From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BDEF6C433F5 for ; Mon, 18 Oct 2021 22:14:47 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 1C64D610FB for ; Mon, 18 Oct 2021 22:14:47 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 1C64D610FB Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linux-foundation.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id 33CA1900002; Mon, 18 Oct 2021 18:14:46 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2EB9F6B0071; Mon, 18 Oct 2021 18:14:46 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 20213900002; Mon, 18 Oct 2021 18:14:46 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0041.hostedemail.com [216.40.44.41]) by kanga.kvack.org (Postfix) with ESMTP id 150E96B006C for ; Mon, 18 Oct 2021 18:14:46 -0400 (EDT) Received: from smtpin28.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id C24BA8249980 for ; Mon, 18 Oct 2021 22:14:45 +0000 (UTC) X-FDA: 78710963730.28.7B72C95 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf27.hostedemail.com (Postfix) with ESMTP id 2A64470000A0 for ; Mon, 18 Oct 2021 22:14:44 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id 32C3560F57; Mon, 18 Oct 2021 22:14:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1634595281; bh=Kp71fi2d0d+90qdsNfMztqZnaQDdGb/8lInLXl39fEg=; h=Date:From:To:Cc:Subject:From; b=xuumPZMSiSSygrfAZL+i6u9/eXQAjTkGxzliSvKbi830MLRKNDdVizHZ/WeF0Gzcq eceY0oH6ie8hnA6GosguMSPKsPzAVulyQ3sngQcxtpJqKzINuILJ32fcch+/WBl43P bzU5wEVqNDMF1tmUuzRKAWMMW2td9Chm3DJAUy9g= Date: Mon, 18 Oct 2021 15:14:38 -0700 From: Andrew Morton To: Linus Torvalds Cc: linux-mm@kvack.org, mm-commits@vger.kernel.org Subject: incoming Message-Id: <20211018151438.f2246e2656c041b6753a8bdd@linux-foundation.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=xuumPZMS; dmarc=none; spf=pass (imf27.hostedemail.com: domain of akpm@linux-foundation.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org X-Rspamd-Server: rspam01 X-Rspamd-Queue-Id: 2A64470000A0 X-Stat-Signature: gis4jbeb83bobzg4to4f9fht76tsb463 X-HE-Tag: 1634595284-689155 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: 19 patches, based on 519d81956ee277b4419c723adfb154603c2565ba. Subsystems affected by this patch series: mm/userfaultfd mm/migration ocfs2 mm/memblock mm/mempolicy mm/slub binfmt vfs mm/secretmem mm/thp misc Subsystem: mm/userfaultfd Peter Xu : mm/userfaultfd: selftests: fix memory corruption with thp enabled Nadav Amit : userfaultfd: fix a race between writeprotect and exit_mmap() Subsystem: mm/migration Dave Hansen : Patch series "mm/migrate: 5.15 fixes for automatic demotion", v2: mm/migrate: optimize hotplug-time demotion order updates mm/migrate: add CPU hotplug to demotion #ifdef Huang Ying : mm/migrate: fix CPUHP state to update node demotion order Subsystem: ocfs2 Jan Kara : ocfs2: fix data corruption after conversion from inline format Valentin Vidic : ocfs2: mount fails with buffer overflow in strlen Subsystem: mm/memblock Peng Fan : memblock: check memory total_size Subsystem: mm/mempolicy Eric Dumazet : mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() Subsystem: mm/slub Miaohe Lin : Patch series "Fixups for slub": mm, slub: fix two bugs in slab_debug_trace_open() mm, slub: fix mismatch between reconstructed freelist depth and cnt mm, slub: fix potential memoryleak in kmem_cache_open() mm, slub: fix potential use-after-free in slab_debugfs_fops mm, slub: fix incorrect memcg slab count for bulk free Subsystem: binfmt Lukas Bulwahn : elfcore: correct reference to CONFIG_UML Subsystem: vfs "Matthew Wilcox (Oracle)" : vfs: check fd has read access in kernel_read_file_from_fd() Subsystem: mm/secretmem Sean Christopherson : mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem() Subsystem: mm/thp Marek Szyprowski : mm/thp: decrease nr_thps in file's mapping on THP split Subsystem: misc Andrej Shadura : mailmap: add Andrej Shadura .mailmap | 2 + fs/kernel_read_file.c | 2 - fs/ocfs2/alloc.c | 46 ++++++----------------- fs/ocfs2/super.c | 14 +++++-- fs/userfaultfd.c | 12 ++++-- include/linux/cpuhotplug.h | 4 ++ include/linux/elfcore.h | 2 - include/linux/memory.h | 5 ++ include/linux/secretmem.h | 2 - mm/huge_memory.c | 6 ++- mm/memblock.c | 2 - mm/mempolicy.c | 16 ++------ mm/migrate.c | 62 ++++++++++++++++++------------- mm/page_ext.c | 4 -- mm/slab.c | 4 +- mm/slub.c | 31 ++++++++++++--- tools/testing/selftests/vm/userfaultfd.c | 23 ++++++++++- 17 files changed, 138 insertions(+), 99 deletions(-)