From: Suren Baghdasaryan <surenb@google.com> To: akpm@linux-foundation.org Cc: kent.overstreet@linux.dev, mhocko@suse.com, vbabka@suse.cz, hannes@cmpxchg.org, roman.gushchin@linux.dev, mgorman@suse.de, dave@stgolabs.net, willy@infradead.org, liam.howlett@oracle.com, corbet@lwn.net, void@manifault.com, peterz@infradead.org, juri.lelli@redhat.com, ldufour@linux.ibm.com, catalin.marinas@arm.com, will@kernel.org, arnd@arndb.de, tglx@linutronix.de, mingo@redhat.com, dave.hansen@linux.intel.com, x86@kernel.org, peterx@redhat.com, david@redhat.com, axboe@kernel.dk, mcgrof@kernel.org, masahiroy@kernel.org, nathan@kernel.org, dennis@kernel.org, tj@kernel.org, muchun.song@linux.dev, rppt@kernel.org, paulmck@kernel.org, pasha.tatashin@soleen.com, yosryahmed@google.com, yuzhao@google.com, dhowells@redhat.com, hughd@google.com, andreyknvl@gmail.com, keescook@chromium.org, ndesaulniers@google.com, gregkh@linuxfoundation.org, ebiggers@google.com, ytcoode@gmail.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, bristot@redhat.com, vschneid@redhat.com, cl@linux.com, penberg@kernel.org, iamjoonsoo.kim@lge.com, 42.hyeyoo@gmail.com, glider@google.com, elver@google.com, dvyukov@google.com, shakeelb@google.com, songmuchun@bytedance.com, jbaron@akamai.com, rientjes@google.com, minchan@google.com, kaleshsingh@google.com, surenb@google.com, kernel-team@android.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, iommu@lists.linux.dev, linux-arch@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-modules@vger.kernel.org, kasan-dev@googlegroups.com, cgroups@vger.kernel.org Subject: [PATCH 34/40] lib: code tagging context capture support Date: Mon, 1 May 2023 09:54:44 -0700 [thread overview] Message-ID: <20230501165450.15352-35-surenb@google.com> (raw) In-Reply-To: <20230501165450.15352-1-surenb@google.com> Add support for code tag context capture when registering a new code tag type. When context capture for a specific code tag is enabled, codetag_ref will point to a codetag_ctx object which can be attached to an application-specific object storing code invocation context. codetag_ctx has a pointer to its codetag_with_ctx object with embedded codetag object in it. All context objects of the same code tag are placed into codetag_with_ctx.ctx_head linked list. codetag.flag is used to indicate when a context capture for the associated code tag is initialized and enabled. Signed-off-by: Suren Baghdasaryan <surenb@google.com> --- include/linux/codetag.h | 50 +++++++++++++- include/linux/codetag_ctx.h | 48 +++++++++++++ lib/codetag.c | 134 ++++++++++++++++++++++++++++++++++++ 3 files changed, 231 insertions(+), 1 deletion(-) create mode 100644 include/linux/codetag_ctx.h diff --git a/include/linux/codetag.h b/include/linux/codetag.h index 87207f199ac9..9ab2f017e845 100644 --- a/include/linux/codetag.h +++ b/include/linux/codetag.h @@ -5,8 +5,12 @@ #ifndef _LINUX_CODETAG_H #define _LINUX_CODETAG_H +#include <linux/container_of.h> +#include <linux/spinlock.h> #include <linux/types.h> +struct kref; +struct codetag_ctx; struct codetag_iterator; struct codetag_type; struct seq_buf; @@ -18,15 +22,38 @@ struct module; * an array of these. */ struct codetag { - unsigned int flags; /* used in later patches */ + unsigned int flags; /* has to be the first member shared with codetag_ctx */ unsigned int lineno; const char *modname; const char *function; const char *filename; } __aligned(8); +/* codetag_with_ctx flags */ +#define CTC_FLAG_CTX_PTR (1 << 0) +#define CTC_FLAG_CTX_READY (1 << 1) +#define CTC_FLAG_CTX_ENABLED (1 << 2) + +/* + * Code tag with context capture support. Contains a list to store context for + * each tag hit, a lock protecting the list and a flag to indicate whether + * context capture is enabled for the tag. + */ +struct codetag_with_ctx { + struct codetag ct; + struct list_head ctx_head; + spinlock_t ctx_lock; +} __aligned(8); + +/* + * Tag reference can point to codetag directly or indirectly via codetag_ctx. + * Direct codetag pointer is used when context capture is disabled or not + * supported. When context capture for the tag is used, the reference points + * to the codetag_ctx through which the codetag can be reached. + */ union codetag_ref { struct codetag *ct; + struct codetag_ctx *ctx; }; struct codetag_range { @@ -46,6 +73,7 @@ struct codetag_type_desc { struct codetag_module *cmod); bool (*module_unload)(struct codetag_type *cttype, struct codetag_module *cmod); + void (*free_ctx)(struct kref *ref); }; struct codetag_iterator { @@ -53,6 +81,7 @@ struct codetag_iterator { struct codetag_module *cmod; unsigned long mod_id; struct codetag *ct; + struct codetag_ctx *ctx; }; #define CODE_TAG_INIT { \ @@ -63,9 +92,28 @@ struct codetag_iterator { .flags = 0, \ } +static inline bool is_codetag_ctx_ref(union codetag_ref *ref) +{ + return !!