linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Andrew Morton <akpm@linux-foundation.org>
To: akpm@linux-foundation.org, bigeasy@linutronix.de,
	david@fromorbit.com, hch@lst.de, idryomov@gmail.com,
	jlayton@kernel.org, linux-mm@kvack.org, mhocko@suse.com,
	mm-commits@vger.kernel.org, neilb@suse.de,
	torvalds@linux-foundation.org, urezki@gmail.com, vbabka@suse.cz
Subject: [patch 076/146] mm: allow !GFP_KERNEL allocations for kvmalloc
Date: Fri, 14 Jan 2022 14:07:07 -0800	[thread overview]
Message-ID: <20220114220707.SD7dYB5br%akpm@linux-foundation.org> (raw)
In-Reply-To: <20220114140222.6b14f0061194d3200000c52d@linux-foundation.org>

From: Michal Hocko <mhocko@suse.com>
Subject: mm: allow !GFP_KERNEL allocations for kvmalloc

Support for GFP_NO{FS,IO} and __GFP_NOFAIL has been implemented by
previous patches so we can allow the support for kvmalloc.  This will
allow some external users to simplify or completely remove their helpers.

GFP_NOWAIT semantic hasn't been supported so far but it hasn't been
explicitly documented so let's add a note about that.

ceph_kvmalloc is the first helper to be dropped and changed to kvmalloc.

Link: https://lkml.kernel.org/r/20211122153233.9924-5-mhocko@kernel.org
Signed-off-by: Michal Hocko <mhocko@suse.com>
Reviewed-by: Uladzislau Rezki (Sony) <urezki@gmail.com>
Acked-by: Vlastimil Babka <vbabka@suse.cz>
Cc: Christoph Hellwig <hch@lst.de>
Cc: Dave Chinner <david@fromorbit.com>
Cc: Ilya Dryomov <idryomov@gmail.com>
Cc: Jeff Layton <jlayton@kernel.org>
Cc: Neil Brown <neilb@suse.de>
Cc: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
---

 include/linux/ceph/libceph.h |    1 -
 mm/util.c                    |   15 ++++-----------
 net/ceph/buffer.c            |    4 ++--
 net/ceph/ceph_common.c       |   27 ---------------------------
 net/ceph/crypto.c            |    2 +-
 net/ceph/messenger.c         |    2 +-
 net/ceph/messenger_v2.c      |    2 +-
 net/ceph/osdmap.c            |   12 ++++++------
 8 files changed, 15 insertions(+), 50 deletions(-)

--- a/include/linux/ceph/libceph.h~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/include/linux/ceph/libceph.h
@@ -295,7 +295,6 @@ extern bool libceph_compatible(void *dat
 
 extern const char *ceph_msg_type_name(int type);
 extern int ceph_check_fsid(struct ceph_client *client, struct ceph_fsid *fsid);
-extern void *ceph_kvmalloc(size_t size, gfp_t flags);
 
 struct fs_parameter;
 struct fc_log;
--- a/mm/util.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/mm/util.c
@@ -549,13 +549,10 @@ EXPORT_SYMBOL(vm_mmap);
  * Uses kmalloc to get the memory but if the allocation fails then falls back
  * to the vmalloc allocator. Use kvfree for freeing the memory.
  *
- * Reclaim modifiers - __GFP_NORETRY and __GFP_NOFAIL are not supported.
+ * GFP_NOWAIT and GFP_ATOMIC are not supported, neither is the __GFP_NORETRY modifier.
  * __GFP_RETRY_MAYFAIL is supported, and it should be used only if kmalloc is
  * preferable to the vmalloc fallback, due to visible performance drawbacks.
  *
- * Please note that any use of gfp flags outside of GFP_KERNEL is careful to not
- * fall back to vmalloc.
- *
  * Return: pointer to the allocated memory of %NULL in case of failure
  */
 void *kvmalloc_node(size_t size, gfp_t flags, int node)
@@ -564,13 +561,6 @@ void *kvmalloc_node(size_t size, gfp_t f
 	void *ret;
 
