo +Date: Thu, 25 Apr 2024 13:08:50 -0700 + +The /proc/allocinfo file exposes a tremendous about of information about +kernel build details, memory allocations (obviously), and potentially even +image layout (due to ordering). As this is intended to be consumed by +system owners (like /proc/slabinfo), use the same file permissions as +there: 0400. + +Link: https://lkml.kernel.org/r/20240425200844.work.184-kees@kernel.org +Signed-off-by: Kees Cook <keescook@chromium.org> +Cc: Kent Overstreet <kent.overstreet@linux.dev> +Cc: Suren Baghdasaryan <surenb@google.com> diff --git a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt index 3fa749eae..30765ab69 100644 --- a/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt +++ b/txt/lib-add-allocation-tagging-support-for-memory-allocation-profiling.txt @@ -19,6 +19,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-14-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -29,7 +30,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/lib-add-codetag-reference-into-slabobj_ext.txt b/txt/lib-add-codetag-reference-into-slabobj_ext.txt index 3d6140479..a2969e314 100644 --- a/txt/lib-add-codetag-reference-into-slabobj_ext.txt +++ b/txt/lib-add-codetag-reference-into-slabobj_ext.txt @@ -10,6 +10,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -20,7 +21,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/lib-add-memory-allocations-report-in-show_mem.txt b/txt/lib-add-memory-allocations-report-in-show_mem.txt index 239b3d7d5..125e4771f 100644 --- a/txt/lib-add-memory-allocations-report-in-show_mem.txt +++ b/txt/lib-add-memory-allocations-report-in-show_mem.txt @@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-33-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/lib-code-tagging-framework.txt b/txt/lib-code-tagging-framework.txt index 141f19877..8e496524c 100644 --- a/txt/lib-code-tagging-framework.txt +++ b/txt/lib-code-tagging-framework.txt @@ -11,6 +11,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-11-surenb@google.com Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -21,7 +22,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/lib-code-tagging-module-support.txt b/txt/lib-code-tagging-module-support.txt index 2fa80c063..fb8777b03 100644 --- a/txt/lib-code-tagging-module-support.txt +++ b/txt/lib-code-tagging-module-support.txt @@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-12-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt b/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt index fd584b813..d21c1ba95 100644 --- a/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt +++ b/txt/lib-introduce-early-boot-parameter-to-avoid-page_ext-memory-overhead.txt @@ -28,6 +28,7 @@ early boot parameter. Link: https://lkml.kernel.org/r/20240321163705.3067592-16-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -38,7 +39,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/lib-introduce-support-for-page-allocation-tagging.txt b/txt/lib-introduce-support-for-page-allocation-tagging.txt index 3b3b5af74..fa62a9455 100644 --- a/txt/lib-introduce-support-for-page-allocation-tagging.txt +++ b/txt/lib-introduce-support-for-page-allocation-tagging.txt @@ -11,6 +11,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -21,7 +22,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt b/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt index 551eb27d0..35a77479c 100644 --- a/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt +++ b/txt/lib-prevent-module-unloading-if-memory-is-not-freed.txt @@ -8,6 +8,7 @@ code tag would cause UAF. Link: https://lkml.kernel.org/r/20240321163705.3067592-13-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt index cf3ac0e8c..deb7b4bb1 100644 --- a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt +++ b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling-fix.txt @@ -13,4 +13,5 @@ drop the entries to non-existing files. Link: https://lkml.kernel.org/r/20240411064717.51140-1-lukas.bulwahn@redhat.com Signed-off-by: Lukas Bulwahn <lukas.bulwahn@redhat.com> Acked-by: Kent Overstreet <kent.overstreet@linux.dev> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Suren Baghdasaryan <surenb@google.com> diff --git a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt index 386e675ff..49b258894 100644 --- a/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt +++ b/txt/maintainers-add-entries-for-code-tagging-and-memory-allocation-profiling.txt @@ -8,6 +8,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-37-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/memory-failure-remove-calls-to-page_mapping.txt