(ref->ct->flags & CTC_FLAG_CTX_PTR); +} + +static inline +struct codetag_with_ctx *ct_to_ctc(struct codetag *ct) +{ + return container_of(ct, struct codetag_with_ctx, ct); +} + void codetag_lock_module_list(struct codetag_type *cttype, bool lock); struct codetag_iterator codetag_get_ct_iter(struct codetag_type *cttype); struct codetag *codetag_next_ct(struct codetag_iterator *iter); +struct codetag_ctx *codetag_next_ctx(struct codetag_iterator *iter); + +bool codetag_enable_ctx(struct codetag_with_ctx *ctc, bool enable); +static inline bool codetag_ctx_enabled(struct codetag_with_ctx *ctc) +{ + return !!(ctc->ct.flags & CTC_FLAG_CTX_ENABLED); +} +bool codetag_has_ctx(struct codetag_with_ctx *ctc); void codetag_to_text(struct seq_buf *out, struct codetag *ct); diff --git a/include/linux/codetag_ctx.h b/include/linux/codetag_ctx.h new file mode 100644 index 000000000000..e741484f0e08 --- /dev/null +++ b/include/linux/codetag_ctx.h @@ -0,0 +1,48 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * code tag context + */ +#ifndef _LINUX_CODETAG_CTX_H +#define _LINUX_CODETAG_CTX_H + +#include <linux/codetag.h> +#include <linux/kref.h> + +/* Code tag hit context. */ +struct codetag_ctx { + unsigned int flags; /* has to be the first member shared with codetag */ + struct codetag_with_ctx *ctc; + struct list_head node; + struct kref refcount; +} __aligned(8); + +static inline struct codetag_ctx *kref_to_ctx(struct kref *refcount) +{ + return container_of(refcount, struct codetag_ctx, refcount); +} + +static inline void add_ctx(struct codetag_ctx *ctx, + struct codetag_with_ctx *ctc) +{ + kref_init(&ctx->refcount); + spin_lock(&ctc->ctx_lock); + ctx->flags = CTC_FLAG_CTX_PTR; + ctx->ctc = ctc; + list_add_tail(&ctx->node, &ctc->ctx_head); + spin_unlock(&ctc->ctx_lock); +} + +static inline void rem_ctx(struct codetag_ctx *ctx, + void (*free_ctx)(struct kref *refcount)) +{ + struct codetag_with_ctx *ctc = ctx->ctc; + + spin_lock(&ctc->ctx_lock); + /* ctx might have been removed while we were using it */ + if (!list_empty(&ctx->node)) + list_del_init(&ctx->node); + spin_unlock(&ctc->ctx_lock); + kref_put(&ctx->refcount, free_ctx); +} + +#endif /* _LINUX_CODETAG_CTX_H */ diff --git a/lib/codetag.c b/lib/codetag.c index 84f90f3b922c..d891bbe4481d 100644 --- a/lib/codetag.c +++ b/lib/codetag.c @@ -1,5 +1,6 @@ // SPDX-License-Identifier: GPL-2.0-only #include <linux/codetag.h> +#include <linux/codetag_ctx.h> #include <linux/idr.h> #include <linux/kallsyms.h> #include <linux/module.h> @@ -92,6 +93,139 @@ struct codetag *codetag_next_ct(struct codetag_iterator *iter) return ct; } +static struct codetag_ctx *next_ctx_from_ct(struct codetag_iterator *iter) +{ + struct codetag_with_ctx *ctc; + struct codetag_ctx *ctx = NULL; + struct codetag *ct = iter->ct; + + while (ct) { + if (!(ct->flags & CTC_FLAG_CTX_READY)) + goto next; + + ctc = ct_to_ctc(ct); + spin_lock(&ctc->ctx_lock); + if (!list_empty(&ctc->ctx_head)) { + ctx = list_first_entry(&ctc->ctx_head, + struct codetag_ctx, node); + kref_get(&ctx->refcount); + } + spin_unlock(&ctc->ctx_lock); + if (ctx) + break; +next: + ct = codetag_next_ct(iter); + } + + iter->ctx = ctx; + return ctx; +} + +struct codetag_ctx *codetag_next_ctx(struct codetag_iterator *iter) +{ + struct codetag_ctx *ctx = iter->ctx; + struct codetag_ctx *found = NULL; + + lockdep_assert_held(&iter->cttype->mod_lock); + + if (!ctx) + return next_ctx_from_ct(iter); + + spin_lock(&ctx->ctc->ctx_lock); + /* + * Do not advance if the object was isolated, restart at the same tag. + */ + if (!list_empty(&ctx->node)) { + if (list_is_last(&ctx->node, &ctx->ctc->ctx_head)) { + /* Finished with this tag, advance to the next */ + codetag_next_ct(iter); + } else { + found = list_next_entry(ctx, node); + kref_get(&found->refcount); + } + } + spin_unlock(&ctx->ctc->ctx_lock); + kref_put(&ctx->refcount, iter->cttype->desc.free_ctx); + + if (!found) + return next_ctx_from_ct(iter); + + iter->ctx = found; + return found; +} + +static struct codetag_type *find_cttype(struct codetag *ct) +{ + struct codetag_module *cmod; + struct codetag_type *cttype; + unsigned long mod_id; + unsigned long