The patch titled Subject: bcachefs-do-not-use-pf_memalloc_noreclaim-fix has been added to the -mm mm-nonmm-unstable branch. Its filename is bcachefs-do-not-use-pf_memalloc_noreclaim-fix.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/bcachefs-do-not-use-pf_memalloc_noreclaim-fix.patch This patch will later appear in the mm-nonmm-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via the mm-everything branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there every 2-3 working days ------------------------------------------------------ From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Subject: bcachefs-do-not-use-pf_memalloc_noreclaim-fix Date: Fri Sep 27 08:38:06 AM PDT 2024 fix kerneldoc warnings Reported-by: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx> Closes: https://lkml.kernel.org/r/20240927133041.0b54641d@xxxxxxxxxxxxxxxx Cc: Kent Overstreet <kent.overstreet@xxxxxxxxx> Cc: Michal Hocko <mhocko@xxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- security/security.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/security/security.c~bcachefs-do-not-use-pf_memalloc_noreclaim-fix +++ a/security/security.c @@ -740,6 +740,7 @@ static int lsm_file_alloc(struct file *f /** * lsm_inode_alloc - allocate a composite inode blob * @inode: the inode that needs a blob + * @gfp: allocation flags * * Allocate the inode blob for all the modules * @@ -1678,7 +1679,7 @@ int security_path_notify(const struct pa /** * security_inode_alloc() - Allocate an inode LSM blob * @inode: the inode - * #gfp: allocation flags + * @gfp: allocation flags * * Allocate and attach a security structure to @inode->i_security. The * i_security field is initialized to NULL when the inode structure is _ Patches currently in -mm which might be from akpm@xxxxxxxxxxxxxxxxxxxx are bcachefs-do-not-use-pf_memalloc_noreclaim-fix.patch