b/txt/memory-failure-remove-calls-to-page_mapping.txt index de1fa4e58..9fd908011 100644 --- a/txt/memory-failure-remove-calls-to-page_mapping.txt +++ b/txt/memory-failure-remove-calls-to-page_mapping.txt @@ -8,4 +8,5 @@ Link: https://lkml.kernel.org/r/20240423225552.4113447-4-willy@infradead.org Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org> Reviewed-by: Sidhartha Kumar <sidhartha.kumar@oracle.com> Reviewed-by: David Hildenbrand <david@redhat.com> +Acked-by: Miaohe Lin <linmiaohe@huawei.com> Cc: Eric Biggers <ebiggers@google.com> diff --git a/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt b/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt index 9eb69174d..2e9dd3ef8 100644 --- a/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt +++ b/txt/mempool-hook-up-to-memory-allocation-profiling-fix-2.txt @@ -9,3 +9,4 @@ Link: https://lkml.kernel.org/r/20240402180835.1661905-1-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reported-by: kernel test robot <lkp@intel.com> Closes: https://lore.kernel.org/oe-kbuild-all/202404010132.6v0zt6oa-lkp@intel.com/ +Tested-by: Kees Cook <keescook@chromium.org> diff --git a/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt b/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt index 7d92c2ef5..cdb47ec8f 100644 --- a/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt +++ b/txt/mempool-hook-up-to-memory-allocation-profiling-fix.txt @@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-4-surenb@google.com Fixes: 01d3a2ac5e7f ("mempool: hook up to memory allocation profiling") Signed-off-by: Suren Baghdasaryan <surenb@google.com> Tested-by: Randy Dunlap <rdunlap@infradead.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> diff --git a/txt/mempool-hook-up-to-memory-allocation-profiling.txt b/txt/mempool-hook-up-to-memory-allocation-profiling.txt index 80ba32fda..8181f6eda 100644 --- a/txt/mempool-hook-up-to-memory-allocation-profiling.txt +++ b/txt/mempool-hook-up-to-memory-allocation-profiling.txt @@ -12,6 +12,7 @@ alloc_hooks() in fewer places. Link: https://lkml.kernel.org/r/20240321163705.3067592-27-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/memprofiling-documentation.txt b/txt/memprofiling-documentation.txt index 78cff9fff..ca2c32118 100644 --- a/txt/memprofiling-documentation.txt +++ b/txt/memprofiling-documentation.txt @@ -7,6 +7,7 @@ Provide documentation for memory allocation profiling. Link: https://lkml.kernel.org/r/20240321163705.3067592-38-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -17,7 +18,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/mm-create-new-codetag-references-during-page-splitting.txt b/txt/mm-create-new-codetag-references-during-page-splitting.txt index 71abbe0c5..dd8b84a88 100644 --- a/txt/mm-create-new-codetag-references-during-page-splitting.txt +++ b/txt/mm-create-new-codetag-references-during-page-splitting.txt @@ -12,6 +12,7 @@ individual pages get freed. Link: https://lkml.kernel.org/r/20240321163705.3067592-20-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/mm-enable-page-allocation-tagging-fix.txt b/txt/mm-enable-page-allocation-tagging-fix.txt index 783648257..97a488472 100644 --- a/txt/mm-enable-page-allocation-tagging-fix.txt +++ b/txt/mm-enable-page-allocation-tagging-fix.txt @@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-3-surenb@google.com Fixes: 6522e08ac1c6 ("mm: enable page allocation tagging") Signed-off-by: Suren Baghdasaryan <surenb@google.com> Tested-by: Randy Dunlap <rdunlap@infradead.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> diff --git a/txt/mm-enable-page-allocation-tagging.txt b/txt/mm-enable-page-allocation-tagging.txt index 44c023be0..33a03f2b1 100644 --- a/txt/mm-enable-page-allocation-tagging.txt +++ b/txt/mm-enable-page-allocation-tagging.txt @@ -11,6 +11,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Reviewed-by: Kees Cook <keescook@chromium.