tmp; + + mutex_lock(&codetag_lock); + list_for_each_entry(cttype, &codetag_types, link) { + down_read(&cttype->mod_lock); + idr_for_each_entry_ul(&cttype->mod_idr, cmod, tmp, mod_id) { + if (ct >= cmod->range.start && ct < cmod->range.stop) { + up_read(&cttype->mod_lock); + goto found; + } + } + up_read(&cttype->mod_lock); + } + cttype = NULL; +found: + mutex_unlock(&codetag_lock); + + return cttype; +} + +bool codetag_enable_ctx(struct codetag_with_ctx *ctc, bool enable) +{ + struct codetag_type *cttype = find_cttype(&ctc->ct); + + if (!cttype || !cttype->desc.free_ctx) + return false; + + lockdep_assert_held(&cttype->mod_lock); + BUG_ON(!rwsem_is_locked(&cttype->mod_lock)); + + if (codetag_ctx_enabled(ctc) == enable) + return false; + + if (enable) { + /* Initialize context capture fields only once */ + if (!(ctc->ct.flags & CTC_FLAG_CTX_READY)) { + spin_lock_init(&ctc->ctx_lock); + INIT_LIST_HEAD(&ctc->ctx_head); + ctc->ct.flags |= CTC_FLAG_CTX_READY; + } + ctc->ct.flags |= CTC_FLAG_CTX_ENABLED; + } else { + /* + * The list of context objects is intentionally left untouched. + * It can be read back and if context capture is re-enablied it + * will append new objects. + */ + ctc->ct.flags &= ~CTC_FLAG_CTX_ENABLED; + } + + return true; +} + +bool codetag_has_ctx(struct codetag_with_ctx *ctc) +{ + bool no_ctx; + + if (!(ctc->ct.flags & CTC_FLAG_CTX_READY)) + return false; + + spin_lock(&ctc->ctx_lock); + no_ctx = list_empty(&ctc->ctx_head); + spin_unlock(&ctc->ctx_lock); + + return !no_ctx; +} + void codetag_to_text(struct seq_buf *out, struct codetag *ct) { seq_buf_printf(out, "%s:%u module:%s func:%s", -- 2.40.1.495.gc816e09b53d-goog
WARNING: multiple messages have this Message-ID (diff)
From: Suren Baghdasaryan <surenb@google.com> To: akpm@linux-foundation.org Cc: kent.overstreet@linux.dev, mhocko@suse.com, vbabka@suse.cz, hannes@cmpxchg.org, roman.gushchin@linux.dev, mgorman@suse.de, dave@stgolabs.net, willy@infradead.org, liam.howlett@oracle.com, corbet@lwn.net, void@manifault.com, peterz@infradead.org, juri.lelli@redhat.com, ldufour@linux.ibm.com, catalin.marinas@arm.com, will@kernel.org, arnd@arndb.de, tglx@linutronix.de, mingo@redhat.com, dave.hansen@linux.intel.com, x86@kernel.org, peterx@redhat.com, david@redhat.com, axboe@kernel.dk, mcgrof@kernel.org, masahiroy@kernel.org, nathan@kernel.org, dennis@kernel.org, tj@kernel.org, muchun.song@linux.dev, rppt@kernel.org, paulmck@kernel.org, pasha.tatashin@soleen.com, yosryahmed@google.com, yuzhao@google.com, dhowells@redhat.com, hughd@google.com, andreyknvl@gmail.com, keescook@chromium.org Subject: [PATCH 34/40] lib: code tagging context capture support Date: Mon, 1 May 2023 09:54:44 -0700 [thread overview] Message-ID: <20230501165450.15352-35-surenb@google.com> (raw) In-Reply-To: <20230501165450.15352-1-surenb@google.com> Add support for code tag context capture when registering a new code tag type. When context capture for a specific code tag is enabled, codetag_ref will point to a codetag_ctx object which can be attached to an application-specific object storing code invocation context. codetag_ctx has a pointer to its codetag_with_ctx object with embedded codetag object in it. All context objects of the same code tag are placed into codetag_with_ctx.ctx_head linked list. codetag.flag is used to indicate when a context capture for the associated code tag is initialized and enabled. Signed-off-by: Suren Baghdasaryan <surenb@google.com> --- include/linux/codetag.h | 50 +++++++++++++- include/linux/codetag_ctx.h | 48 +++++++++++++ lib/codetag.c | 134 ++++++++++++++++++++++++++++++++++++ 3 files changed, 231 insertions(+), 1 deletion(-) create mode 100644 include/linux/codetag_ctx.h diff --git a/include/linux/codetag.h b/include/linux/codetag.h index 87207f199ac9..9ab2f017e845 100644 --- a/include/linux/codetag.h +++ b/include/linux/codetag.h @@ -5,8 +5,12 @@ #ifndef _LINUX_CODETAG_H #define _LINUX_CODETAG_H +#include <linux/container_of.h> +#include <linux/spinlock.h> #include <linux/types.h> +struct kref; +struct codetag_ctx; struct codetag_iterator; struct codetag_type; struct seq_buf; @@ -18,15 +22,38 @@ struct module; * an array of these. */ struct codetag { - unsigned int flags; /* used in later patches */ + unsigned int flags; /* has to be the first member shared with codetag_ctx */ unsigned int lineno; const char *modname; const char *function; const char *filename; } __aligned(8); +/* codetag_with_ctx flags */ +#define CTC_FLAG_CTX_PTR (1 << 0) +#define CTC_FLAG_CTX_READY (1 << 1) +#define CTC_FLAG_CTX_ENABLED (1 << 2) + +/* + * Code tag with context capture support. Contains a list to store context for + * each tag hit, a lock protecting the list and a flag to indicate whether + * context capture is enabled for the tag. + */ +struct codetag_with_ctx { + struct codetag ct; + struct list_head ctx_head; + spinlock_t ctx_lock; +} __aligned(8); + +/* + * Tag reference can point to codetag directly or indirectly via codetag_ctx. + * Direct codetag pointer is used when context capture is disabled or not + * supported. When context capture for the tag is used, the reference points + * to the codetag_ctx through which the codetag can be reached. + */ union codetag_ref { struct codetag *ct; + struct codetag_ctx *ctx; }; struct codetag_range { @@ -46,6 +73,7 @@ struct codetag_type_desc { struct codetag_module *cmod); bool (*module_unload)(struct codetag_type *cttype, struct codetag_module *cmod); + void (*free_ctx)(struct kref *ref); }; struct codetag_iterator { @@ -53,6 +81,7 @@ struct codetag_iterator { struct codetag_module *cmod; unsigned long mod_id; struct codetag *ct; + struct codetag_ctx *ctx; }; #define CODE_TAG_INIT { \ @@ -63,9 +92,28 @@ struct codetag_iterator { .flags = 0, \ } +static inline bool is_codetag_ctx_ref(union codetag_ref *ref) +{ + return !!(ref->ct->flags & CTC_FLAG_CTX_PTR); +} + +static inline +struct codetag_with_ctx *ct_to_ctc(struct codetag *ct) +{ + return container_of(ct, struct codetag_with_ctx, ct); +} + void codetag_lock_module_list(struct codetag_type *cttype, bool lock); struct codetag_iterator codetag_get_ct_iter(struct codetag_type *cttype); struct codetag *codetag_next_ct(struct codetag_iterator *iter); +struct codetag_ctx *codetag_next_ctx(struct codetag_iterator *iter); + +bool codetag_enable_ctx(struct codetag_with_ctx *ctc, bool enable); +static inline bool codetag_ctx_enabled(struct codetag_with_ctx *ctc) +{ + return !!(ctc->ct.flags & CTC_FLAG_CTX_ENABLED); +} +bool codetag_has_ctx(struct codetag_with_ctx *ctc); void codetag_to_text(struct seq_buf *out, struct codetag *ct); diff --git a/include/linux/codetag_ctx.h b/include/linux/codetag_ctx.h new file mode 100644 index 000000000000..e741484f0e08 --- /dev/null +++ b/include/linux/codetag_ctx.h @@ -0,0 +1,48 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * code tag context + */ +#ifndef _LINUX_CODETAG_CTX_H +#define _LINUX_CODETAG_CTX_H + +#include <linux/codetag.h> +#include <linux/kref.h> + +/* Code tag hit context. */ +struct codetag_ctx { + unsigned int flags; /* has to be the first member shared with codetag */ + struct codetag_with_ctx *ctc; + struct list_head node; + struct kref refcount; +} __aligned(8); + +static inline struct codetag_ctx *kref_to_ctx(struct kref *refcount) +{ + return container_of(refcount, struct codetag_ctx, refcount); +} + +static inline void add_ctx(struct codetag_ctx *ctx, + struct codetag_with_ctx *ctc) +{ + kref_init(&ctx->refcount); + spin_lock(&ctc->ctx_lock); + ctx->flags = CTC_FLAG_CTX_PTR; + ctx->ctc = ctc; + list_add_tail(&ctx->node, &ctc->ctx_head); + spin_unlock(&ctc->ctx_lock); +} + +static inline void rem_ctx(struct codetag_ctx *ctx, + void (*free_ctx)(struct kref *refcount)) +{ + struct codetag_with_ctx *ctc = ctx->ctc; + + spin_lock(&ctc->ctx_lock); + /* ctx might have been removed while we were using it */ + if (!list_empty(&ctx->node)) + list_del_init(&ctx->node); + spin_unlock(&ctc->ctx_lock); + kref_put(&ctx->refcount, free_ctx); +} + +#endif /* _LINUX_CODETAG_CTX_H */ diff --git a/lib/codetag.c b/lib/codetag.c index 84f90f3b922c..d891bbe4481d 100644 --- a/lib/codetag.c +++ b/lib/codetag.c @@ -1,5 +1,6 @@ // SPDX-License-Identifier: GPL-2.0-only #include <linux/codetag.h> +#include <linux/codetag_ctx.h> #include <linux/idr.h> #include <linux/kallsyms.h> #include <linux/module.h> @@ -92,6 +93,139 @@ struct codetag *codetag_next_ct(struct codetag_iterator *iter) return ct; } +static struct codetag_ctx *next_ctx_from_ct(struct codetag_iterator *iter) +{ + struct codetag_with_ctx *ctc; + struct codetag_ctx *ctx = NULL; + struct codetag *ct = iter->ct; + + while (ct) { + if (!