 	/*
-	 * vmalloc uses GFP_KERNEL for some internal allocations (e.g page tables)
-	 * so the given set of flags has to be compatible.
-	 */
-	if ((flags & GFP_KERNEL) != GFP_KERNEL)
-		return kmalloc_node(size, flags, node);
-
-	/*
 	 * We want to attempt a large physically contiguous block first because
 	 * it is less likely to fragment multiple larger blocks and therefore
 	 * contribute to a long term fragmentation less than vmalloc fallback.
@@ -582,6 +572,9 @@ void *kvmalloc_node(size_t size, gfp_t f
 
 		if (!(kmalloc_flags & __GFP_RETRY_MAYFAIL))
 			kmalloc_flags |= __GFP_NORETRY;
+
+		/* nofail semantic is implemented by the vmalloc fallback */
+		kmalloc_flags &= ~__GFP_NOFAIL;
 	}
 
 	ret = kmalloc_node(size, kmalloc_flags, node);
--- a/net/ceph/buffer.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/net/ceph/buffer.c
@@ -7,7 +7,7 @@
 
 #include <linux/ceph/buffer.h>
 #include <linux/ceph/decode.h>
-#include <linux/ceph/libceph.h> /* for ceph_kvmalloc */
+#include <linux/ceph/libceph.h> /* for kvmalloc */
 
 struct ceph_buffer *ceph_buffer_new(size_t len, gfp_t gfp)
 {
@@ -17,7 +17,7 @@ struct ceph_buffer *ceph_buffer_new(size
 	if (!b)
 		return NULL;
 
-	b->vec.iov_base = ceph_kvmalloc(len, gfp);
+	b->vec.iov_base = kvmalloc(len, gfp);
 	if (!b->vec.iov_base) {
 		kfree(b);
 		return NULL;
--- a/net/ceph/ceph_common.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/net/ceph/ceph_common.c
@@ -190,33 +190,6 @@ int ceph_compare_options(struct ceph_opt
 }
 EXPORT_SYMBOL(ceph_compare_options);
 
-/*
- * kvmalloc() doesn't fall back to the vmalloc allocator unless flags are
- * compatible with (a superset of) GFP_KERNEL.  This is because while the
- * actual pages are allocated with the specified flags, the page table pages
- * are always allocated with GFP_KERNEL.
- *
- * ceph_kvmalloc() may be called with GFP_KERNEL, GFP_NOFS or GFP_NOIO.
- */
-void *ceph_kvmalloc(size_t size, gfp_t flags)
-{
-	void *p;
-
-	if ((flags & (__GFP_IO | __GFP_FS)) == (__GFP_IO | __GFP_FS)) {
-		p = kvmalloc(size, flags);
-	} else if ((flags & (__GFP_IO | __GFP_FS)) == __GFP_IO) {
-		unsigned int nofs_flag = memalloc_nofs_save();
-		p = kvmalloc(size, GFP_KERNEL);
-		memalloc_nofs_restore(nofs_flag);
-	} else {
-		unsigned int noio_flag = memalloc_noio_save();
-		p = kvmalloc(size, GFP_KERNEL);
-		memalloc_noio_restore(noio_flag);
-	}
-
-	return p;
-}
-
 static int parse_fsid(const char *str, struct ceph_fsid *fsid)
 {
 	int i = 0;
--- a/net/ceph/crypto.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/net/ceph/crypto.c
@@ -147,7 +147,7 @@ void ceph_crypto_key_destroy(struct ceph
 static const u8 *aes_iv = (u8 *)CEPH_AES_IV;
 
 /*
- * Should be used for buffers allocated with ceph_kvmalloc().
+ * Should be used for buffers allocated with kvmalloc().
  * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
  * in-buffer (msg front).
  *
--- a/net/ceph/messenger.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/net/ceph/messenger.c
@@ -1920,7 +1920,7 @@ struct ceph_msg *ceph_msg_new2(int type,
 
 	/* front */
 	if (front_len) {
-		m->front.iov_base = ceph_kvmalloc(front_len, flags);
+		m->front.iov_base = kvmalloc(front_len, flags);
 		if (m->front.iov_base == NULL) {
 			dout("ceph_msg_new can't allocate %d bytes\n",
 			     front_len);
--- a/net/ceph/messenger_v2.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/net/ceph/messenger_v2.c
@@ -308,7 +308,7 @@ static void *alloc_conn_buf(struct ceph_
 	if (WARN_ON(con->v2.conn_buf_cnt >= ARRAY_SIZE(con->v2.conn_bufs)))
 		return NULL;
 
-	buf = ceph_kvmalloc(len, GFP_NOIO);
+	buf = kvmalloc(len, GFP_NOIO);
 	if (!buf)
 		return NULL;
 
