Skip to content

Commit 5c00ff7

Browse files
committed
Merge tag 'mm-stable-2024-11-18-19-27' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm
Pull MM updates from Andrew Morton: - The series "zram: optimal post-processing target selection" from Sergey Senozhatsky improves zram's post-processing selection algorithm. This leads to improved memory savings. - Wei Yang has gone to town on the mapletree code, contributing several series which clean up the implementation: - "refine mas_mab_cp()" - "Reduce the space to be cleared for maple_big_node" - "maple_tree: simplify mas_push_node()" - "Following cleanup after introduce mas_wr_store_type()" - "refine storing null" - The series "selftests/mm: hugetlb_fault_after_madv improvements" from David Hildenbrand fixes this selftest for s390. - The series "introduce pte_offset_map_{ro|rw}_nolock()" from Qi Zheng implements some rationaizations and cleanups in the page mapping code. - The series "mm: optimize shadow entries removal" from Shakeel Butt optimizes the file truncation code by speeding up the handling of shadow entries. - The series "Remove PageKsm()" from Matthew Wilcox completes the migration of this flag over to being a folio-based flag. - The series "Unify hugetlb into arch_get_unmapped_area functions" from Oscar Salvador implements a bunch of consolidations and cleanups in the hugetlb code. - The series "Do not shatter hugezeropage on wp-fault" from Dev Jain takes away the wp-fault time practice of turning a huge zero page into small pages. Instead we replace the whole thing with a THP. More consistent cleaner and potentiall saves a large number of pagefaults. - The series "percpu: Add a test case and fix for clang" from Andy Shevchenko enhances and fixes the kernel's built in percpu test code. - The series "mm/mremap: Remove extra vma tree walk" from Liam Howlett optimizes mremap() by avoiding doing things which we didn't need to do. - The series "Improve the tmpfs large folio read performance" from Baolin Wang teaches tmpfs to copy data into userspace at the folio size rather than as individual pages. A 20% speedup was observed. - The series "mm/damon/vaddr: Fix issue in damon_va_evenly_split_region()" fro Zheng Yejian fixes DAMON splitting. - The series "memcg-v1: fully deprecate charge moving" from Shakeel Butt removes the long-deprecated memcgv2 charge moving feature. - The series "fix error handling in mmap_region() and refactor" from Lorenzo Stoakes cleanup up some of the mmap() error handling and addresses some potential performance issues. - The series "x86/module: use large ROX pages for text allocations" from Mike Rapoport teaches x86 to use large pages for read-only-execute module text. - The series "page allocation tag compression" from Suren Baghdasaryan is followon maintenance work for the new page allocation profiling feature. - The series "page->index removals in mm" from Matthew Wilcox remove most references to page->index in mm/. A slow march towards shrinking struct page. - The series "damon/{self,kunit}tests: minor fixups for DAMON debugfs interface tests" from Andrew Paniakin performs maintenance work for DAMON's self testing code. - The series "mm: zswap swap-out of large folios" from Kanchana Sridhar improves zswap's batching of compression and decompression. It is a step along the way towards using Intel IAA hardware acceleration for this zswap operation. - The series "kasan: migrate the last module test to kunit" from Sabyrzhan Tasbolatov completes the migration of the KASAN built-in tests over to the KUnit framework. - The series "implement lightweight guard pages" from Lorenzo Stoakes permits userapace to place fault-generating guard pages within a single VMA, rather than requiring that multiple VMAs be created for this. Improved efficiencies for userspace memory allocators are expected. - The series "memcg: tracepoint for flushing stats" from JP Kobryn uses tracepoints to provide increased visibility into memcg stats flushing activity. - The series "zram: IDLE flag handling fixes" from Sergey Senozhatsky fixes a zram buglet which potentially affected performance. - The series "mm: add more kernel parameters to control mTHP" from Maíra Canal enhances our ability to control/configuremultisize THP from the kernel boot command line. - The series "kasan: few improvements on kunit tests" from Sabyrzhan Tasbolatov has a couple of fixups for the KASAN KUnit tests. - The series "mm/list_lru: Split list_lru lock into per-cgroup scope" from Kairui Song optimizes list_lru memory utilization when lockdep is enabled. * tag 'mm-stable-2024-11-18-19-27' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm: (215 commits) cma: enforce non-zero pageblock_order during cma_init_reserved_mem() mm/kfence: add a new kunit test test_use_after_free_read_nofault() zram: fix NULL pointer in comp_algorithm_show() memcg/hugetlb: add hugeTLB counters to memcg vmstat: call fold_vm_zone_numa_events() before show per zone NUMA event mm: mmap_lock: check trace_mmap_lock_$type_enabled() instead of regcount zram: ZRAM_DEF_COMP should depend on ZRAM MAINTAINERS/MEMORY MANAGEMENT: add document files for mm Docs/mm/damon: recommend academic papers to read and/or cite mm: define general function pXd_init() kmemleak: iommu/iova: fix transient kmemleak false positive mm/list_lru: simplify the list_lru walk callback function mm/list_lru: split the lock to per-cgroup scope mm/list_lru: simplify reparenting and initial allocation mm/list_lru: code clean up for reparenting mm/list_lru: don't export list_lru_add mm/list_lru: don't pass unnecessary key parameters kasan: add kunit tests for kmalloc_track_caller, kmalloc_node_track_caller kasan: change kasan_atomics kunit test as KUNIT_CASE_SLOW kasan: use EXPORT_SYMBOL_IF_KUNIT to export symbols ...
2 parents 228a115 + 2532e6c commit 5c00ff7

