Message ID | 20231106183258.GP2824@kernel.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:8f47:0:b0:403:3b70:6f57 with SMTP id j7csp2850844vqu; Mon, 6 Nov 2023 10:33:35 -0800 (PST) X-Google-Smtp-Source: AGHT+IGW3t2ggMhMnN/snhzpE801OtypkyN8SUlPhU/Mzmm4QQWuuZjG9QfKfySCL3d5rHMjc0O4 X-Received: by 2002:a05:6a00:9385:b0:68c:69c8:e0f0 with SMTP id ka5-20020a056a00938500b0068c69c8e0f0mr32635821pfb.18.1699295614590; Mon, 06 Nov 2023 10:33:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1699295614; cv=none; d=google.com; s=arc-20160816; b=rDl0+k+mqcMDU0z1ucYABb02n3zvLQW/cUA9zYYPXB3UWt7UQV1VmYeuak0RRALm9e TqxOBWOBxC0ysSoEX5IVcU3OkSnEvXOdzPpcTIhN5ZgzygC+No2jSEIYPZ3bLEgdlQqB hap1hfs6f7dXQ4nA49j1sbhxXDbcTkQFn0IlU4krG8D58kkqXfzPBZABjmIx3AjMPQuE xwiKdofVfIXhGiS29z9sxmanDOy5gCJlnjVtrCTuasDXkDBHpFv/IyhhQBqCnOu94UiX NQP3pMcPZ5OZN5d+gL6j8j1ig6vBx+B/L1uYfm6JkesIl0Yde/M6FrPaAsjD4jSIZHst KYAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=YbCggWTZd20uKwmqkr+nlymgs6HQ9HJa5yRpfuT4oB0=; fh=sAqOfD+ueswUFcci3xuXQ5XmP1GagggRetHAbKT2Fa4=; b=tLHruTmspj1C6Hb/ncwr+DZBCwcHfENPEU7jS88hxlfcIBDsA1cuWqy6I8Uv7F5Vow G0Z/8Sc06RfRaPsjX2lZ7CScsxtol29fwFxrQ9PgPtKbtvh8r/Xt+YOclvXJRuNHveW7 No5Dlu0byWPAIWs+7PUce0UeAZuwbNEdtGGPWQiOOj+wJEprEdw9a8LFbUPtdDd5MGzx Ime3lN8qbfkdFmnHjg0M+wU0Cof7wmhOtecJpC2us9dXD8lu5Gjz1vXNR0vZpmE/JEdO /Q7xbuxae0qBs5mEeDbk4q6uDwnVrxx5b8MAcGu/f27xgAo9AERkNzYWJeQ6ZpyllosK yUSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=kXJxAz0Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id bk13-20020a056a02028d00b005bd2713d3a1si222838pgb.650.2023.11.06.10.33.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Nov 2023 10:33:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=kXJxAz0Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id AA5E1801E87E; Mon, 6 Nov 2023 10:33:33 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232793AbjKFSd2 (ORCPT <rfc822;lhua1029@gmail.com> + 34 others); Mon, 6 Nov 2023 13:33:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39268 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232938AbjKFSdO (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 6 Nov 2023 13:33:14 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 54585D61 for <linux-kernel@vger.kernel.org>; Mon, 6 Nov 2023 10:33:10 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 28A7BC433C8; Mon, 6 Nov 2023 18:33:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1699295590; bh=fjg8513Gf1d7m4R7gTtM2nG8lVuqIwjwGxcDG8s0rGE=; h=Date:From:To:Cc:Subject:From; b=kXJxAz0ZAOzKlH/0riw9OGCsKqFeYwupuVkqVF8jmk/eWjs7qfp1Dpx6crQYSn+GN /Yg98o/qyyhhZdVDnvH50YLmxZtFsz1YSeGbVAF+drOj2UDjTIMND/gXtDOKGTX49X kvUrVk4JzBX1D3vz93q70HbFn+LWE5C6oZsK645agH91Qyy8m6404RM7nJT0sIid2O vB25PQ+OQclI+8E7MH47jpjHMeJJEpa7GX2bL0pPJj9hswYWH3Pe23QZktCU+MXM+8 PYs3JDt+4QwAjzZgMyMI/YGW5HHjvPHdFTiqF3oasaAHvt4D8SzAbwNDv7SRXUYn6S jP01wc9XakLcQ== Date: Mon, 6 Nov 2023 20:32:58 +0200 From: Mike Rapoport <rppt@kernel.org> To: Linus Torvalds <torvalds@linux-foundation.org> Cc: Andrew Morton <akpm@linux-foundation.org>, Song Shuai <songshuaishuai@tinylab.org>, Mike Rapoport <rppt@kernel.org>, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] memblock update for v6.7 Message-ID: <20231106183258.GP2824@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 06 Nov 2023 10:33:33 -0800 (PST) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1781840598513938380 X-GMAIL-MSGID: 1781840598513938380 |
Series |
[GIT,PULL] memblock update for v6.7
|
|
Pull-request
https://git.kernel.org/pub/scm/linux/kernel/git/rppt/memblock tags/memblock-v6.7-rc1Message
Mike Rapoport
Nov. 6, 2023, 6:32 p.m. UTC
Hi Linus, The following changes since commit 6465e260f48790807eef06b583b38ca9789b6072: Linux 6.6-rc3 (2023-09-24 14:31:13 -0700) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/rppt/memblock tags/memblock-v6.7-rc1 for you to fetch changes up to e96c6b8f212a510c9b22362de519f6e1d7920de5: memblock: report failures when memblock_can_resize is not set (2023-09-28 09:04:33 +0300) ---------------------------------------------------------------- memblock: report failures when memblock_can_resize is not set Numerous memblock reservations at early boot may exhaust static memblock.reserved array and it is unnoticed because most of the callers don't check memblock_reserve() return value. In this case the system will crash later, but the reason is hard to identify. Replace return of an error with panic() when memblock.reserved is exhausted before it can be resized. ---------------------------------------------------------------- Song Shuai (1): memblock: report failures when memblock_can_resize is not set mm/memblock.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
Comments
The pull request you sent on Mon, 6 Nov 2023 20:32:58 +0200:
> https://git.kernel.org/pub/scm/linux/kernel/git/rppt/memblock tags/memblock-v6.7-rc1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/447cec034b7896f4b19dbfe3ce6c366ce7c7602a
Thank you!