--- a/net/ceph/osdmap.c~mm-allow-gfp_kernel-allocations-for-kvmalloc
+++ a/net/ceph/osdmap.c
@@ -980,7 +980,7 @@ static struct crush_work *alloc_workspac
 	work_size = crush_work_size(c, CEPH_PG_MAX_SIZE);
 	dout("%s work_size %zu bytes\n", __func__, work_size);
 
-	work = ceph_kvmalloc(work_size, GFP_NOIO);
+	work = kvmalloc(work_size, GFP_NOIO);
 	if (!work)
 		return NULL;
 
@@ -1190,9 +1190,9 @@ static int osdmap_set_max_osd(struct cep
 	if (max == map->max_osd)
 		return 0;
 
-	state = ceph_kvmalloc(array_size(max, sizeof(*state)), GFP_NOFS);
-	weight = ceph_kvmalloc(array_size(max, sizeof(*weight)), GFP_NOFS);
-	addr = ceph_kvmalloc(array_size(max, sizeof(*addr)), GFP_NOFS);
+	state = kvmalloc(array_size(max, sizeof(*state)), GFP_NOFS);
+	weight = kvmalloc(array_size(max, sizeof(*weight)), GFP_NOFS);
+	addr = kvmalloc(array_size(max, sizeof(*addr)), GFP_NOFS);
 	if (!state || !weight || !addr) {
 		kvfree(state);
 		kvfree(weight);
@@ -1222,7 +1222,7 @@ static int osdmap_set_max_osd(struct cep
 	if (map->osd_primary_affinity) {
 		u32 *affinity;
 
-		affinity = ceph_kvmalloc(array_size(max, sizeof(*affinity)),
+		affinity = kvmalloc(array_size(max, sizeof(*affinity)),
 					 GFP_NOFS);
 		if (!affinity)
 			return -ENOMEM;
@@ -1503,7 +1503,7 @@ static int set_primary_affinity(struct c
 	if (!map->osd_primary_affinity) {
 		int i;
 
-		map->osd_primary_affinity = ceph_kvmalloc(
+		map->osd_primary_affinity = kvmalloc(
 		    array_size(map->max_osd, sizeof(*map->osd_primary_affinity)),
 		    GFP_NOFS);
 		if (!map->osd_primary_affinity)
_


  parent reply	other threads:[~2022-01-14 22:07 UTC|newest]