File tree

323 files changed

+7350
-4391
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

323 files changed

+7350
-4391
lines changed

Documentation/admin-guide/blockdev/zram.rst

+2
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@ The list of possible return codes:
4747
-ENOMEM zram was not able to allocate enough memory to fulfil your
4848
needs.
4949
-EINVAL invalid input has been provided.
50+
-EAGAIN re-try operation later (e.g. when attempting to run recompress
51+
and writeback simultaneously).
5052
======== =============================================================
5153

5254
If you use 'echo', the returned value is set by the 'echo' utility,

Documentation/admin-guide/cgroup-v1/memory.rst

+3-79
Original file line numberDiff line numberDiff line change
@@ -90,9 +90,7 @@ Brief summary of control files.
9090
used.
9191
memory.swappiness set/show swappiness parameter of vmscan
9292
(See sysctl's vm.swappiness)
93-
memory.move_charge_at_immigrate set/show controls of moving charges
94-
This knob is deprecated and shouldn't be
95-
used.
93+
memory.move_charge_at_immigrate This knob is deprecated.
9694
memory.oom_control set/show oom controls.
9795
This knob is deprecated and shouldn't be
9896
used.
@@ -243,10 +241,6 @@ behind this approach is that a cgroup that aggressively uses a shared
243241
page will eventually get charged for it (once it is uncharged from
244242
the cgroup that brought it in -- this will happen on memory pressure).
245243

246-
But see :ref:`section 8.2 <cgroup-v1-memory-movable-charges>` when moving a
247-
task to another cgroup, its pages may be recharged to the new cgroup, if
248-
move_charge_at_immigrate has been chosen.
249-
250244
2.4 Swap Extension
251245
--------------------------------------
252246

@@ -756,78 +750,8 @@ If we want to change this to 1G, we can at any time use::
756750