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt b/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt index dafe0314b..a747908fd 100644 --- a/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt +++ b/txt/mm-fix-non-compound-multi-order-memory-accounting-in-__free_pages.txt @@ -13,6 +13,7 @@ pages. Link: https://lkml.kernel.org/r/20240321163705.3067592-21-surenb@google.com Reported-by: Vlastimil Babka <vbabka@suse.cz> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -23,7 +24,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt b/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt index e4704d84b..eddd69bc9 100644 --- a/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt +++ b/txt/mm-free-non-hugetlb-large-folios-in-a-batch-fix.txt @@ -73,5 +73,5 @@ the end that will fix this crash for me. Link: https://lkml.kernel.org/r/ZikjPB0Dt5HA8-uL@x1n Signed-off-by: Peter Xu <peterx@redhat.com> +Reviewed-by: Matthew Wilcox (Oracle) <willy@infradead.org> Cc: Alex Williamson <alex.williamson@redhat.com> -Cc: Matthew Wilcox (Oracle) <willy@infradead.org> diff --git a/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt b/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt index 2945f8d9f..87803912c 100644 --- a/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt +++ b/txt/mm-free-non-hugetlb-large-folios-in-a-batch.txt @@ -14,9 +14,7 @@ This patch (of 5): free_unref_folios() can now handle non-hugetlb large folios, so keep normal large folios in the batch. hugetlb folios still need to be handled -specially. I believe that folios freed using put_pages_list() cannot be -accounted to a memcg (or the small folios would trip the "page still -charged to cgroup" warning), but put an assertion in to check that. +specially. Link: https://lkml.kernel.org/r/20240405153228.2563754-1-willy@infradead.org Link: https://lkml.kernel.org/r/20240405153228.2563754-2-willy@infradead.org diff --git a/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt b/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt index c8bc7998c..0881eeb39 100644 --- a/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt +++ b/txt/mm-introduce-__gfp_no_obj_ext-flag-to-selectively-prevent-slabobj_ext-creation.txt @@ -10,6 +10,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt b/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt index af4c2d5c6..d721a9344 100644 --- a/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt +++ b/txt/mm-introduce-slabobj_ext-to-support-slab-object-extensions.txt @@ -12,6 +12,7 @@ Link: https://lkml.kernel.org/r/20240321163705.3067592-7-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt b/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt index bf6973376..604f9952b 100644 --- a/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt +++ b/txt/mm-page_alloc-consolidate-free-page-accounting-fix-4.txt @@ -8,6 +8,7 @@ guarded with a certain ifdeffery, do the same for add_to_free_list(). Link: https://lkml.kernel.org/r/20240423161506.2637177-1-andriy.shevchenko@linux.intel.com Signed-off-by: Andy Shevchenko <andriy.shevchenko@linux.intel.com> +Reviewed-by: Miaohe Lin <linmiaohe@huawei.com> Cc: Baolin Wang <baolin.wang@linux.alibaba.com> Cc: Johannes Weiner <hannes@cmpxchg.org> Cc: Vlastimil Babka <vbabka@suse.cz> diff --git a/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt b/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt index 6c70ada33..5e86fdaa3 100644 --- a/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt +++ b/txt/mm-page_ext-enable-early_page_ext-when-config_mem_alloc_profiling_debug=y.txt @@ -17,6 +17,7 @@ CONFIG_MEM_ALLOC_PROFILING. Link: https://lkml.kernel.org/r/20240321163705.3067592-22-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -27,7 +28,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> diff --git a/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt b/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt index 068ccb5a5..2ade06f0e 100644 --- a/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt +++ b/txt/mm-percpu-add-codetag-reference-into-pcpuobj_ext.txt @@ -9,6 +9,7 @@ the newly introduced codetag are added. Link: https://lkml.kernel.org/r/20240321163705.3067592-29-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -19,7 +20,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt b/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt index 1d6b85005..90d80fe32 100644 --- a/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt +++ b/txt/mm-percpu-enable-per-cpu-allocation-tagging-fix.txt @@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-6-surenb@google.com Fixes: b3942167cb9f ("mm: percpu: enable per-cpu allocation tagging") Signed-off-by: Suren Baghdasaryan <surenb@google.com> Tested-by: Randy Dunlap <rdunlap@infradead.