Marco Elver ([email protected])

Number of posts: 2668 (1.44 per day)
First post: 2019-05-17 13:21:47
Last post: 2024-06-14 14:32:11

Date List Subject
2021-11-02 17:13:20 linux-kernel [PATCH] mm/slab_common: use WARN() if cache still has objects on destroy
2021-10-27 21:25:08 linux-kernel Re: Potentially Broken Address Dependency via test_bit() When Compiling With Clang
2021-10-26 20:08:46 linux-kernel Re: [syzbot] KCSAN: data-race in call_rcu / rcu_gp_fqs_loop
2021-10-26 18:13:37 linux-kernel Re: [syzbot] upstream test error: BUG: sleeping function called from invalid context in stack_depot_save
2021-10-25 19:10:38 linux-kernel Re: [syzbot] KCSAN: data-race in sbitmap_queue_clear / sbitmap_queue_clear (3)
2021-10-25 14:37:50 linux-kernel Re: [syzbot] KCSAN: data-race in sbitmap_queue_clear / sbitmap_queue_clear (3)
2021-10-25 13:23:39 linux-kernel Re: [syzbot] KCSAN: data-race in call_rcu / rcu_gp_fqs_loop
2021-10-25 06:39:02 linux-kernel Re: [PATCH] mm/kfence: fix null pointer dereference on pointer meta
2021-10-23 18:52:10 linux-kernel Re: [PATCH] mm/kfence: fix null pointer dereference on pointer meta
2021-10-21 08:49:34 linux-kernel Re: [PATCH] compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer
2021-10-21 06:02:44 linux-kernel Re: [PATCH] compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer
2021-10-20 09:59:57 linux-kernel Re: [PATCH v3] kasan: add kasan mode messages when kasan init
2021-10-20 07:25:03 linux-kernel Re: [PATCH v2] kasan: add kasan mode messages when kasan init
2021-10-20 06:06:08 linux-kernel Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled
2021-10-19 14:16:58 linux-kernel Re: [PATCH] kasan: add kasan mode messages when kasan init
2021-10-19 10:34:14 linux-kernel [PATCH 2/2] kfence: default to dynamic branch instead of static keys mode
2021-10-19 10:29:33 linux-kernel [PATCH 1/2] kfence: always use static branches to guard kfence_alloc()
2021-10-12 09:59:38 linux-kernel Re: [PATCH v2] lib/stackdepot: allow optional init and stack_table allocation by kvmalloc()
2021-10-11 17:10:38 linux-kernel Re: [PATCH] lib/stackdepot: allow optional init and stack_table allocation by kvmalloc()
2021-10-11 13:31:52 linux-kernel Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled
2021-10-11 11:28:07 linux-kernel Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled
2021-10-11 07:03:57 linux-kernel Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled
2021-10-07 12:53:10 linux-kernel Re: [PATCH] lib/stackdepot: allow optional init and stack_table allocation by kvmalloc()
2021-10-06 11:36:20 linux-kernel Re: [PATCH v2 5/5] kasan: Extend KASAN mode kernel parameter
2021-10-05 15:14:49 linux-kernel Re: [PATCH -rcu/kcsan 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
2021-10-05 13:15:40 linux-kernel Re: [PATCH -rcu/kcsan 04/23] kcsan: Add core support for a subset of weak memory modeling
2021-10-05 12:18:16 linux-kernel Re: [PATCH -rcu/kcsan 16/23] locking/atomics, kcsan: Add instrumentation for barriers
2021-10-05 11:51:57 linux-kernel Re: [PATCH -rcu/kcsan 05/23] kcsan: Add core memory barrier instrumentation functions
2021-10-05 11:06:45 linux-kernel [PATCH -rcu/kcsan 22/23] objtool, kcsan: Add memory barrier instrumentation to whitelist
2021-10-05 11:06:32 linux-kernel [PATCH -rcu/kcsan 15/23] locking/barriers, kcsan: Support generic instrumentation
2021-10-05 11:06:28 linux-kernel [PATCH -rcu/kcsan 21/23] sched, kcsan: Enable memory barrier instrumentation
2021-10-05 11:05:31 linux-kernel [PATCH -rcu/kcsan 10/23] kcsan: test: Match reordered or normal accesses
2021-10-05 11:04:56 linux-kernel [PATCH -rcu/kcsan 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
2021-10-05 11:04:56 linux-kernel [PATCH -rcu/kcsan 20/23] mm, kcsan: Enable barrier instrumentation
2021-10-05 11:04:33 linux-kernel [PATCH -rcu/kcsan 05/23] kcsan: Add core memory barrier instrumentation functions
2021-10-05 11:04:22 linux-kernel [PATCH -rcu/kcsan 09/23] kcsan: Document modeling of weak memory
2021-10-05 11:04:18 linux-kernel [PATCH -rcu/kcsan 17/23] asm-generic/bitops, kcsan: Add instrumentation for barriers
2021-10-05 11:04:05 linux-kernel [PATCH -rcu/kcsan 13/23] kcsan: selftest: Add test case to check memory barrier instrumentation
2021-10-05 11:04:03 linux-kernel [PATCH -rcu/kcsan 18/23] x86/barriers, kcsan: Use generic instrumentation for non-smp barriers
2021-10-05 11:04:02 linux-kernel [PATCH -rcu/kcsan 12/23] kcsan: Ignore GCC 11+ warnings about TSan runtime support
2021-10-05 11:03:54 linux-kernel [PATCH -rcu/kcsan 16/23] locking/atomics, kcsan: Add instrumentation for barriers
2021-10-05 11:03:46 linux-kernel [PATCH -rcu/kcsan 14/23] locking/barriers, kcsan: Add instrumentation for barriers
2021-10-05 11:03:37 linux-kernel [PATCH -rcu/kcsan 07/23] kcsan: Call scoped accesses reordered in reports
2021-10-05 11:03:35 linux-kernel [PATCH -rcu/kcsan 11/23] kcsan: test: Add test cases for memory barrier instrumentation
2021-10-05 11:03:31 linux-kernel [PATCH -rcu/kcsan 19/23] x86/qspinlock, kcsan: Instrument barrier of pv_queued_spin_unlock()
2021-10-05 11:03:12 linux-kernel [PATCH -rcu/kcsan 08/23] kcsan: Show location access was reordered to
2021-10-05 11:02:43 linux-kernel [PATCH -rcu/kcsan 06/23] kcsan, kbuild: Add option for barrier instrumentation only
2021-10-05 11:02:08 linux-kernel [PATCH -rcu/kcsan 04/23] kcsan: Add core support for a subset of weak memory modeling
2021-10-05 11:01:57 linux-kernel [PATCH -rcu/kcsan 03/23] kcsan: Avoid checking scoped accesses from nested contexts
2021-10-05 11:01:51 linux-kernel [PATCH -rcu/kcsan 00/23] kcsan: Support detecting a subset of missing memory barriers
2021-10-05 11:01:51 linux-kernel [PATCH -rcu/kcsan 01/23] kcsan: Refactor reading of instrumented memory