757751
THIS IS DEPRECATED!
758752

759-
It's expensive and unreliable! It's better practice to launch workload
760-
tasks directly from inside their target cgroup. Use dedicated workload
761-
cgroups to allow fine-grained policy adjustments without having to
762-
move physical pages between control domains.
763-
764-
Users can move charges associated with a task along with task migration, that
765-
is, uncharge task's pages from the old cgroup and charge them to the new cgroup.
766-
This feature is not supported in !CONFIG_MMU environments because of lack of
767-
page tables.
768-
769-
8.1 Interface
770-
-------------
771-
772-
This feature is disabled by default. It can be enabled (and disabled again) by
773-
writing to memory.move_charge_at_immigrate of the destination cgroup.
774-
775-
If you want to enable it::
776-
777-
# echo (some positive value) > memory.move_charge_at_immigrate
778-
779-
.. note::
780-
Each bits of move_charge_at_immigrate has its own meaning about what type
781-
of charges should be moved. See :ref:`section 8.2
782-
<cgroup-v1-memory-movable-charges>` for details.
783-
784-
.. note::
785-
Charges are moved only when you move mm->owner, in other words,
786-
a leader of a thread group.
787-
788-
.. note::
789-
If we cannot find enough space for the task in the destination cgroup, we
790-
try to make space by reclaiming memory. Task migration may fail if we
791-
cannot make enough space.
792-
793-
.. note::
794-
It can take several seconds if you move charges much.
795-
796-
And if you want disable it again::
797-
798-
# echo 0 > memory.move_charge_at_immigrate
799-
800-
.. _cgroup-v1-memory-movable-charges:
801-
802-
8.2 Type of charges which can be moved
803-
--------------------------------------
804-
805-
Each bit in move_charge_at_immigrate has its own meaning about what type of
806-
charges should be moved. But in any case, it must be noted that an account of
807-
a page or a swap can be moved only when it is charged to the task's current
808-
(old) memory cgroup.
809-
810-
+---+--------------------------------------------------------------------------+
811-
|bit| what type of charges would be moved ? |
812-
+===+==========================================================================+
813-
| 0 | A charge of an anonymous page (or swap of it) used by the target task. |
814-
| | You must enable Swap Extension (see 2.4) to enable move of swap charges. |
815-
+---+--------------------------------------------------------------------------+
816-
| 1 | A charge of file pages (normal file, tmpfs file (e.g. ipc shared memory) |
817-
| | and swaps of tmpfs file) mmapped by the target task. Unlike the case of |
818-
| | anonymous pages, file pages (and swaps) in the range mmapped by the task |
819-
| | will be moved even if the task hasn't done page fault, i.e. they might |
820-
| | not be the task's "RSS", but other task's "RSS" that maps the same file. |
821-
| | The mapcount of the page is ignored (the page can be moved independent |
822-
| | of the mapcount). You must enable Swap Extension (see 2.4) to |
823-
| | enable move of swap charges. |
824-
+---+--------------------------------------------------------------------------+
825-
826-
8.3 TODO
827-
--------
828-
829-
- All of moving charge operations are done under cgroup_mutex. It's not good
830-
behavior to hold the mutex too long, so we may need some trick.
753+
Reading memory.move_charge_at_immigrate will always return 0 and writing
754+
to it will always return -EINVAL.
831755

832756
9. Memory thresholds
833757
====================

Documentation/admin-guide/cgroup-v2.rst

+5
Original file line numberDiff line numberDiff line change
@@ -1655,6 +1655,11 @@ The following nested keys are defined.
16551655
pgdemote_khugepaged
16561656
Number of pages demoted by khugepaged.
16571657

1658+
hugetlb
1659+
Amount of memory used by hugetlb pages. This metric only shows
1660+
up if hugetlb usage is accounted for in memory.current (i.e.
1661+
cgroup is mounted with the memory_hugetlb_accounting option).
1662+
16581663
memory.numa_stat
16591664
A read-only nested-keyed file which exists on non-root cgroups.
16601665

Documentation/admin-guide/kernel-parameters.txt

+17
Original file line numberDiff line numberDiff line change
@@ -6711,6 +6711,16 @@
67116711
Force threading of all interrupt handlers except those
67126712
marked explicitly IRQF_NO_THREAD.
67136713

6714+
thp_shmem= [KNL]
6715+
Format: <size>[KMG],<size>[KMG]:<policy>;<size>[KMG]-<size>[KMG]:<policy>
6716+
Control the default policy of each hugepage size for the
6717+
internal shmem mount. <policy> is one of policies available
6718+
for the shmem mount ("always", "inherit", "never", "within_size",
6719+
and "advise").
6720+
It can be used multiple times for multiple shmem THP sizes.
6721+
See Documentation/admin-guide/mm/transhuge.rst for more
6722+
details.
6723+
67146724
topology= [S390,EARLY]
67156725
Format: {off | on}
67166726
Specify if the kernel should make use of the cpu
@@ -6952,6 +6962,13 @@
69526962
See Documentation/admin-guide/mm/transhuge.rst
69536963
for more details.
69546964

6965+
transparent_hugepage_shmem= [KNL]
6966+
Format: [always|within_size|advise|never|deny|force]
6967+
Can be used to control the hugepage allocation policy for
6968+
the internal shmem mount.
6969+
See Documentation/admin-guide/mm/transhuge.rst
6970+
for more details.
6971+
69556972
trusted.source= [KEYS]
69566973
Format: <string>
69576974
This parameter identifies the trust source as a backend

Documentation/admin-guide/mm/transhuge.rst

+33-2
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,29 @@ PMD_ORDER THP policy will be overridden. If the policy for PMD_ORDER
326326
is not defined within a valid ``thp_anon``, its policy will default to
327327
``never``.
328328

