Received: by 2002:ab2:7a09:0:b0:1f8:46dc:890e with SMTP id k9csp313926lqo; Wed, 15 May 2024 15:52:47 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCV1Isl2lAs7lw6zD4+37NPxE9WlD0kX0QKrYM8K7TKPeLAZILYFl2VtSQwlUSATt4wJo3pCr2fXOQA5CElsDbd1ZFn4JbN925dJlA0H4g== X-Google-Smtp-Source: AGHT+IGodqhrYQDuTs9Bc3ulSfOiCE12fdq/WCudaKd3ooPDec7LHuHrraV7gHqB/S5ZWjfTowHQ X-Received: by 2002:a05:6a20:7495:b0:1af:a469:75aa with SMTP id adf61e73a8af0-1afde1979c1mr19266623637.46.1715813567382; Wed, 15 May 2024 15:52:47 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715813567; cv=pass; d=google.com; s=arc-20160816; b=uyk3k5SeJlbpUIR6kcKCWVJ6IYPaYAtBRaKUI3Kw07K3GDLHyUTerm1+MiBQKuvQ+1 obEOCWr0ZJ75Ygl8TCobBrszg0yjSjHwO/NEkPmgFf1JJM4qflpS9COgYIOeS1j7m4mx yBviHZ1+bTdPYmtFxwPKOn4N919mxafNxyvdKNfmGegbRWnb9bnRfXM1BjtWLeL5R0K9 1kJFiKDQ9P9hIfzeDz4nphhJD2/AHDRMErmSq7jXMtpNesnrnSZkR3ejX9vGJQuK7ubQ fLlYAosBqrZs/7nT011Ctz1oZd9BiaL/u7/sb/bYRgbPvDv7IPYmoWsmi5/f3WZXAmcC E8jQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=jEboa18Osj+JPyOBHPHbfv1Gl7l9oo0jlh+QKu/Hg7I=; fh=Vea6EPtEoLuk2A/78Jp3zQNoLW/4SsUxTuOJ/lHoxIo=; b=VrKn5kX/VtsyU39uv1xa/fl2NNWETb/x2dDTpmUo0A69m5gPYdpAgtSy8SjxdxQ1Vi 10UGMKFKiLwryBvrxyStQiw0VXLmrBUgzSjCJMDR1UQzQ4BpBet4O/FRY6Uk1DerbvtP f6tAm5BYAot2N4eUPXPARpI/O531qYXsDxKR1ledO03fW/oXpKz9Z1ulpq+nXHn3Ibe6 41sFywRo+OAMJYzj0jzNoZY2+hKg/xTrbNuq1KxjkqeCabF8+VlF36aoN2Ss+aIfQpCd 3XpKkYCVeuugHFd6Zj6VLpgRybl4BXdcZ9Fk7oXHQiugssFMXzDXNBRXun2FvZcaEGl0 wRWw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@canb.auug.org.au header.s=201702 header.b=h3wadNns; arc=pass (i=1 spf=pass spfdomain=canb.auug.org.au dkim=pass dkdomain=canb.auug.org.au dmarc=pass fromdomain=canb.auug.org.au); spf=pass (google.com: domain of linux-kernel+bounces-180456-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-180456-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canb.auug.org.au Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id 41be03b00d2f7-634103f6f82si16217487a12.254.2024.05.15.15.52.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 May 2024 15:52:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-180456-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@canb.auug.org.au header.s=201702 header.b=h3wadNns; arc=pass (i=1 spf=pass spfdomain=canb.auug.org.au dkim=pass dkdomain=canb.auug.org.au dmarc=pass fromdomain=canb.auug.org.au); spf=pass (google.com: domain of linux-kernel+bounces-180456-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-180456-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canb.auug.org.au Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 64AD5B223BD for ; Wed, 15 May 2024 22:52:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6934242073; Wed, 15 May 2024 22:51:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=canb.auug.org.au header.i=@canb.auug.org.au header.b="h3wadNns" Received: from mail.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1DAB339FEC; Wed, 15 May 2024 22:51:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=150.107.74.76 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715813512; cv=none; b=BA2X74UqqGYLHtb6xO6418fd7hX1cjkiVClAkgtFeUpIita2wlroPxU0iTaGigAjdNsmg/n7IuYtWkCe+eYqG30bAHpxd/1kUlTHEAfSxKQ1X/uKh+8d4ammCaiNWRQulv0fJ2dC/NjRJHLfQCNZbMz5OkEbkY0eldtyZBk+mkY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715813512; c=relaxed/simple; bh=Mb72hI9N1q8f905w29oQTMBpXZa5SO8MKRbxn0FqpKY=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=eFYCTiYnDNqB501IUoMrj1GEi2bM7YA6oIfLzjH46iTGzanyFZB865EmBaSWP9nrR0b5Jgkwf9zjbXeEFwZLdKdvBZzV4rMSd01DPJ8hNst8tIV6aHjbYbGAthpwpQp2iAqYdI3U8xzQO8c6T5sZyR8Qc+emkbg4A6ZTnuRGK1k= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canb.auug.org.au; spf=pass smtp.mailfrom=canb.auug.org.au; dkim=pass (2048-bit key) header.d=canb.auug.org.au header.i=@canb.auug.org.au header.b=h3wadNns; arc=none smtp.client-ip=150.107.74.76 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=canb.auug.org.au Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=canb.auug.org.au DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canb.auug.org.au; s=201702; t=1715813505; bh=jEboa18Osj+JPyOBHPHbfv1Gl7l9oo0jlh+QKu/Hg7I=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=h3wadNnsrKeFTTlI+huVPSgxFEA7LMoJe4Gb3LEBslhfLigmCqmCHUdQwfhQkmN+U xkx+tRHY+vY0nuUbQ/SPSqhn9jf/ezOXAU1zYiLjrrupchLHhGxpHmQcF8YahJVLW+ BDYugLN3F3XWEo0oh7AAtUOUaV8qNdZJB2i0JtF1roMoD23f10gdIk4JoJVtJ+jHHR uwH11rM04NIOVxDaDbtpCC14Nm3RQeAi/1IgsY0KvHKvKaPKImmf1sV3xI4QaU4m3l q7yLOkcghbSTEQaKTOvTDJ+W/ULZ6+NDgsqPlwlj+tnunRPudC/+r0dMjbWn83w8CF jcdyrDuF3aT8g== Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4VfpPW6tkpz4wc8; Thu, 16 May 2024 08:51:43 +1000 (AEST) Date: Thu, 16 May 2024 08:51:40 +1000 From: Stephen Rothwell To: Andrew Morton Cc: David Miller , Jakub Kicinski , Paolo Abeni , Networking , Alexander Lobakin , Kent Overstreet , Linux Kernel Mailing List , Linux Next Mailing List , Randy Dunlap , Suren Baghdasaryan , Tony Nguyen Subject: Re: linux-next: manual merge of the net-next tree with the mm tree Message-ID: <20240516085140.5c654de5@canb.auug.org.au> In-Reply-To: <20240429114302.7af809e8@canb.auug.org.au> References: <20240429114302.7af809e8@canb.auug.org.au> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: multipart/signed; boundary="Sig_/kC3KBzbwlzX2dVVi_nF4cEt"; protocol="application/pgp-signature"; micalg=pgp-sha256 --Sig_/kC3KBzbwlzX2dVVi_nF4cEt Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hi all, On Mon, 29 Apr 2024 11:43:02 +1000 Stephen Rothwell = wrote: > > Today's linux-next merge of the net-next tree got a conflict in: >=20 > include/linux/slab.h >=20 > between commit: >=20 > 7bd230a26648 ("mm/slab: enable slab allocation tagging for kmalloc and = friends") >=20 > from the mm_unstable branch of the mm tree and commit: >=20 > a1d6063d9f2f ("slab: introduce kvmalloc_array_node() and kvcalloc_node(= )") >=20 > from the net-next tree. >=20 > I fixed it up (maybe? see below) and can carry the fix as necessary. This > is now fixed as far as linux-next is concerned, but any non trivial > conflicts should be mentioned to your upstream maintainer when your tree > is submitted for merging. You may also want to consider cooperating > with the maintainer of the conflicting tree to minimise any particularly > complex conflicts. >=20 >=20 > diff --cc include/linux/slab.h > index 4cc37ef22aae,d1d1fa5e7983..000000000000 > --- a/include/linux/slab.h > +++ b/include/linux/slab.h > @@@ -773,40 -744,66 +773,47 @@@ static inline __alloc_size(1, 2) void * > * @size: how many bytes of memory are required. > * @flags: the type of memory to allocate (see kmalloc). > */ > -static inline __alloc_size(1) void *kzalloc(size_t size, gfp_t flags) > +static inline __alloc_size(1) void *kzalloc_noprof(size_t size, gfp_t f= lags) > { > - return kmalloc(size, flags | __GFP_ZERO); > + return kmalloc_noprof(size, flags | __GFP_ZERO); > } > +#define kzalloc(...) alloc_hooks(kzalloc_noprof(__VA_ARGS__)) > +#define kzalloc_node(_size, _flags, _node) kmalloc_node(_size, (_flags)= |__GFP_ZERO, _node) > =20 > -/** > - * kzalloc_node - allocate zeroed memory from a particular memory node. > - * @size: how many bytes of memory are required. > - * @flags: the type of memory to allocate (see kmalloc). > - * @node: memory node from which to allocate > - */ > -static inline __alloc_size(1) void *kzalloc_node(size_t size, gfp_t fla= gs, int node) > -{ > - return kmalloc_node(size, flags | __GFP_ZERO, node); > -} > +extern void *kvmalloc_node_noprof(size_t size, gfp_t flags, int node) _= _alloc_size(1); > +#define kvmalloc_node(...) alloc_hooks(kvmalloc_node_noprof(__VA_ARGS= __)) > =20 > -extern void *kvmalloc_node(size_t size, gfp_t flags, int node) __alloc_= size(1); > -static inline __alloc_size(1) void *kvmalloc(size_t size, gfp_t flags) > -{ > - return kvmalloc_node(size, flags, NUMA_NO_NODE); > -} > -static inline __alloc_size(1) void *kvzalloc_node(size_t size, gfp_t fl= ags, int node) > -{ > - return kvmalloc_node(size, flags | __GFP_ZERO, node); > -} > -static inline __alloc_size(1) void *kvzalloc(size_t size, gfp_t flags) > -{ > - return kvmalloc(size, flags | __GFP_ZERO); > -} > +#define kvmalloc(_size, _flags) kvmalloc_node(_size, _flags, NUMA_NO_= NODE) > +#define kvmalloc_noprof(_size, _flags) kvmalloc_node_noprof(_size, _fl= ags, NUMA_NO_NODE) > +#define kvzalloc(_size, _flags) kvmalloc(_size, _flags|__GFP_ZERO) > =20 > -static inline __alloc_size(1, 2) void * > -kvmalloc_array_node(size_t n, size_t size, gfp_t flags, int node) > +#define kvzalloc_node(_size, _flags, _node) kvmalloc_node(_size, _flags= |__GFP_ZERO, _node) > + > - static inline __alloc_size(1, 2) void *kvmalloc_array_noprof(size_t n, = size_t size, gfp_t flags) > ++static inline __alloc_size(1, 2) void *kvmalloc_array_node_noprof(size_= t n, size_t size, gfp_t flags) > { > size_t bytes; > =20 > if (unlikely(check_mul_overflow(n, size, &bytes))) > return NULL; > =20 > - return kvmalloc_node(bytes, flags, node); > -} > - > -static inline __alloc_size(1, 2) void * > -kvmalloc_array(size_t n, size_t size, gfp_t flags) > -{ > - return kvmalloc_array_node(n, size, flags, NUMA_NO_NODE); > + return kvmalloc_node_noprof(bytes, flags, NUMA_NO_NODE); > } > =20 > - #define kvmalloc_array(...) alloc_hooks(kvmalloc_array_noprof(__VA_AR= GS__)) > + static inline __alloc_size(1, 2) void * > + kvcalloc_node(size_t n, size_t size, gfp_t flags, int node) > + { > - return kvmalloc_array_node(n, size, flags | __GFP_ZERO, node); > ++ return kvmalloc_array_node_noprof(n, size, flags | __GFP_ZERO, node); > + } > +=20 > -static inline __alloc_size(1, 2) void *kvcalloc(size_t n, size_t size, = gfp_t flags) > -{ > - return kvmalloc_array(n, size, flags | __GFP_ZERO); > -} > ++#define kvmalloc_array(...) alloc_hooks(kvmalloc_array_node_noprof(__= VA_ARGS__)) > ++#define kvmalloc_array_noprof(_n, _size, _flags)) kvmalloc_array(_n, _s= ize, _flags) > +#define kvcalloc(_n, _size, _flags) kvmalloc_array(_n, _size, _flags|_= _GFP_ZERO) > - #define kvcalloc_noprof(_n, _size, _flags) kvmalloc_array_noprof(_n, _s= ize, _flags|__GFP_ZERO) > ++#define kvcalloc_noprof(_n, _size, _flags) kvmalloc_array_node_noprof(_= n, _size, _flags|__GFP_ZERO) > =20 > -extern void *kvrealloc(const void *p, size_t oldsize, size_t newsize, g= fp_t flags) > +extern void *kvrealloc_noprof(const void *p, size_t oldsize, size_t new= size, gfp_t flags) > __realloc_size(3); > +#define kvrealloc(...) alloc_hooks(kvrealloc_noprof(__VA_ARGS__)) > + > extern void kvfree(const void *addr); > DEFINE_FREE(kvfree, void *, if (_T) kvfree(_T)) > =20 This is now a conflict between the mm-stable tree and Linus' tree. --=20 Cheers, Stephen Rothwell --Sig_/kC3KBzbwlzX2dVVi_nF4cEt Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEENIC96giZ81tWdLgKAVBC80lX0GwFAmZFPHwACgkQAVBC80lX 0GzJgQf/XD+z7kZfxjn9vvDwKAP7ZsDJ++faVg/Qkpy7RZiJ84tXimu7hanHLkpe 9Wmkz5iWRKnKfb2UnEE13faHjb90lK5oDc36V0DaGXi3sJ04ETsRjWpeWpZDXjob grzA+d8yIsVsnzaklt6y9njWsEpXmsTdVBQF5DFvrNFFYV9lSf8CbUNNlhDFezIK zvszIpQHLHJWMwwOLVZy/tutRUo2fDb33Tsp54tUlLEneOSfleeZqCFqXk0ZBL1L Xk9HuJcsXtdL4LZPQfKQotHsjqf/3Y3//chHONApxi7PpU2m++cyK7efQrkiu2hn RBAak/GYqDolJo2u3qN1w05YQ904Mw== =WSvc -----END PGP SIGNATURE----- --Sig_/kC3KBzbwlzX2dVVi_nF4cEt--