(ct->flags & CTC_FLAG_CTX_READY)) + goto next; + + ctc = ct_to_ctc(ct); + spin_lock(&ctc->ctx_lock); + if (!list_empty(&ctc->ctx_head)) { + ctx = list_first_entry(&ctc->ctx_head, + struct codetag_ctx, node); + kref_get(&ctx->refcount); + } + spin_unlock(&ctc->ctx_lock); + if (ctx) + break; +next: + ct = codetag_next_ct(iter); + } + + iter->ctx = ctx; + return ctx; +} + +struct codetag_ctx *codetag_next_ctx(struct codetag_iterator *iter) +{ + struct codetag_ctx *ctx = iter->ctx; + struct codetag_ctx *found = NULL; + + lockdep_assert_held(&iter->cttype->mod_lock); + + if (!ctx) + return next_ctx_from_ct(iter); + + spin_lock(&ctx->ctc->ctx_lock); + /* + * Do not advance if the object was isolated, restart at the same tag. + */ + if (!list_empty(&ctx->node)) { + if (list_is_last(&ctx->node, &ctx->ctc->ctx_head)) { + /* Finished with this tag, advance to the next */ + codetag_next_ct(iter); + } else { + found = list_next_entry(ctx, node); + kref_get(&found->refcount); + } + } + spin_unlock(&ctx->ctc->ctx_lock); + kref_put(&ctx->refcount, iter->cttype->desc.free_ctx); + + if (!found) + return next_ctx_from_ct(iter); + + iter->ctx = found; + return found; +} + +static struct codetag_type *find_cttype(struct codetag *ct) +{ + struct codetag_module *cmod; + struct codetag_type *cttype; + unsigned long mod_id; + unsigned long tmp; + + mutex_lock(&codetag_lock); + list_for_each_entry(cttype, &codetag_types, link) { + down_read(&cttype->mod_lock); + idr_for_each_entry_ul(&cttype->mod_idr, cmod, tmp, mod_id) { + if (ct >= cmod->range.start && ct < cmod->range.stop) { + up_read(&cttype->mod_lock); + goto found; + } + } + up_read(&cttype->mod_lock); + } + cttype = NULL; +found: + mutex_unlock(&codetag_lock); + + return cttype; +} + +bool codetag_enable_ctx(struct codetag_with_ctx *ctc, bool enable) +{ + struct codetag_type *cttype = find_cttype(&ctc->ct); + + if (!cttype || !cttype->desc.free_ctx) + return false; + + lockdep_assert_held(&cttype->mod_lock); + BUG_ON(!rwsem_is_locked(&cttype->mod_lock)); + + if (codetag_ctx_enabled(ctc) == enable) + return false; + + if (enable) { + /* Initialize context capture fields only once */ + if (!(ctc->ct.flags & CTC_FLAG_CTX_READY)) { + spin_lock_init(&ctc->ctx_lock); + INIT_LIST_HEAD(&ctc->ctx_head); + ctc->ct.flags |= CTC_FLAG_CTX_READY; + } + ctc->ct.flags |= CTC_FLAG_CTX_ENABLED; + } else { + /* + * The list of context objects is intentionally left untouched. + * It can be read back and if context capture is re-enablied it + * will append new objects. + */ + ctc->ct.flags &= ~CTC_FLAG_CTX_ENABLED; + } + + return true; +} + +bool codetag_has_ctx(struct codetag_with_ctx *ctc) +{ + bool no_ctx; + + if (!(ctc->ct.flags & CTC_FLAG_CTX_READY)) + return false; + + spin_lock(&ctc->ctx_lock); + no_ctx = list_empty(&ctc->ctx_head); + spin_unlock(&ctc->ctx_lock); + + return !no_ctx; +} + void codetag_to_text(struct seq_buf *out, struct codetag *ct) { seq_buf_printf(out, "%s:%u module:%s func:%s", -- 2.40.1.495.gc816e09b53d-goog
next prev parent reply other threads:[~2023-05-01 17:02 UTC|newest] Thread overview: 320+ messages / expand[flat|nested] mbox.gz Atom feed top 2023-05-01 16:54 [PATCH 00/40] Memory allocation profiling Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 01/40] lib/string_helpers: Drop space in string_get_size's output Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 18:13 ` Davidlohr Bueso 2023-05-01 18:13 ` Davidlohr Bueso 2023-05-01 19:35 ` Kent Overstreet 2023-05-01 19:35 ` Kent Overstreet 2023-05-01 19:57 ` Andy Shevchenko 2023-05-01 19:57 ` Andy Shevchenko 2023-05-01 21:16 ` Kent Overstreet 2023-05-01 21:16 ` Kent Overstreet 2023-05-01 21:33 ` Liam R. Howlett 2023-05-01 21:33 ` Liam R. Howlett 2023-05-02 0:11 ` Kent Overstreet 2023-05-02 0:11 ` Kent Overstreet 2023-05-02 0:53 ` Kent Overstreet 2023-05-02 0:53 ` Kent Overstreet [not found] ` <ZFAUj+Q+hP7cWs4w-jC9Py7bek1znysI04z7BkA@public.gmane.org> 2023-05-02 2:22 ` James Bottomley 2023-05-02 2:22 ` James Bottomley 2023-05-02 3:17 ` Kent Overstreet 2023-05-02 3:17 ` Kent Overstreet 2023-05-02 5:33 ` Andy Shevchenko 2023-05-02 5:33 ` Andy Shevchenko 2023-05-02 6:21 ` Kent Overstreet 2023-05-02 6:21 ` Kent Overstreet 2023-05-02 15:19 ` Andy Shevchenko 2023-05-02 15:19 ` Andy Shevchenko 2023-05-03 2:07 ` Kent Overstreet 2023-05-03 2:07 ` Kent Overstreet 2023-05-03 6:30 ` Andy Shevchenko 2023-05-03 6:30 ` Andy Shevchenko 2023-05-03 7:12 ` Kent Overstreet 2023-05-03 7:12 ` Kent Overstreet 2023-05-03 9:12 ` Andy Shevchenko 2023-05-03 9:12 ` Andy Shevchenko 2023-05-03 9:16 ` Kent Overstreet 2023-05-03 9:16 ` Kent Overstreet 2023-05-02 11:42 ` James Bottomley 2023-05-02 11:42 ` James Bottomley 2023-05-02 22:50 ` Dave Chinner 2023-05-02 22:50 ` Dave Chinner 2023-05-03 9:28 ` Vlastimil Babka 2023-05-03 9:28 ` Vlastimil Babka 2023-05-03 9:44 ` Andy Shevchenko 2023-05-03 9:44 ` Andy Shevchenko 