329+
Similarly to ``transparent_hugepage``, you can control the hugepage
330+
allocation policy for the internal shmem mount by using the kernel parameter
331+
``transparent_hugepage_shmem=<policy>``, where ``<policy>`` is one of the
332+
seven valid policies for shmem (``always``, ``within_size``, ``advise``,
333+
``never``, ``deny``, and ``force``).
334+
335+
In the same manner as ``thp_anon`` controls each supported anonymous THP
336+
size, ``thp_shmem`` controls each supported shmem THP size. ``thp_shmem``
337+
has the same format as ``thp_anon``, but also supports the policy
338+
``within_size``.
339+
340+
``thp_shmem=`` may be specified multiple times to configure all THP sizes
341+
as required. If ``thp_shmem=`` is specified at least once, any shmem THP
342+
sizes not explicitly configured on the command line are implicitly set to
343+
``never``.
344+
345+
``transparent_hugepage_shmem`` setting only affects the global toggle. If
346+
``thp_shmem`` is not specified, PMD_ORDER hugepage will default to
347+
``inherit``. However, if a valid ``thp_shmem`` setting is provided by the
348+
user, the PMD_ORDER hugepage policy will be overridden. If the policy for
349+
PMD_ORDER is not defined within a valid ``thp_shmem``, its policy will
350+
default to ``never``.
351+
329352
Hugepages in tmpfs/shmem
330353
========================
331354

@@ -530,10 +553,18 @@ anon_fault_fallback_charge
530553
instead falls back to using huge pages with lower orders or
531554
small pages even though the allocation was successful.
532555

533-
swpout
534-
is incremented every time a huge page is swapped out in one
556+
zswpout
557+
is incremented every time a huge page is swapped out to zswap in one
535558
piece without splitting.
536559

560+
swpin
561+
is incremented every time a huge page is swapped in from a non-zswap
562+
swap device in one piece.
563+
564+
swpout
565+
is incremented every time a huge page is swapped out to a non-zswap
566+
swap device in one piece without splitting.
567+
537568
swpout_fallback
538569
is incremented if a huge page has to be split before swapout.
539570
Usually because failed to allocate some continuous swap space