Thread overview: 149+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-01-14 22:02 incoming Andrew Morton
2022-01-14 22:02 ` [patch 001/146] kthread: add the helper function kthread_run_on_cpu() Andrew Morton
2022-01-14 22:02 ` [patch 002/146] RDMA/siw: make use of " Andrew Morton
2022-01-16 16:56   ` Bernard Metzler
2022-01-14 22:02 ` [patch 003/146] ring-buffer: " Andrew Morton
2022-01-14 22:03 ` [patch 004/146] rcutorture: " Andrew Morton
2022-01-14 22:03 ` [patch 005/146] trace/osnoise: " Andrew Morton
2022-01-14 22:03 ` [patch 006/146] trace/hwlat: " Andrew Morton
2022-01-14 22:03 ` [patch 007/146] ia64: module: use swap() to make code cleaner Andrew Morton
2022-01-14 22:03 ` [patch 008/146] arch/ia64/kernel/setup.c: " Andrew Morton
2022-01-14 22:03 ` [patch 009/146] ia64: fix typo in a comment Andrew Morton
2022-01-14 22:03 ` [patch 010/146] ia64: topology: use default_groups in kobj_type Andrew Morton
2022-01-14 22:03 ` [patch 011/146] scripts/spelling.txt: add "oveflow" Andrew Morton
2022-01-14 22:03 ` [patch 012/146] fs/ntfs/attrib.c: fix one kernel-doc comment Andrew Morton
2022-01-14 22:03 ` [patch 013/146] squashfs: provide backing_dev_info in order to disable read-ahead Andrew Morton
2022-01-14 22:03 ` [patch 014/146] ocfs2: use BUG_ON instead of if condition followed by BUG Andrew Morton
2022-01-14 22:03 ` [patch 015/146] ocfs2: clearly handle ocfs2_grab_pages_for_write() return value Andrew Morton
2022-01-14 22:03 ` [patch 016/146] ocfs2: use default_groups in kobj_type Andrew Morton
2022-01-14 22:03 ` [patch 017/146] ocfs2: remove redundant assignment to pointer root_bh Andrew Morton
2022-01-14 22:03 ` [patch 018/146] ocfs2: cluster: use default_groups in kobj_type Andrew Morton
2022-01-14 22:03 ` [patch 019/146] ocfs2: remove redundant assignment to variable free_space Andrew Morton
2022-01-14 22:03 ` [patch 020/146] fs/ioctl: remove unnecessary __user annotation Andrew Morton
2022-01-14 22:03 ` [patch 021/146] mm/slab_common: use WARN() if cache still has objects on destroy Andrew Morton
2022-01-14 22:04 ` [patch 022/146] mm: slab: make slab iterator functions static Andrew Morton
2022-01-14 22:04 ` [patch 023/146] kmemleak: fix kmemleak false positive report with HW tag-based kasan enable Andrew Morton
2022-01-14 22:04 ` [patch 024/146] mm: kmemleak: alloc gray object for reserved region with direct map Andrew Morton
2022-01-14 22:04 ` [patch 025/146] mm: defer kmemleak object creation of module_alloc() Andrew Morton
2022-01-14 22:04 ` [patch 026/146] mm/page_alloc: split prep_compound_page into head and tail subparts Andrew Morton
2022-01-14 22:04 ` [patch 027/146] mm/page_alloc: refactor memmap_init_zone_device() page init Andrew Morton
2022-01-14 22:04 ` [patch 028/146] mm/memremap: add ZONE_DEVICE support for compound pages Andrew Morton
2022-01-14 22:04 ` [patch 029/146] device-dax: use ALIGN() for determining pgoff Andrew Morton
2022-01-14 22:04 ` [patch 030/146] device-dax: use struct_size() Andrew Morton
2022-01-14 22:04 ` [patch 031/146] device-dax: ensure dev_dax->pgmap is valid for dynamic devices Andrew Morton
2022-01-14 22:04 ` [patch 032/146] device-dax: factor out page mapping initialization Andrew Morton
2022-01-14 22:04 ` [patch 033/146] device-dax: set mapping prior to vmf_insert_pfn{,_pmd,pud}() Andrew Morton
2022-01-14 22:04 ` [patch 034/146] device-dax: remove pfn from __dev_dax_{pte,pmd,pud}_fault() Andrew Morton
2022-01-14 22:04 ` [patch 035/146] device-dax: compound devmap support Andrew Morton
2022-01-14 22:04 ` [patch 036/146] kasan: test: add globals left-out-of-bounds test Andrew Morton
2022-01-14 22:04 ` [patch 037/146] kasan: add ability to detect double-kmem_cache_destroy() Andrew Morton
2022-01-14 22:04 ` [patch 038/146] kasan: test: add test case for double-kmem_cache_destroy() Andrew Morton
2022-01-14 22:05 ` [patch 039/146] kasan: fix quarantine conflicting with init_on_free Andrew Morton