2023-05-03 12:15 ` James Bottomley 2023-05-03 12:15 ` James Bottomley 2023-05-02 7:55 ` Jani Nikula 2023-05-02 7:55 ` Jani Nikula 2023-05-01 16:54 ` [PATCH 02/40] scripts/kallysms: Always include __start and __stop symbols Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 03/40] fs: Convert alloc_inode_sb() to a macro Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-02 12:35 ` Petr Tesařík 2023-05-02 12:35 ` Petr Tesařík 2023-05-02 19:57 ` Kent Overstreet 2023-05-02 19:57 ` Kent Overstreet 2023-05-02 20:20 ` Petr Tesařík 2023-05-02 20:20 ` Petr Tesařík 2023-05-01 16:54 ` [PATCH 04/40] nodemask: Split out include/linux/nodemask_types.h Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 05/40] prandom: Remove unused include Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 06/40] lib/string.c: strsep_no_empty() Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-02 12:37 ` Petr Tesařík 2023-05-02 12:37 ` Petr Tesařík 2023-05-01 16:54 ` [PATCH 07/40] Lazy percpu counters Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 19:17 ` Randy Dunlap 2023-05-01 19:17 ` Randy Dunlap 2023-05-01 16:54 ` [PATCH 08/40] mm: introduce slabobj_ext to support slab object extensions Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 09/40] mm: introduce __GFP_NO_OBJ_EXT flag to selectively prevent slabobj_ext creation Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-02 12:50 ` Petr Tesařík 2023-05-02 12:50 ` Petr Tesařík 2023-05-02 18:33 ` Suren Baghdasaryan 2023-05-02 18:33 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 10/40] mm/slab: introduce SLAB_NO_OBJ_EXT to avoid obj_ext creation Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 11/40] mm: prevent slabobj_ext allocations for slabobj_ext and kmem_cache objects Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 12/40] slab: objext: introduce objext_flags as extension to page_memcg_data_flags Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 13/40] lib: code tagging framework Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 14/40] lib: code tagging module support Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 15/40] lib: prevent module unloading if memory is not freed Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 16/40] lib: code tagging query helper functions Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 17/40] lib: add allocation tagging support for memory allocation profiling Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 18/40] lib: introduce support for page allocation tagging Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 19/40] change alloc_pages name in dma_map_ops to avoid name conflicts Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-02 15:50 ` Petr Tesařík 2023-05-02 15:50 ` Petr Tesařík 2023-05-02 18:38 ` Suren Baghdasaryan 2023-05-02 18:38 ` Suren Baghdasaryan 2023-05-02 20:09 ` Petr Tesařík 2023-05-02 20:09 ` Petr Tesařík 2023-05-02 20:18 ` Kent Overstreet 2023-05-02 20:18 ` Kent Overstreet 2023-05-02 20:24 ` Suren Baghdasaryan 2023-05-02 20:24 ` Suren Baghdasaryan 2023-05-02 20:39 ` Petr Tesařík 2023-05-02 20:39 ` Petr Tesařík 2023-05-02 20:41 ` Suren Baghdasaryan 2023-05-02 20:41 ` Suren Baghdasaryan 2023-05-03 16:25 ` Steven Rostedt 2023-05-03 16:25 ` Steven Rostedt 2023-05-03 18:03 ` Suren Baghdasaryan 2023-05-03 18:03 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 20/40] mm: enable page allocation tagging Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 21/40] mm/page_ext: enable early_page_ext when CONFIG_MEM_ALLOC_PROFILING_DEBUG=y Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 22/40] mm: create new codetag references during page splitting Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 23/40] lib: add codetag reference into slabobj_ext Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 24/40] mm/slab: add allocation accounting into slab allocation and free paths Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 25/40] mm/slab: enable slab allocation tagging for kmalloc and friends Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 26/40] mm/slub: Mark slab_free_freelist_hook() __always_inline Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 27/40] mempool: Hook up to memory allocation profiling Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 28/40] timekeeping: Fix a circular include dependency Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-02 15:50 ` Thomas Gleixner 2023-05-02 15:50 ` Thomas Gleixner 2023-05-01 16:54 ` [PATCH 29/40] mm: percpu: Introduce pcpuobj_ext Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 30/40] mm: percpu: Add codetag reference into pcpuobj_ext Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 31/40] mm: percpu: enable per-cpu allocation tagging Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 32/40] arm64: Fix circular header dependency Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 33/40] move stack capture functionality into a separate function for reuse Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan [this message] 2023-05-01 16:54 ` [PATCH 34/40] lib: code tagging context capture support Suren Baghdasaryan 2023-05-03 7:35 ` Michal Hocko 2023-05-03 7:35 ` Michal Hocko 2023-05-03 15:18 ` Suren Baghdasaryan 2023-05-03 15:18 ` Suren Baghdasaryan 2023-05-03 15:26 ` Dave Hansen 2023-05-03 15:26 ` Dave Hansen 2023-05-03 19:45 ` Suren Baghdasaryan 2023-05-03 19:45 ` Suren Baghdasaryan 2023-05-04 8:04 ` Michal Hocko 2023-05-04 8:04 ` Michal Hocko 2023-05-04 14:31 ` Suren Baghdasaryan 2023-05-04 14:31 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 35/40] lib: implement context capture support for tagged allocations Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-03 7:39 ` Michal Hocko 2023-05-03 7:39 ` Michal Hocko 2023-05-03 15:24 ` Suren Baghdasaryan 2023-05-03 15:24 ` Suren Baghdasaryan 2023-05-04 8:09 ` Michal Hocko 2023-05-04 8:09 ` Michal Hocko 2023-05-04 16:22 ` Suren Baghdasaryan 2023-05-04 16:22 ` Suren Baghdasaryan 2023-05-05 8:40 ` Michal Hocko 2023-05-05 8:40 ` Michal Hocko 2023-05-05 18:10 ` Suren Baghdasaryan 2023-05-05 18:10 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 36/40] lib: add memory allocations report in show_mem() Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 37/40] codetag: debug: skip objext checking when it's for objext itself Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 38/40] codetag: debug: mark codetags for reserved pages as empty Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 39/40] codetag: debug: introduce OBJEXTS_ALLOC_FAIL to mark failed slab_ext allocations Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 16:54 ` [PATCH 40/40] MAINTAINERS: Add entries for code tagging and memory allocation profiling Suren Baghdasaryan 2023-05-01 16:54 ` Suren Baghdasaryan 2023-05-01 17:47 ` [PATCH 00/40] Memory " Roman Gushchin 2023-05-01 17:47 ` Roman Gushchin 2023-05-01 18:08 ` Suren Baghdasaryan 2023-05-01 18:08 ` Suren Baghdasaryan 2023-05-01 18:14 ` Roman Gushchin 2023-05-01 18:14 ` Roman Gushchin 2023-05-01 19:37 ` Kent Overstreet 2023-05-01 19:37 ` Kent Overstreet 2023-05-01 21:18 ` Roman Gushchin 2023-05-01 21:18 ` Roman Gushchin 2023-05-03 7:25 ` Michal Hocko 2023-05-03 7:25 ` Michal Hocko 2023-05-03 7:34 ` Kent Overstreet 2023-05-03 7:34 ` Kent Overstreet 2023-05-03 7:51 ` Michal Hocko 2023-05-03 7:51 ` Michal Hocko 2023-05-03 8:05 ` Kent Overstreet 2023-05-03 8:05 ` Kent Overstreet 2023-05-03 13:21 ` Steven Rostedt 2023-05-03 13:21 ` Steven Rostedt 2023-05-03 16:35 ` Tejun Heo 2023-05-03 16:35 ` Tejun Heo 2023-05-03 17:42 ` Suren Baghdasaryan 2023-05-03 17:42 ` Suren Baghdasaryan 2023-05-03 18:06 ` Tejun Heo 2023-05-03 18:06 ` Tejun Heo 2023-05-03 17:44 ` Kent Overstreet 2023-05-03 17:44 ` Kent Overstreet 2023-05-03 17:51 ` Kent Overstreet 2023-05-03 17:51 ` Kent Overstreet 2023-05-03 18:24 ` Tejun Heo 2023-05-03 18:24 ` Tejun Heo 2023-05-03 18:07 ` Johannes Weiner 2023-05-03 18:07 ` Johannes Weiner 2023-05-03 18:19 ` Tejun Heo 2023-05-03 18:19 ` Tejun Heo 2023-05-03 18:40 ` Tejun Heo 2023-05-03 18:40 ` Tejun Heo 2023-05-03 18:56 ` Kent Overstreet 2023-05-03 18:56 ` Kent Overstreet 2023-05-03 18:58 ` Tejun Heo 2023-05-03 18:58 ` Tejun Heo 2023-05-03 19:09 ` Tejun Heo 2023-05-03 19:09 ` Tejun Heo 2023-05-03 19:41 ` Suren Baghdasaryan 2023-05-03 19:41 ` Suren Baghdasaryan 2023-05-03 19:48 ` Tejun Heo 2023-05-03 19:48 ` Tejun Heo 2023-05-03 20:00 ` Tejun Heo 2023-05-03 20:00 ` Tejun Heo 2023-05-03 20:14 ` Suren Baghdasaryan 2023-05-03 20:14 ` Suren Baghdasaryan 2023-05-04 2:25 ` Tejun Heo 2023-05-04 2:25 ` Tejun Heo 2023-05-04 3:33 ` Kent Overstreet 2023-05-04 3:33 ` Kent Overstreet 2023-05-04 3:33 ` Suren Baghdasaryan 2023-05-04 3:33 ` Suren Baghdasaryan 2023-05-04 8:00 ` Petr Tesařík 2023-05-04 8:00 ` Petr Tesařík 2023-05-03 20:08 ` Suren Baghdasaryan 2023-05-03 20:08 ` Suren Baghdasaryan 2023-05-03 20:11 ` Johannes Weiner 2023-05-03 20:11 ` Johannes Weiner 2023-05-04 2:16 ` Tejun Heo 2023-05-04 2:16 ` Tejun Heo 2023-05-03 