Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3744319ybl; Sun, 8 Dec 2019 22:33:56 -0800 (PST) X-Google-Smtp-Source: APXvYqxtgMH/jitZ/pbYWM5zqpmQTS+00Tnxu0Mkccf8XbkripoRzgiVTNyWjwafw+RSf9NuwKCH X-Received: by 2002:a05:6830:1e8a:: with SMTP id n10mr6706688otr.228.1575873236091; Sun, 08 Dec 2019 22:33:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575873236; cv=none; d=google.com; s=arc-20160816; b=QCNcJ4OZBL13L1MPFlRIBnjuWDPOJ5kvbyw9SPoQnASHJe6rq6lOqlZo4r47fvg5Vl NYLTRk6dGwOhGO/LmJ91DImfgJ73YtemePDIcwfBYHJjD5eiCuerUK5ZHDsm4ShyGjyJ v7jSEpAGrCQO4dT1zjFr/GIbpRJkJdekA+RqvJXhfaqexdEO5RtJVpt7RfcDtV5qnveo 7ux7USbch6Id9VQI7Dt5C7lYl+FI0g67IzeA7OhkUij1zR+SMZvv2odpfpZQ/wC/+1VU TDf1eUdFx+dA3dnv+RGWAxvXuUrDuawbg4EDbG8ITkw9ecWofrfGNYfQp5ePX4abGSJ4 S2kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:to:subject; bh=4KC2AEHz75tapWriVVtiWoBclcfO1Dz2o1+Yi++Vv2g=; b=IxLSEKQsVsh9pjT8DxqPOcypwQ6o8wUlLX+crQCMWRZyXCXS+4oNmA3HkEpXzXE/02 NokikFoQ8EY4MpSx5VIkbQepPrTfb4HpOPze7HdWtevVuYkq1Fu6dR16zclXsouVeicQ za2vQeU70+p4A/m4jkCbW4krGHtjO5VOwVFlfJ59UtOT+GRxtnukUZvXWhKAUfYcx1hr ZXe+U194Ki4ly0fVFVeo/egw8YBAzIcOmlcUMSkRE9jd6RGxLAneGgMyFlNUAS20J/e5 CQw2bpM0C4V2Bwk6mK5FeG+O3xWUdoFKdektZZTMlcbWdiY8Q/8BOgKDaQ/x6vnSzAV5 zr3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w11si9529103oig.45.2019.12.08.22.33.43; Sun, 08 Dec 2019 22:33:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727144AbfLIGcJ (ORCPT + 99 others); Mon, 9 Dec 2019 01:32:09 -0500 Received: from szxga06-in.huawei.com ([45.249.212.32]:55456 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726623AbfLIGcJ (ORCPT ); Mon, 9 Dec 2019 01:32:09 -0500 Received: from DGGEMS414-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 14B709B79E07160C53B3; Mon, 9 Dec 2019 14:32:06 +0800 (CST) Received: from [127.0.0.1] (10.74.221.148) by DGGEMS414-HUB.china.huawei.com (10.3.19.214) with Microsoft SMTP Server id 14.3.439.0; Mon, 9 Dec 2019 14:31:56 +0800 Subject: Re: mmotm 2019-12-06-19-46 uploaded To: Andrew Morton , , , , , , , , , jinyuqi References: <20191207034723.OPvz2A9wZ%akpm@linux-foundation.org> From: Shaokun Zhang Message-ID: Date: Mon, 9 Dec 2019 14:31:55 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.1.1 MIME-Version: 1.0 In-Reply-To: <20191207034723.OPvz2A9wZ%akpm@linux-foundation.org> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.74.221.148] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Andrew, About this patch, https://lore.kernel.org/lkml/1573091048-10595-1-git-send-email-zhangshaokun@hisilicon.com/ It is not in linux-next or your trees now, has it been dropped? Thanks, Shaokun On 2019/12/7 11:47, Andrew Morton wrote: > The mm-of-the-moment snapshot 2019-12-06-19-46 has been uploaded to > > http://www.ozlabs.org/~akpm/mmotm/ > > mmotm-readme.txt says > > README for mm-of-the-moment: > > http://www.ozlabs.org/~akpm/mmotm/ > > This is a snapshot of my -mm patch queue. Uploaded at random hopefully > more than once a week. > > You will need quilt to apply these patches to the latest Linus release (5.x > or 5.x-rcY). The series file is in broken-out.tar.gz and is duplicated in > http://ozlabs.org/~akpm/mmotm/series > > The file broken-out.tar.gz contains two datestamp files: .DATE and > .DATE-yyyy-mm-dd-hh-mm-ss. Both contain the string yyyy-mm-dd-hh-mm-ss, > followed by the base kernel version against which this patch series is to > be applied. > > This tree is partially included in linux-next. To see which patches are > included in linux-next, consult the `series' file. Only the patches > within the #NEXT_PATCHES_START/#NEXT_PATCHES_END markers are included in > linux-next. > > > A full copy of the full kernel tree with the linux-next and mmotm patches > already applied is available through git within an hour of the mmotm > release. Individual mmotm releases are tagged. The master branch always > points to the latest release, so it's constantly rebasing. > > https://github.com/hnaz/linux-mm > > The directory http://www.ozlabs.org/~akpm/mmots/ (mm-of-the-second) > contains daily snapshots of the -mm tree. It is updated more frequently > than