2022-01-14 22:05 ` [patch 040/146] mm,fs: split dump_mapping() out from dump_page() Andrew Morton
2022-01-14 22:05 ` [patch 041/146] mm/debug_vm_pgtable: update comments regarding migration swap entries Andrew Morton
2022-01-14 22:05 ` [patch 042/146] mm/truncate.c: remove unneeded variable Andrew Morton
2022-01-14 22:05 ` [patch 043/146] gup: avoid multiple user access locking/unlocking in fault_in_{read/write}able Andrew Morton
2022-01-14 22:05 ` [patch 044/146] mm/gup.c: stricter check on THP migration entry during follow_pmd_mask Andrew Morton
2022-01-14 22:05 ` [patch 045/146] mm: shmem: don't truncate page if memory failure happens Andrew Morton
2022-01-14 22:05 ` [patch 046/146] shmem: fix a race between shmem_unused_huge_shrink and shmem_evict_inode Andrew Morton
2022-01-14 22:05 ` [patch 047/146] mm/frontswap.c: use non-atomic '__set_bit()' when possible Andrew Morton
2022-01-14 22:05 ` [patch 048/146] mm: memcontrol: make cgroup_memory_nokmem static Andrew Morton
2022-01-14 22:05 ` [patch 049/146] mm/page_counter: remove an incorrect call to propagate_protected_usage() Andrew Morton
2022-01-14 22:05 ` [patch 050/146] mm/memcg: add oom_group_kill memory event Andrew Morton
2022-01-14 22:05 ` [patch 051/146] memcg: better bounds on the memcg stats updates Andrew Morton
2022-01-14 22:05 ` [patch 052/146] mm/memcg: use struct_size() helper in kzalloc() Andrew Morton
2022-01-14 22:05 ` [patch 053/146] memcg: add per-memcg vmalloc stat Andrew Morton
2022-01-14 22:05 ` [patch 054/146] tools/testing/selftests/vm/userfaultfd.c: use swap() to make code cleaner Andrew Morton
2022-01-14 22:05 ` [patch 055/146] mm: remove redundant check about FAULT_FLAG_ALLOW_RETRY bit Andrew Morton
2022-01-14 22:05 ` [patch 056/146] mm: rearrange madvise code to allow for reuse Andrew Morton
2022-01-15 14:16   ` Linus Torvalds
2022-01-18 16:34     ` Suren Baghdasaryan
2022-01-14 22:05 ` [patch 057/146] mm: add a field to store names for private anonymous memory Andrew Morton
2022-01-14 22:06 ` [patch 058/146] mm: add anonymous vma name refcounting Andrew Morton
2022-01-14 22:06 ` [patch 059/146] mm: move anon_vma declarations to linux/mm_inline.h Andrew Morton
2022-01-14 22:06 ` [patch 060/146] mm: move tlb_flush_pending inline helpers to mm_inline.h Andrew Morton
2022-01-14 22:06 ` [patch 061/146] mm: protect free_pgtables with mmap_lock write lock in exit_mmap Andrew Morton
2022-01-14 22:06 ` [patch 062/146] mm: document locking restrictions for vm_operations_struct::close Andrew Morton
2022-01-14 22:06 ` [patch 063/146] mm/oom_kill: allow process_mrelease to run under mmap_lock protection Andrew Morton
2022-01-14 22:06 ` [patch 064/146] docs/vm: add vmalloced-kernel-stacks document Andrew Morton
2022-01-14 22:06 ` [patch 065/146] mm: change page type prior to adding page table entry Andrew Morton
2022-01-14 22:06 ` [patch 066/146] mm: ptep_clear() page table helper Andrew Morton
2022-01-14 22:06 ` [patch 067/146] mm: page table check Andrew Morton
2022-01-14 22:06 ` [patch 068/146] x86: mm: add x86_64 support for " Andrew Morton
2022-01-14 22:06 ` [patch 069/146] mm: remove last argument of reuse_swap_page() Andrew Morton
2022-01-14 22:06 ` [patch 070/146] mm: remove the total_mapcount argument from page_trans_huge_map_swapcount() Andrew Morton
2022-01-14 22:06 ` [patch 071/146] mm: remove the total_mapcount argument from page_trans_huge_mapcount() Andrew Morton
2022-01-14 22:06 ` [patch 072/146] mm/dmapool.c: revert "make dma pool to use kmalloc_node" Andrew Morton
2022-01-14 22:06 ` [patch 073/146] mm/vmalloc: alloc GFP_NO{FS,IO} for vmalloc Andrew Morton
2022-01-14 22:07 ` [patch 074/146] mm/vmalloc: add support for __GFP_NOFAIL Andrew Morton
2022-01-14 22:07 ` [patch 075/146] mm/vmalloc: be more explicit about supported gfp flags Andrew Morton
2022-01-14 22:07 ` Andrew Morton [this message]
