The patch titled Subject: scripts-gdb-add-mm-introspection-utils-fix has been added to the -mm mm-nonmm-unstable branch. Its filename is scripts-gdb-add-mm-introspection-utils-fix.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/scripts-gdb-add-mm-introspection-utils-fix.patch This patch will later appear in the mm-nonmm-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via the mm-everything branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there every 2-3 working days ------------------------------------------------------ From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Subject: scripts-gdb-add-mm-introspection-utils-fix Date: Fri Jan 13 08:04:59 PM PST 2023 s/physicall/physical/ Cc: Dmitrii Bundin <dmitrii.bundin.a@xxxxxxxxx> Cc: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> Cc: Ingo Molnar <mingo@xxxxxxxxxx> Cc: Jan Kiszka <jan.kiszka@xxxxxxxxxxx> Cc: Kieran Bingham <kbingham@xxxxxxxxxx> Cc: Mike Rapoport (IBM) <rppt@xxxxxxxxxx> Cc: Vlastimil Babka <vbabka@xxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- --- a/scripts/gdb/linux/mm.py~scripts-gdb-add-mm-introspection-utils-fix +++ a/scripts/gdb/linux/mm.py @@ -78,7 +78,7 @@ class Cr3(): return f"""\ cr3: {'cr3 binary data': <30} {hex(self.cr3)} - {'next entry physicall address': <30} {hex(self.next_entry_physical_address)} + {'next entry physical address': <30} {hex(self.next_entry_physical_address)} --- {'bit' : <4} {self.page_level_write_through[0]: <10} {'page level write through': <30} {self.page_level_write_through[1]} {'bit' : <4} {self.page_level_cache_disabled[0]: <10} {'page level cache disabled': <30} {self.page_level_cache_disabled[1]} @@ -159,7 +159,7 @@ level {self.page_hierarchy_level}: {'entry address': <30} {hex(self.address)} {'page entry binary data': <30} {hex(self.page_entry_binary_data)} {'page size': <30} {'1GB' if self.page_hierarchy_level == 3 else '2MB' if self.page_hierarchy_level == 2 else '4KB' if self.page_hierarchy_level == 1 else 'Unknown page size for level:' + self.page_hierarchy_level} - {'page physicall address': <30} {hex(self.page_physical_address)} + {'page physical address': <30} {hex(self.page_physical_address)} --- {'bit': <4} {self.entry_present[0]: <10} {'entry present': <30} {self.entry_present[1]} {'bit': <4} {self.read_write[0]: <10} {'read/write access allowed': <30} {self.read_write[1]} @@ -180,7 +180,7 @@ level {self.page_hierarchy_level}: level {self.page_hierarchy_level}: {'entry address': <30} {hex(self.address)} {'page entry binary data': <30} {hex(self.page_entry_binary_data)} - {'next entry physicall address': <30} {hex(self.next_entry_physical_address)} + {'next entry physical address': <30} {hex(self.next_entry_physical_address)} --- {'bit': <4} {self.entry_present[0]: <10} {'entry present': <30} {self.entry_present[1]} {'bit': <4} {self.read_write[0]: <10} {'read/write access allowed': <30} {self.read_write[1]} _ Patches currently in -mm which might be from akpm@xxxxxxxxxxxxxxxxxxxx are mm-memfd-add-mfd_noexec_seal-and-mfd_exec-fix.patch mm-memfd-add-mfd_noexec_seal-and-mfd_exec-fix-fix.patch mm-memfd-add-mfd_noexec_seal-and-mfd_exec-fix-3.patch mm-memfd-add-mfd_noexec_seal-and-mfd_exec-fix-3-fix.patch mm-hugetlb-introduce-hugetlb_walk-checkpatch-fixes.patch mm-memcontrol-deprecate-charge-moving-fix.patch mm-swap-convert-deactivate_page-to-folio_deactivate-fix.patch mm-uffd-detect-pgtable-allocation-failures-checkpatch-fixes.patch mm-add-folio_add_new_anon_rmap-fix.patch error-injection-remove-ei_etype_none-fix.patch hfsplus-remove-unnecessary-variable-initialization-fix.patch scripts-gdb-add-mm-introspection-utils-fix.patch