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> diff --git a/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt b/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt index 68e94c079..1d713972a 100644 --- a/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt +++ b/txt/mm-percpu-enable-per-cpu-allocation-tagging.txt @@ -8,6 +8,7 @@ to record allocations and deallocations done by these functions. Link: https://lkml.kernel.org/r/20240321163705.3067592-30-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt b/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt index 37b9e95e9..1bd2ce3f9 100644 --- a/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt +++ b/txt/mm-percpu-increase-percpu_module_reserve-to-accommodate-allocation-tags.txt @@ -10,6 +10,7 @@ dynamically. Link: https://lkml.kernel.org/r/20240321163705.3067592-17-surenb@google.com Signed-off-by: Suren Baghdasaryan <surenb@google.com> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Tejun Heo <tj@kernel.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> @@ -22,7 +23,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Vlastimil Babka <vbabka@suse.cz> diff --git a/txt/mm-percpu-introduce-pcpuobj_ext.txt b/txt/mm-percpu-introduce-pcpuobj_ext.txt index 7311ba21c..88e82c816 100644 --- a/txt/mm-percpu-introduce-pcpuobj_ext.txt +++ b/txt/mm-percpu-introduce-pcpuobj_ext.txt @@ -13,7 +13,7 @@ previous slabobj_ext patch. Link: https://lkml.kernel.org/r/20240321163705.3067592-28-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> -Cc: Andrew Morton <akpm@linux-foundation.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Dennis Zhou <dennis@kernel.org> Cc: Tejun Heo <tj@kernel.org> Cc: Christoph Lameter <cl@linux.com> @@ -26,7 +26,6 @@ Cc: Benno Lossin <benno.lossin@proton.me> Cc: "Björn Roy Baron" <bjorn3_gh@protonmail.com> Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/mm-simplify-thp_vma_allowable_order.txt b/txt/mm-simplify-thp_vma_allowable_order.txt new file mode 100644 index 000000000..40bfc6c24 --- /dev/null +++ b/txt/mm-simplify-thp_vma_allowable_order.txt @@ -0,0 +1,11 @@ +From: Matthew Wilcox <willy@infradead.org> +Subject: mm: simplify thp_vma_allowable_order +Date: Thu, 25 Apr 2024 05:00:55 +0100 + +Combine the three boolean arguments into one flags argument for +readability. + +Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org> +Cc: David Hildenbrand <david@redhat.com> +Cc: Kefeng Wang <wangkefeng.wang@huawei.com> +Cc: Ryan Roberts <ryan.roberts@arm.com> diff --git a/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt b/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt index eeab075b4..4724690d2 100644 --- a/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt +++ b/txt/mm-slab-add-allocation-accounting-into-slab-allocation-and-free-paths.txt @@ -10,6 +10,7 @@ Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt index 0d484bd30..5b7087705 100644 --- a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt +++ b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends-fix.txt @@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-7-surenb@google.com Fixes: bc7b83f5e4bf ("mm/slab: enable slab allocation tagging for kmalloc and friends") Signed-off-by: Suren Baghdasaryan <surenb@google.com> Tested-by: Randy Dunlap <rdunlap@infradead.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> diff --git a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt index 5d90e152d..5094a4612 100644 --- a/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt +++ b/txt/mm-slab-enable-slab-allocation-tagging-for-kmalloc-and-friends.txt @@ -10,6 +10,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Co-developed-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Reviewed-by: Kees Cook <keescook@chromium.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt b/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt index c501f94fe..23704ef4d 100644 --- a/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt +++ b/txt/mm-slab-introduce-slab_no_obj_ext-to-avoid-obj_ext-creation.txt @@ -14,6 +14,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt b/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt index f03718e80..b9cb0975a 100644 --- a/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt +++ b/txt/mm-slub-mark-slab_free_freelist_hook-__always_inline.txt @@ -11,6 +11,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt index 620c698ac..405300c6f 100644 --- a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt +++ b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix-2.txt @@ -9,4 +9,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-5-surenb@google.com Fixes: ed49858097c1 ("mm: vmalloc: enable memory allocation profiling") Signed-off-by: Suren Baghdasaryan <surenb@google.com> Tested-by: Randy Dunlap <rdunlap@infradead.