Patch Series

Subject mm, bpf: BPF-MM, BPF-THP
Author laoar.shao@gmail.com
Date 2025-10-15 14:17:08 +0000 UTC
Version 10
Cc 21cnbao@gmail.com akpm@linux-foundation.org ameryhung@gmail.com andrii@kernel.org ast@kernel.org baolin.wang@linux.alibaba.com bpf@vger.kernel.org corbet@lwn.net daniel@iogearbox.net david@redhat.com dev.jain@arm.com gutierrez.asier@huawei-partners.com hannes@cmpxchg.org lance.yang@linux.dev laoar.shao@gmail.com liam.howlett@oracle.com linux-doc@vger.kernel.org linux-kernel@vger.kernel.org linux-mm@kvack.org lorenzo.stoakes@oracle.com npache@redhat.com rdunlap@infradead.org rientjes@google.com ryan.roberts@arm.com shakeel.butt@linux.dev shy828301@gmail.com tj@kernel.org usamaarif642@gmail.com willy@infradead.org ziy@nvidia.com

Patches (9)

Name Content
[RFC PATCH v10 mm-new 1/9] mm: thp: remove vm_flags parameter from khugepaged_enter_vma() [Body]
[RFC PATCH v10 mm-new 2/9] mm: thp: remove vm_flags parameter from thp_vma_allowable_order() [Body]
[RFC PATCH v10 mm-new 3/9] mm: thp: add support for BPF based THP order selection [Body]
[RFC PATCH v10 mm-new 4/9] mm: thp: decouple THP allocation between swap and page fault paths [Body]
[RFC PATCH v10 mm-new 5/9] mm: thp: enable THP allocation exclusively through khugepaged [Body]
[RFC PATCH v10 mm-new 6/9] bpf: mark mm->owner as __safe_rcu_or_null [Body]
[RFC PATCH v10 mm-new 7/9] bpf: mark vma->vm_mm as __safe_trusted_or_null [Body]
[RFC PATCH v10 mm-new 8/9] selftests/bpf: add a simple BPF based THP policy [Body]
[RFC PATCH v10 mm-new 9/9] Documentation: add BPF-based THP policy management [Body]

Session 2025-10-15

ID (for dev) df810a6e-216b-402f-ade2-02d05c1ed72f
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 56b4d162392dda2365fbc1f482184a24b489d07d [Config] passed [Log]
[KASAN] Boot test: Base 56b4d162392dda2365fbc1f482184a24b489d07d [Config] passed
[KASAN] Build Patched 56b4d162392dda2365fbc1f482184a24b489d07d [Config] [Log] [patched] failed [Log]
kernel build error [Log]