mmotm, and is untested. > > A git copy of this tree is also available at > > https://github.com/hnaz/linux-mm > > > > This mmotm tree contains the following patches against 5.4: > (patches marked "*" will be included in linux-next) > > origin.patch > * hacking-group-sysrq-kgdb-ubsan-into-generic-kernel-debugging-instruments.patch > * hacking-create-submenu-for-arch-special-debugging-options.patch > * hacking-group-kernel-data-structures-debugging-together.patch > * hacking-move-kernel-testing-and-coverage-options-to-same-submenu.patch > * hacking-move-oops-into-lockups-and-hangs.patch > * hacking-move-sched_stack_end_check-after-debug_stack_usage.patch > * hacking-create-a-submenu-for-scheduler-debugging-options.patch > * hacking-move-debug_bugverbose-to-printk-and-dmesg-options.patch > * hacking-move-debug_fs-to-generic-kernel-debugging-instruments.patch > * lib-fix-kconfig-indentation.patch > * kasan-fix-crashes-on-access-to-memory-mapped-by-vm_map_ram.patch > * kasan-fix-crashes-on-access-to-memory-mapped-by-vm_map_ram-v2.patch > * mm-add-apply_to_existing_pages-helper.patch > * mm-add-apply_to_existing_pages-helper-fix.patch > * mm-add-apply_to_existing_pages-helper-fix-fix.patch > * kasan-use-apply_to_existing_pages-for-releasing-vmalloc-shadow.patch > * kasan-use-apply_to_existing_pages-for-releasing-vmalloc-shadow-fix.patch > * kasan-dont-assume-percpu-shadow-allocations-will-succeed.patch > * mm-vmscan-protect-shrinker-idr-replace-with-config_memcg.patch > * proc-kpageflags-prevent-an-integer-overflow-in-stable_page_flags.patch > * proc-kpageflags-do-not-use-uninitialized-struct-pages.patch > * mm-zsmallocc-fix-the-migrated-zspage-statistics.patch > * mm-thp-tweak-reclaim-compaction-effort-of-local-only-and-all-node-allocations.patch > * x86-mm-split-vmalloc_sync_all.patch > * kcov-fix-struct-layout-for-kcov_remote_arg.patch > * memcg-account-security-cred-as-well-to-kmemcg.patch > * mm-move_pages-return-valid-node-id-in-status-if-the-page-is-already-on-the-target-node.patch > * ramfs-support-o_tmpfile.patch > mm.patch > * mm-avoid-slub-allocation-while-holding-list_lock.patch > * mm-vmscan-expose-cgroup_ino-for-memcg-reclaim-tracepoints.patch > * mm-pgmap-use-correct-alignment-when-looking-at-first-pfn-from-a-region.patch > * mm-mmap-fix-the-adjusted-length-error.patch > * mm-memmap_init-update-variable-name-in-memmap_init_zone.patch > * mm-memory_hotplug-shrink-zones-when-offlining-memory.patch > * mm-memory_hotplug-poison-memmap-in-remove_pfn_range_from_zone.patch > * mm-memory_hotplug-we-always-have-a-zone-in-find_smallestbiggest_section_pfn.patch > * mm-memory_hotplug-dont-check-for-all-holes-in-shrink_zone_span.patch > * mm-memory_hotplug-drop-local-variables-in-shrink_zone_span.patch > * mm-memory_hotplug-cleanup-__remove_pages.patch > * mm-oom-avoid-printk-iteration-under-rcu.patch > * mm-oom-avoid-printk-iteration-under-rcu-fix.patch > * info-task-hung-in-generic_file_write_iter.patch > * info-task-hung-in-generic_file_write-fix.patch > * kernel-hung_taskc-monitor-killed-tasks.patch > * string-add-stracpy-and-stracpy_pad-mechanisms.patch > * documentation-checkpatch-prefer-stracpy-strscpy-over-strcpy-strlcpy-strncpy.patch > * aio-simplify-read_events.patch > * smp_mb__beforeafter_atomic-update-documentation.patch > * ipc-mqueuec-remove-duplicated-code.patch > * ipc-mqueuec-update-document-memory-barriers.patch > * ipc-msgc-update-and-document-memory-barriers.patch > * ipc-semc-document-and-update-memory-barriers.patch > * ipc-consolidate-all-xxxctl_down-functions.patch > linux-next.patch > linux-next-git-rejects.patch > * drivers-block-null_blk_mainc-fix-layout.patch > * drivers-block-null_blk_mainc-fix-uninitialized-var-warnings.patch > * pinctrl-fix-pxa2xxc-build-warnings.patch > * drivers-tty-serial-sh-scic-suppress-warning.patch > * fix-read-buffer-overflow-in-delta-ipc.patch > make-sure-nobodys-leaking-resources.patch > releasing-resources-with-children.patch > mutex-subsystem-synchro-test-module.patch > kernel-forkc-export-kernel_thread-to-modules.patch > workaround-for-a-pci-restoring-bug.patch > > . >