20:04 ` Andrey Ryabinin 2023-05-03 20:04 ` Andrey Ryabinin 2023-05-03 9:50 ` Petr Tesařík 2023-05-03 9:50 ` Petr Tesařík 2023-05-03 9:54 ` Kent Overstreet 2023-05-03 9:54 ` Kent Overstreet 2023-05-03 10:24 ` Petr Tesařík 2023-05-03 10:24 ` Petr Tesařík 2023-05-03 9:57 ` Kent Overstreet 2023-05-03 9:57 ` Kent Overstreet 2023-05-03 10:26 ` Petr Tesařík 2023-05-03 10:26 ` Petr Tesařík 2023-05-03 15:30 ` Kent Overstreet 2023-05-03 15:30 ` Kent Overstreet 2023-05-03 12:33 ` James Bottomley 2023-05-03 12:33 ` James Bottomley 2023-05-03 14:31 ` Suren Baghdasaryan 2023-05-03 14:31 ` Suren Baghdasaryan 2023-05-03 15:28 ` Kent Overstreet 2023-05-03 15:28 ` Kent Overstreet 2023-05-03 15:37 ` Lorenzo Stoakes 2023-05-03 15:37 ` Lorenzo Stoakes 2023-05-03 16:03 ` Kent Overstreet 2023-05-03 16:03 ` Kent Overstreet 2023-05-03 15:49 ` James Bottomley 2023-05-03 15:49 ` James Bottomley 2023-05-03 15:09 ` Suren Baghdasaryan 2023-05-03 15:09 ` Suren Baghdasaryan 2023-05-03 16:28 ` Steven Rostedt 2023-05-03 16:28 ` Steven Rostedt 2023-05-03 17:40 ` Suren Baghdasaryan 2023-05-03 17:40 ` Suren Baghdasaryan 2023-05-03 18:03 ` Steven Rostedt 2023-05-03 18:03 ` Steven Rostedt 2023-05-03 18:07 ` Suren Baghdasaryan 2023-05-03 18:07 ` Suren Baghdasaryan 2023-05-03 18:12 ` Kent Overstreet 2023-05-03 18:12 ` Kent Overstreet 2023-05-04 9:07 ` Michal Hocko 2023-05-04 9:07 ` Michal Hocko 2023-05-04 15:08 ` Suren Baghdasaryan 2023-05-04 15:08 ` Suren Baghdasaryan 2023-05-07 10:27 ` Michal Hocko 2023-05-07 10:27 ` Michal Hocko 2023-05-07 17:01 ` Kent Overstreet 2023-05-07 17:01 ` Kent Overstreet 2023-05-07 17:20 ` Kent Overstreet 2023-05-07 17:20 ` Kent Overstreet 2023-05-07 20:55 ` Steven Rostedt 2023-05-07 20:55 ` Steven Rostedt 2023-05-07 21:53 ` Kent Overstreet 2023-05-07 21:53 ` Kent Overstreet 2023-05-07 22:09 ` Steven Rostedt 2023-05-07 22:09 ` Steven Rostedt 2023-05-07 22:17 ` Kent Overstreet 2023-05-07 22:17 ` Kent Overstreet 2023-05-08 15:52 ` Petr Tesařík 2023-05-08 15:52 ` Petr Tesařík 2023-05-08 15:57 ` Kent Overstreet 2023-05-08 15:57 ` Kent Overstreet 2023-05-08 16:09 ` Petr Tesařík 2023-05-08 16:09 ` Petr Tesařík 2023-05-08 16:28 ` Kent Overstreet 2023-05-08 16:28 ` Kent Overstreet 2023-05-08 18:59 ` Petr Tesařík 2023-05-08 18:59 ` Petr Tesařík 2023-05-08 20:48 ` Kent Overstreet 2023-05-08 20:48 ` Kent Overstreet
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20230501165450.15352-35-surenb@google.com \ --to=surenb@google.com \ --cc=42.hyeyoo@gmail.com \ --cc=akpm@linux-foundation.org \ --cc=andreyknvl@gmail.com \ --cc=arnd@arndb.de \ --cc=axboe@kernel.dk \ --cc=bristot@redhat.com \ --cc=bsegall@google.com \ --cc=catalin.marinas@arm.com \ --cc=cgroups@vger.kernel.org \ --cc=cl@linux.com \ --cc=corbet@lwn.net \ --cc=dave.hansen@linux.intel.com \ --cc=dave@stgolabs.net \ --cc=david@redhat.com \ --cc=dennis@kernel.org \ --cc=dhowells@redhat.com \ --cc=dietmar.eggemann@arm.com \ --cc=dvyukov@google.com \ --cc=ebiggers@google.com \ --cc=elver@google.com \ --cc=glider@google.com \ --cc=gregkh@linuxfoundation.org \ --cc=hannes@cmpxchg.org \ --cc=hughd@google.com \ --cc=iamjoonsoo.kim@lge.com \ --cc=iommu@lists.linux.dev \ --cc=jbaron@akamai.com \ --cc=juri.lelli@redhat.com \ --cc=kaleshsingh@google.com \ --cc=kasan-dev@googlegroups.com \ --cc=keescook@chromium.org \ --cc=kent.overstreet@linux.dev \ --cc=kernel-team@android.com \ --cc=ldufour@linux.ibm.com \ --cc=liam.howlett@oracle.com \ --cc=linux-arch@vger.kernel.org \ --cc=linux-doc@vger.kernel.org \ --cc=linux-fsdevel@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=linux-modules@vger.kernel.org \ --cc=masahiroy@kernel.org \ --cc=mcgrof@kernel.org \ --cc=mgorman@suse.de \ --cc=mhocko@suse.com \ --cc=minchan@google.com \ --cc=mingo@redhat.com \ --cc=muchun.song@linux.dev \ --cc=nathan@kernel.org \ --cc=ndesaulniers@google.com \ --cc=pasha.tatashin@soleen.com \ --cc=paulmck@kernel.org \ --cc=penberg@kernel.org \ --cc=peterx@redhat.com \ --cc=peterz@infradead.org \ --cc=rientjes@google.com \ --cc=roman.gushchin@linux.dev \ --cc=rostedt@goodmis.org \ --cc=rppt@kernel.org \ --cc=shakeelb@google.com \ --cc=songmuchun@bytedance.com \ --cc=tglx@linutronix.de \ --cc=tj@kernel.org \ --cc=vbabka@suse.cz \ --cc=vincent.guittot@linaro.org \ --cc=void@manifault.com \ --cc=vschneid@redhat.com \ --cc=will@kernel.org \ --cc=willy@infradead.org \ --cc=x86@kernel.org \ --cc=yosryahmed@google.com \ --cc=ytcoode@gmail.com \ --cc=yuzhao@google.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.