2022-01-14 22:07 ` [patch 077/146] mm: make slab and vmalloc allocators __GFP_NOLOCKDEP aware Andrew Morton
2022-01-14 22:07 ` [patch 078/146] mm: introduce memalloc_retry_wait() Andrew Morton
2022-01-14 22:07 ` [patch 079/146] mm/pagealloc: sysctl: change watermark_scale_factor max limit to 30% Andrew Morton
2022-01-14 22:07 ` [patch 080/146] mm: fix boolreturn.cocci warning Andrew Morton
2022-01-14 22:07 ` [patch 081/146] mm: page_alloc: fix building error on -Werror=array-compare Andrew Morton
2022-01-14 22:07 ` [patch 082/146] mm: drop node from alloc_pages_vma Andrew Morton
2022-01-14 22:07 ` [patch 083/146] include/linux/gfp.h: further document GFP_DMA32 Andrew Morton
2022-01-14 22:07 ` [patch 084/146] mm/page_alloc.c: modify the comment section for alloc_contig_pages() Andrew Morton
2022-01-14 22:07 ` [patch 085/146] mm_zone: add function to check if managed dma zone exists Andrew Morton
2022-01-14 22:07 ` [patch 086/146] dma/pool: create dma atomic pool only if dma zone has managed pages Andrew Morton
2022-01-14 22:07 ` [patch 087/146] mm/page_alloc.c: do not warn allocation failure on zone DMA if no " Andrew Morton
2022-01-14 22:07 ` [patch 088/146] hugetlb: add hugetlb.*.numa_stat file Andrew Morton
2022-01-14 22:07 ` [patch 089/146] mm, hugepages: make memory size variable in hugepage-mremap selftest Andrew Morton
2022-01-14 22:07 ` [patch 090/146] mm/vmstat: add events for THP max_ptes_* exceeds Andrew Morton
2022-01-14 22:07 ` [patch 091/146] selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting Andrew Morton
2022-01-14 22:08 ` [patch 092/146] selftests/uffd: allow EINTR/EAGAIN Andrew Morton
2022-01-14 22:08 ` [patch 093/146] userfaultfd/selftests: clean up hugetlb allocation code Andrew Morton
2022-01-14 22:08 ` [patch 094/146] vmscan: make drop_slab_node static Andrew Morton
2022-01-14 22:08 ` [patch 095/146] mm/page_isolation: unset migratetype directly for non Buddy page Andrew Morton
2022-01-14 22:08 ` [patch 096/146] mm/mempolicy: use policy_node helper with MPOL_PREFERRED_MANY Andrew Morton
2022-01-14 22:08 ` [patch 097/146] mm/mempolicy: add set_mempolicy_home_node syscall Andrew Morton
2022-01-14 22:08 ` [patch 098/146] mm/mempolicy: wire up syscall set_mempolicy_home_node Andrew Morton
2022-01-14 22:08 ` [patch 099/146] mm/mempolicy: fix all kernel-doc warnings Andrew Morton
2022-01-14 22:08 ` [patch 100/146] mm, oom: OOM sysrq should always kill a process Andrew Morton
2022-01-14 22:08 ` [patch 101/146] hugetlbfs: fix off-by-one error in hugetlb_vmdelete_list() Andrew Morton
2022-01-14 22:08 ` [patch 102/146] mm: migrate: fix the return value of migrate_pages() Andrew Morton
2022-01-14 22:08 ` [patch 103/146] mm: migrate: correct the hugetlb migration stats Andrew Morton
2022-01-14 22:08 ` [patch 104/146] mm: compaction: fix the migration stats in trace_mm_compaction_migratepages() Andrew Morton
2022-01-14 22:08 ` [patch 105/146] mm: migrate: support multiple target nodes demotion Andrew Morton
2022-01-14 22:08 ` [patch 106/146] mm: migrate: add more comments for selecting target node randomly Andrew Morton
2022-01-14 22:08 ` [patch 107/146] mm/migrate: move node demotion code to near its user Andrew Morton
2022-01-14 22:08 ` [patch 108/146] mm/migrate: remove redundant variables used in a for-loop Andrew Morton
2022-01-14 22:08 ` [patch 109/146] mm/thp: drop unused trace events hugepage_[invalidate|splitting] Andrew Morton
2022-01-14 22:08 ` [patch 110/146] mm: ksm: fix use-after-free kasan report in ksm_might_need_to_copy Andrew Morton
2022-01-14 22:09 ` [patch 111/146] mm/hwpoison: mf_mutex for soft offline and unpoison Andrew Morton
2022-01-14 22:09 ` [patch 112/146] mm/hwpoison: remove MF_MSG_BUDDY_2ND and MF_MSG_POISONED_HUGE Andrew Morton
2022-01-14 22:09 ` [patch 113/146] mm/hwpoison: fix unpoison_memory() Andrew Morton