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> diff --git a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt index 491d5a442..8ed90a623 100644 --- a/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt +++ b/txt/mm-vmalloc-enable-memory-allocation-profiling-fix.txt @@ -23,3 +23,4 @@ Closes: https://lore.kernel.org/all/20240323180506.195396-1-sj@kernel.org/ Tested-by: SeongJae Park <sj@kernel.org> Reviewed-by: Johannes Berg <johannes@sipsolutions.net Acked-by: Richard Weinberger <richard@nod.at> +Tested-by: Kees Cook <keescook@chromium.org> diff --git a/txt/mm-vmalloc-enable-memory-allocation-profiling.txt b/txt/mm-vmalloc-enable-memory-allocation-profiling.txt index ed51123f1..be4856087 100644 --- a/txt/mm-vmalloc-enable-memory-allocation-profiling.txt +++ b/txt/mm-vmalloc-enable-memory-allocation-profiling.txt @@ -10,6 +10,7 @@ feature. Link: https://lkml.kernel.org/r/20240321163705.3067592-31-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -20,7 +21,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt b/txt/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt index 66667fbf6..66667fbf6 100644 --- a/txt/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt +++ b/txt/old/mm-vmscan-avoid-split-pmd-mapped-thp-during-shrink_folio_list.txt diff --git a/txt/rhashtable-plumb-through-alloc-tag-fix.txt b/txt/rhashtable-plumb-through-alloc-tag-fix.txt index 0c243a87d..58ef80802 100644 --- a/txt/rhashtable-plumb-through-alloc-tag-fix.txt +++ b/txt/rhashtable-plumb-through-alloc-tag-fix.txt @@ -22,4 +22,5 @@ Link: https://lkml.kernel.org/r/20240326231453.1206227-2-surenb@google.com Fixes: 11c91be0e244 ("rhashtable: plumb through alloc tag") Signed-off-by: Suren Baghdasaryan <surenb@google.com> Tested-by: Randy Dunlap <rdunlap@infradead.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Kent Overstreet <kent.overstreet@linux.dev> diff --git a/txt/rhashtable-plumb-through-alloc-tag.txt b/txt/rhashtable-plumb-through-alloc-tag.txt index 424139cb4..353c4fd03 100644 --- a/txt/rhashtable-plumb-through-alloc-tag.txt +++ b/txt/rhashtable-plumb-through-alloc-tag.txt @@ -8,6 +8,7 @@ allocations will be accounted to the code that initialized the rhashtable. Link: https://lkml.kernel.org/r/20240321163705.3067592-32-surenb@google.com Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> @@ -18,7 +19,6 @@ Cc: Boqun Feng <boqun.feng@gmail.com> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> Cc: Gary Guo <gary@garyguo.net> -Cc: Kees Cook <keescook@chromium.org> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> diff --git a/txt/rust-add-a-rust-helper-for-krealloc.txt b/txt/rust-add-a-rust-helper-for-krealloc.txt index 9b103fb0b..77a6caa03 100644 --- a/txt/rust-add-a-rust-helper-for-krealloc.txt +++ b/txt/rust-add-a-rust-helper-for-krealloc.txt @@ -14,6 +14,7 @@ Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Alice Ryhl <aliceryhl@google.com> Acked-by: Miguel Ojeda <ojeda@kernel.org> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Wedson Almeida Filho <wedsonaf@gmail.com> Cc: Boqun Feng <boqun.feng@gmail.com> @@ -24,7 +25,6 @@ Cc: Andreas Hindborg <a.hindborg@samsung.com> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Christoph Lameter <cl@linux.com> Cc: Dennis Zhou <dennis@kernel.org> -Cc: Kees Cook <keescook@chromium.org> Cc: Pasha Tatashin <pasha.tatashin@soleen.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Tejun Heo <tj@kernel.org> diff --git a/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt b/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt index 2731f40a1..dccf9c364 100644 --- a/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt +++ b/txt/scripts-kallysms-always-include-__start-and-__stop-symbols.txt @@ -11,6 +11,7 @@ Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev> Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> diff --git a/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt b/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt index c7c50eb2c..3c7b060d6 100644 --- a/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt +++ b/txt/slab-objext-introduce-objext_flags-as-extension-to-page_memcg_data_flags.txt @@ -9,6 +9,7 @@ Signed-off-by: Suren Baghdasaryan <surenb@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Pasha Tatashin <pasha.tatashin@soleen.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> +Tested-by: Kees Cook <keescook@chromium.org> Cc: Alexander Viro <viro@zeniv.linux.org.uk> Cc: Alex Gaynor <alex.gaynor@gmail.com> Cc: Alice Ryhl <aliceryhl@google.com> |