Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1516262ybl; Fri, 6 Dec 2019 19:48:46 -0800 (PST) X-Google-Smtp-Source: APXvYqy/jGnXm43JBSTZJAg9H/9QmmrqpsSuSC0imNpaH4pffINVWKa9lm0Wr3DqtvShQzIU/aGQ X-Received: by 2002:aca:3182:: with SMTP id x124mr15900515oix.170.1575690526006; Fri, 06 Dec 2019 19:48:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575690525; cv=none; d=google.com; s=arc-20160816; b=trtjjQSQl6q7nFB1A3TeDtPtOqN2NZbC2kctYa5czkbJ+qzhNbvWNfr8UwiH6QTOy8 +ctiKFvNaEPYpfEWUBkZgG81dEdGQPiWLxFtIffGBc646Dx9aaAgxHkyZXF569hO2Zdf hQ4ZjUFEbjXbI1RIclrhm30dXUabqDaE6xXAZp6GQxqmHBP9+MmEDGWKFygmZsQxEmKB os6g/NqRlei2ZttmRzNrQ3sdbnvdGxhsDmzFry63Yh1ZCV4/GT214vXHU6jlImCM7PB1 F7AV+HDOsBy13RUxftGuUFNPIcwL6eu4sbm5UiNIjBiYxidKI+6gFdCvRQa/Jir4/HzT +wcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to:message-id:subject :to:from:date:dkim-signature; bh=vc6vZuzNo6eMB1LWvDLHTBHXG+8ntLifdEp6pB9TydY=; b=zA75PLercl5+obzBaH1/CQRqaQYhmAtL82RUEvnXzgSlur9yZv5qNZATqCdNZwl96t vYGjfR+jQSJGtUCI0PSTa+kPUYaTgkZ+++muOUCbbOeqMpU7SPuJD6RJs0arXbYGSn43 bAiPkQCkobnpK7o78YW5vQfr64PDdHBrOLoM0AXdtHe36hp5sQ+FVSw3O27Se1sFFIo3 sAhftfd3Rp6m5HRe5VUcvfjyn88mRPmdIRWcPr3Q6mCo0AzRssuexFERsYe4RUPW6RPY K6Gp81724Z4A2CSNHULDnmY6ZiTeaL8lNlQoAF3GhFZUxLp5CDQ9+YsjHzvUC9QKx9qL NGSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I36LUghQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t7si7222252otl.133.2019.12.06.19.48.17; Fri, 06 Dec 2019 19:48:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I36LUghQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726465AbfLGDr0 (ORCPT + 99 others); Fri, 6 Dec 2019 22:47:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:37012 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726371AbfLGDr0 (ORCPT ); Fri, 6 Dec 2019 22:47:26 -0500 Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4DCA820637; Sat, 7 Dec 2019 03:47:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575690444; bh=50Udh4adKV8I9YKDKPNTiQTkFH0xxlkJSgD7ELObhwQ=; h=Date:From:To:Subject:In-Reply-To:From; b=I36LUghQAY0MVvRC2SKNUFCGcJPJPAHaQpvMxY4kjdoDtJJ8440wDCdFoH2Ev/Wwr y+aAFl7LnYI8Yp2vez6zM2qnZEDv3MlgGFghjVTBB0+IXdJyadeJ9az3do51QEoh/r qBB2mXts+VeC1E/olfLdoPN5VGizqQZqVtJS0SWI= Date: Fri, 06 Dec 2019 19:47:23 -0800 From: Andrew Morton To: broonie@kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-next@vger.kernel.org, mhocko@suse.cz, mm-commits@vger.kernel.org, sfr@canb.auug.org.au Subject: mmotm 2019-12-06-19-46 uploaded Message-ID: <20191207034723.OPvz2A9wZ%akpm@linux-foundation.org> In-Reply-To: <20191206170123.cb3ad1f76af2b48505fabb33@linux-foundation.org> User-Agent: s-nail v14.8.16 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The mm-of-the-moment snapshot 2019-12-06-19-46 has been uploaded to http://www.ozlabs.org/~akpm/mmotm/ mmotm-readme.txt says README for mm-of-the-moment: http://www.ozlabs.org/~akpm/mmotm/ This is a snapshot of my -mm patch queue. Uploaded at random hopefully more than once a week. You will need quilt to apply these patches to the latest Linus release (5.x or 5.x-rcY). The series file is in broken-out.tar.gz and is duplicated in http://ozlabs.org/~akpm/mmotm/series The file broken-out.tar.gz contains two datestamp files: .DATE and .DATE-yyyy-mm-dd-hh-mm-ss. Both contain the string yyyy-mm-dd-hh-mm-ss, followed by the base kernel version against which this patch series is to be applied. This tree is partially included in linux-next. To see which patches are included in linux-next, consult the `series' file. Only the patches within the #NEXT_PATCHES_START/#NEXT_PATCHES_END markers are included in linux-next. A full copy of the full kernel tree with the linux-next and mmotm patches already applied is available through git within an hour of the mmotm release. Individual mmotm releases are tagged. The master branch always points to the latest release, so it's constantly rebasing. https://github.com/hnaz/linux-mm The directory http://www.ozlabs.org/~akpm/mmots/ (mm-of-the-second) contains daily snapshots