2022-01-14 22:09 ` [patch 114/146] mm: memcg/percpu: account extra objcg space to memory cgroups Andrew Morton
2022-01-14 22:09 ` [patch 115/146] mm/rmap: fix potential batched TLB flush race Andrew Morton
2022-01-14 22:09 ` [patch 116/146] zpool: remove the list of pools_head Andrew Morton
2022-01-14 22:09 ` [patch 117/146] zram: use ATTRIBUTE_GROUPS Andrew Morton
2022-01-14 22:09 ` [patch 118/146] mm: fix some comment errors Andrew Morton
2022-01-14 22:09 ` [patch 119/146] mm: make some vars and functions static or __init Andrew Morton
2022-01-14 22:09 ` [patch 120/146] mm/hmm.c: allow VM_MIXEDMAP to work with hmm_range_fault Andrew Morton
2022-01-14 22:09 ` [patch 121/146] mm/damon: unified access_check function naming rules Andrew Morton
2022-01-14 22:09 ` [patch 122/146] mm/damon: add 'age' of region tracepoint support Andrew Morton
2022-01-14 22:09 ` [patch 123/146] mm/damon/core: use abs() instead of diff_of() Andrew Morton
2022-01-14 22:09 ` [patch 124/146] mm/damon: remove some unneeded function definitions in damon.h Andrew Morton
2022-01-14 22:09 ` [patch 125/146] mm/damon/vaddr: remove swap_ranges() and replace it with swap() Andrew Morton
2022-01-14 22:09 ` [patch 126/146] mm/damon/schemes: add the validity judgment of thresholds Andrew Morton
2022-01-14 22:09 ` [patch 127/146] mm/damon: move damon_rand() definition into damon.h Andrew Morton
2022-01-14 22:09 ` [patch 128/146] mm/damon: modify damon_rand() macro to static inline function Andrew Morton
2022-01-14 22:09 ` [patch 129/146] mm/damon: convert macro functions to static inline functions Andrew Morton
2022-01-14 22:10 ` [patch 131/146] Docs/admin-guide/mm/damon/usage: remove redundant information Andrew Morton
2022-01-14 22:10 ` [patch 132/146] Docs/admin-guide/mm/damon/usage: mention tracepoint at the beginning Andrew Morton
2022-01-14 22:10 ` [patch 133/146] Docs/admin-guide/mm/damon/usage: update for kdamond_pid and (mk|rm)_contexts Andrew Morton
2022-01-14 22:10 ` [patch 134/146] mm/damon: remove a mistakenly added comment for a future feature Andrew Morton
2022-01-14 22:10 ` [patch 135/146] mm/damon/schemes: account scheme actions that successfully applied Andrew Morton
2022-01-14 22:10 ` [patch 136/146] mm/damon/schemes: account how many times quota limit has exceeded Andrew Morton
2022-01-14 22:10 ` [patch 137/146] mm/damon/reclaim: provide reclamation statistics Andrew Morton
2022-01-14 22:10 ` [patch 138/146] Docs/admin-guide/mm/damon/reclaim: document statistics parameters Andrew Morton
2022-01-14 22:10 ` [patch 139/146] mm/damon/dbgfs: support all DAMOS stats Andrew Morton
2022-01-14 22:10 ` [patch 140/146] Docs/admin-guide/mm/damon/usage: update for schemes statistics Andrew Morton
2022-01-14 22:10 ` [patch 141/146] mm/damon: add access checking for hugetlb pages Andrew Morton
2022-01-14 22:10 ` [patch 142/146] mm/damon: move the implementation of damon_insert_region to damon.h Andrew Morton
2022-01-14 22:10 ` [patch 143/146] mm/damon/dbgfs: remove an unnecessary variable Andrew Morton
2022-01-14 22:10 ` [patch 144/146] mm/damon/vaddr: use pr_debug() for damon_va_three_regions() failure logging Andrew Morton
2022-01-14 22:10 ` [patch 145/146] mm/damon/vaddr: hide kernel pointer from damon_va_three_regions() failure log Andrew Morton
2022-01-14 22:10 ` [patch 146/146] mm/damon: hide kernel pointer from tracepoint event Andrew Morton

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220114220707.SD7dYB5br%akpm@linux-foundation.org \
    --to=akpm@linux-foundation.org \
    --cc=bigeasy@linutronix.de \
    --cc=david@fromorbit.com \
    --cc=hch@lst.de \
    --cc=idryomov@gmail.com \
    --cc=jlayton@kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=mhocko@suse.com \
    --cc=mm-commits@vger.kernel.org \
    --cc=neilb@suse.de \
    --cc=torvalds@linux-foundation.org \
    --cc=urezki@gmail.com \
    --cc=vbabka@suse.cz \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).