Documentation/dev-tools/kasan.rst

+9-14
Original file line numberDiff line numberDiff line change
@@ -511,19 +511,14 @@ Tests
511511
~~~~~
512512

513513
There are KASAN tests that allow verifying that KASAN works and can detect
514-
certain types of memory corruptions. The tests consist of two parts:
514+
certain types of memory corruptions.
515515

516-
1. Tests that are integrated with the KUnit Test Framework. Enabled with
517-
``CONFIG_KASAN_KUNIT_TEST``. These tests can be run and partially verified
516+
All KASAN tests are integrated with the KUnit Test Framework and can be enabled
517+
via ``CONFIG_KASAN_KUNIT_TEST``. The tests can be run and partially verified
518518
automatically in a few different ways; see the instructions below.
519519

520-
2. Tests that are currently incompatible with KUnit. Enabled with
521-
``CONFIG_KASAN_MODULE_TEST`` and can only be run as a module. These tests can
522-
only be verified manually by loading the kernel module and inspecting the
523-
kernel log for KASAN reports.
524-
525-
Each KUnit-compatible KASAN test prints one of multiple KASAN reports if an
526-
error is detected. Then the test prints its number and status.
520+
Each KASAN test prints one of multiple KASAN reports if an error is detected.
521+
Then the test prints its number and status.
527522

528523
When a test passes::
529524

@@ -550,16 +545,16 @@ Or, if one of the tests failed::
550545

551546
not ok 1 - kasan
552547

553-
There are a few ways to run KUnit-compatible KASAN tests.
548+
There are a few ways to run the KASAN tests.
554549

555550
1. Loadable module
556551

557-
With ``CONFIG_KUNIT`` enabled, KASAN-KUnit tests can be built as a loadable
558-
module and run by loading ``kasan_test.ko`` with ``insmod`` or ``modprobe``.
552+
With ``CONFIG_KUNIT`` enabled, the tests can be built as a loadable module
553+
and run by loading ``kasan_test.ko`` with ``insmod`` or ``modprobe``.
559554

560555
2. Built-In
561556

562-
With ``CONFIG_KUNIT`` built-in, KASAN-KUnit tests can be built-in as well.
557+
With ``CONFIG_KUNIT`` built-in, the tests can be built-in as well.
563558
In this case, the tests will run at boot as a late-init call.
564559

565560
3. Using kunit_tool

Documentation/dev-tools/kmemleak.rst

+1
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,7 @@ See the include/linux/kmemleak.h header for the functions prototype.
161161
- ``kmemleak_free_percpu`` - notify of a percpu memory block freeing
162162
- ``kmemleak_update_trace`` - update object allocation stack trace
163163
- ``kmemleak_not_leak`` - mark an object as not a leak
164+
- ``kmemleak_transient_leak`` - mark an object as a transient leak
164165
- ``kmemleak_ignore`` - do not scan or report an object as leak
165166
- ``kmemleak_scan_area`` - add scan areas inside a memory block
166167
- ``kmemleak_no_scan`` - do not scan a memory block

Documentation/mm/allocation-profiling.rst

+6-1
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,17 @@ kconfig options:
1818
missing annotation
1919

2020
Boot parameter:
21-
sysctl.vm.mem_profiling=0|1|never
21+
sysctl.vm.mem_profiling={0|1|never}[,compressed]
2222

2323
When set to "never", memory allocation profiling overhead is minimized and it
2424
cannot be enabled at runtime (sysctl becomes read-only).
2525
When CONFIG_MEM_ALLOC_PROFILING_ENABLED_BY_DEFAULT=y, default value is "1".
2626
When CONFIG_MEM_ALLOC_PROFILING_ENABLED_BY_DEFAULT=n, default value is "never".
27+
"compressed" optional parameter will try to store page tag references in a
28+
compact format, avoiding page extensions. This results in improved performance
29+
and memory consumption, however it might fail depending on system configuration.
30+
If compression fails, a warning is issued and memory allocation profiling gets
31+
disabled.
2732

2833
sysctl:
2934
/proc/sys/vm/mem_profiling

Documentation/mm/damon/index.rst

+6
Original file line numberDiff line numberDiff line change
@@ -37,3 +37,9 @@ with no code but simple configurations.
3737

3838
To utilize and control DAMON from the user-space, please refer to the
3939
administration :doc:`guide </admin-guide/mm/damon/index>`.
40+
41+
If you prefer academic papers for reading and citations, please use the papers
42+
from `HPDC'22 <https://dl.acm.org/doi/abs/10.1145/3502181.3531466>`_ and
43+
`Middleware19 Industry <https://dl.acm.org/doi/abs/10.1145/3366626.3368125>`_ .
44+
Note that those cover DAMON implementations in Linux v5.16 and v5.15,
45+
respectively.

Documentation/mm/split_page_table_lock.rst

+5-1
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,13 @@ There are helpers to lock/unlock a table and other accessor functions:
1616
- pte_offset_map_lock()
1717
maps PTE and takes PTE table lock, returns pointer to PTE with
1818
pointer to its PTE table lock, or returns NULL if no PTE table;
19-
- pte_offset_map_nolock()
19+
- pte_offset_map_ro_nolock()
2020
maps PTE, returns pointer to PTE with pointer to its PTE table
2121
lock (not taken), or returns NULL if no PTE table;
22+
- pte_offset_map_rw_nolock()
23+
maps PTE, returns pointer to PTE with pointer to its PTE table
24+
lock (not taken) and the value of its pmd entry, or returns NULL
25+
if no PTE table;
2226
- pte_offset_map()
2327
maps PTE, returns pointer to PTE, or returns NULL if no PTE table;
2428
- pte_unmap()

Documentation/translations/zh_CN/dev-tools/kasan.rst

+8-12
Original file line numberDiff line numberDiff line change
@@ -422,16 +422,12 @@ KASAN连接到vmap基础架构以懒清理未使用的影子内存。
422422
~~~~
423423

424424
有一些KASAN测试可以验证KASAN是否正常工作并可以检测某些类型的内存损坏。
425-
测试由两部分组成:
426425

427-
1. 与KUnit测试框架集成的测试。使用 ``CONFIG_KASAN_KUNIT_TEST`` 启用。
428-
这些测试可以通过几种不同的方式自动运行和部分验证;请参阅下面的说明
426+
所有 KASAN 测试都与 KUnit 测试框架集成,可通过 ``CONFIG_KASAN_KUNIT_TEST`` 启用。
427+
测试可以通过几种不同的方式自动运行和部分验证;请参阅以下说明
429428

430-
2. 与KUnit不兼容的测试。使用 ``CONFIG_KASAN_MODULE_TEST`` 启用并且只能作为模块
431-
运行。这些测试只能通过加载内核模块并检查内核日志以获取KASAN报告来手动验证。
432-
433-
如果检测到错误,每个KUnit兼容的KASAN测试都会打印多个KASAN报告之一,然后测试打印
434-
其编号和状态。
429+
如果检测到错误,每个 KASAN 测试都会打印多份 KASAN 报告中的一份。
430+
然后测试会打印其编号和状态。
435431