of the -mm tree. It is updated more frequently than mmotm, and is untested. A git copy of this tree is also available at https://github.com/hnaz/linux-mm This mmotm tree contains the following patches against 5.4: (patches marked "*" will be included in linux-next) origin.patch * hacking-group-sysrq-kgdb-ubsan-into-generic-kernel-debugging-instruments.patch * hacking-create-submenu-for-arch-special-debugging-options.patch * hacking-group-kernel-data-structures-debugging-together.patch * hacking-move-kernel-testing-and-coverage-options-to-same-submenu.patch * hacking-move-oops-into-lockups-and-hangs.patch * hacking-move-sched_stack_end_check-after-debug_stack_usage.patch * hacking-create-a-submenu-for-scheduler-debugging-options.patch * hacking-move-debug_bugverbose-to-printk-and-dmesg-options.patch * hacking-move-debug_fs-to-generic-kernel-debugging-instruments.patch * lib-fix-kconfig-indentation.patch * kasan-fix-crashes-on-access-to-memory-mapped-by-vm_map_ram.patch * kasan-fix-crashes-on-access-to-memory-mapped-by-vm_map_ram-v2.patch * mm-add-apply_to_existing_pages-helper.patch * mm-add-apply_to_existing_pages-helper-fix.patch * mm-add-apply_to_existing_pages-helper-fix-fix.patch * kasan-use-apply_to_existing_pages-for-releasing-vmalloc-shadow.patch * kasan-use-apply_to_existing_pages-for-releasing-vmalloc-shadow-fix.patch * kasan-dont-assume-percpu-shadow-allocations-will-succeed.patch * mm-vmscan-protect-shrinker-idr-replace-with-config_memcg.patch * proc-kpageflags-prevent-an-integer-overflow-in-stable_page_flags.patch * proc-kpageflags-do-not-use-uninitialized-struct-pages.patch * mm-zsmallocc-fix-the-migrated-zspage-statistics.patch * mm-thp-tweak-reclaim-compaction-effort-of-local-only-and-all-node-allocations.patch * x86-mm-split-vmalloc_sync_all.patch * kcov-fix-struct-layout-for-kcov_remote_arg.patch * memcg-account-security-cred-as-well-to-kmemcg.patch * mm-move_pages-return-valid-node-id-in-status-if-the-page-is-already-on-the-target-node.patch * ramfs-support-o_tmpfile.patch mm.patch * mm-avoid-slub-allocation-while-holding-list_lock.patch * mm-vmscan-expose-cgroup_ino-for-memcg-reclaim-tracepoints.patch * mm-pgmap-use-correct-alignment-when-looking-at-first-pfn-from-a-region.patch * mm-mmap-fix-the-adjusted-length-error.patch * mm-memmap_init-update-variable-name-in-memmap_init_zone.patch * mm-memory_hotplug-shrink-zones-when-offlining-memory.patch * mm-memory_hotplug-poison-memmap-in-remove_pfn_range_from_zone.patch * mm-memory_hotplug-we-always-have-a-zone-in-find_smallestbiggest_section_pfn.patch * mm-memory_hotplug-dont-check-for-all-holes-in-shrink_zone_span.patch * mm-memory_hotplug-drop-local-variables-in-shrink_zone_span.patch * mm-memory_hotplug-cleanup-__remove_pages.patch * mm-oom-avoid-printk-iteration-under-rcu.patch * mm-oom-avoid-printk-iteration-under-rcu-fix.patch * info-task-hung-in-generic_file_write_iter.patch * info-task-hung-in-generic_file_write-fix.patch * kernel-hung_taskc-monitor-killed-tasks.patch * string-add-stracpy-and-stracpy_pad-mechanisms.patch * documentation-checkpatch-prefer-stracpy-strscpy-over-strcpy-strlcpy-strncpy.patch * aio-simplify-read_events.patch * smp_mb__beforeafter_atomic-update-documentation.patch * ipc-mqueuec-remove-duplicated-code.patch * ipc-mqueuec-update-document-memory-barriers.patch * ipc-msgc-update-and-document-memory-barriers.patch * ipc-semc-document-and-update-memory-barriers.patch * ipc-consolidate-all-xxxctl_down-functions.patch linux-next.patch linux-next-git-rejects.patch * drivers-block-null_blk_mainc-fix-layout.patch * drivers-block-null_blk_mainc-fix-uninitialized-var-warnings.patch * pinctrl-fix-pxa2xxc-build-warnings.patch * drivers-tty-serial-sh-scic-suppress-warning.patch * fix-read-buffer-overflow-in-delta-ipc.patch make-sure-nobodys-leaking-resources.patch releasing-resources-with-children.patch mutex-subsystem-synchro-test-module.patch kernel-forkc-export-kernel_thread-to-modules.patch workaround-for-a-pci-restoring-bug.patch