436432
当测试通过::
437433

@@ -458,16 +454,16 @@ KASAN连接到vmap基础架构以懒清理未使用的影子内存。
458454

459455
not ok 1 - kasan
460456

461-
有几种方法可以运行与KUnit兼容的KASAN测试
457+
有几种方法可以运行 KASAN 测试
462458

463459
1. 可加载模块
464460

465-
启用 ``CONFIG_KUNIT`` 后,KASAN-KUnit测试可以构建为可加载模块,并通过使用
466-
``insmod`` 或 ``modprobe`` 加载 ``kasan_test.ko`` 来运行。
461+
启用 ``CONFIG_KUNIT`` 后,可以将测试构建为可加载模块
462+
并通过使用 ``insmod`` 或 ``modprobe`` 加载 ``kasan_test.ko`` 来运行。
467463

468464
2. 内置
469465

470-
通过内置 ``CONFIG_KUNIT`` ,也可以内置KASAN-KUnit测试。在这种情况下,
466+
通过内置 ``CONFIG_KUNIT``,测试也可以内置。
471467
测试将在启动时作为后期初始化调用运行。
472468

473469
3. 使用kunit_tool

Documentation/translations/zh_TW/dev-tools/kasan.rst

+9-12
Original file line numberDiff line numberDiff line change
@@ -404,16 +404,13 @@ KASAN連接到vmap基礎架構以懶清理未使用的影子內存。
404404
~~~~
405405

406406
有一些KASAN測試可以驗證KASAN是否正常工作並可以檢測某些類型的內存損壞。
407-
測試由兩部分組成:
408407

409-
1. 與KUnit測試框架集成的測試。使用 ``CONFIG_KASAN_KUNIT_TEST`` 啓用。
410-
這些測試可以通過幾種不同的方式自動運行和部分驗證;請參閱下面的說明。
408+
所有 KASAN 測試均與 KUnit 測試框架集成,並且可以啟用
409+
透過 ``CONFIG_KASAN_KUNIT_TEST``。可以運行測試並進行部分驗證
410+
以幾種不同的方式自動進行;請參閱下面的說明。
411411

412-
2. 與KUnit不兼容的測試。使用 ``CONFIG_KASAN_MODULE_TEST`` 啓用並且只能作爲模塊
413-
運行。這些測試只能通過加載內核模塊並檢查內核日誌以獲取KASAN報告來手動驗證。
414-
415-
如果檢測到錯誤,每個KUnit兼容的KASAN測試都會打印多個KASAN報告之一,然後測試打印
416-
其編號和狀態。
412+
如果偵測到錯誤,每個 KASAN 測試都會列印多個 KASAN 報告之一。
413+
然後測試列印其編號和狀態。
417414

418415
當測試通過::
419416

@@ -440,16 +437,16 @@ KASAN連接到vmap基礎架構以懶清理未使用的影子內存。
440437

441438
not ok 1 - kasan
442439

443-
有幾種方法可以運行與KUnit兼容的KASAN測試
440+
有幾種方法可以執行 KASAN 測試
444441

445442
1. 可加載模塊
446443

447-
啓用 ``CONFIG_KUNIT`` 後,KASAN-KUnit測試可以構建爲可加載模塊,並通過使用
448-
``insmod`` 或 ``modprobe`` 加載 ``kasan_test.ko`` 來運行
444+
啟用 ``CONFIG_KUNIT`` 後,測試可以建置為可載入模組
445+
並且透過使用 ``insmod`` 或 ``modprobe`` 來載入 ``kasan_test.ko`` 來運作
449446

450447
2. 內置
451448

452-
通過內置 ``CONFIG_KUNIT`` ,也可以內置KASAN-KUnit測試。在這種情況下,
449+
透過內建 ``CONFIG_KUNIT``,測試也可以內建。
453450
測試將在啓動時作爲後期初始化調用運行。
454451

455452
3. 使用kunit_tool

MAINTAINERS

+2
Original file line numberDiff line numberDiff line change
@@ -14957,6 +14957,8 @@ S: Maintained
1495714957
W: http://www.linux-mm.org
1495814958
T: git git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm
1495914959
T: quilt git://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new
14960+
F: Documentation/admin-guide/mm/
14961+
F: Documentation/mm/
1496014962
F: include/linux/gfp.h
1496114963
F: include/linux/gfp_types.h
1496214964
F: include/linux/memfd.h

0 commit comments

Comments
 (0)