Date |
List |
Subject |
2021-11-02 17:13:20
|
linux-kernel
|
[PATCH] mm/slab_common: use WARN() if cache still has objects on destroy |
2021-10-27 21:25:08
|
linux-kernel
|
Re: Potentially Broken Address Dependency via test_bit() When Compiling With Clang |
2021-10-26 20:08:46
|
linux-kernel
|
Re: [syzbot] KCSAN: data-race in call_rcu / rcu_gp_fqs_loop |
2021-10-26 18:13:37
|
linux-kernel
|
Re: [syzbot] upstream test error: BUG: sleeping function called from invalid context in stack_depot_save |
2021-10-25 19:10:38
|
linux-kernel
|
Re: [syzbot] KCSAN: data-race in sbitmap_queue_clear / sbitmap_queue_clear (3) |
2021-10-25 14:37:50
|
linux-kernel
|
Re: [syzbot] KCSAN: data-race in sbitmap_queue_clear / sbitmap_queue_clear (3) |
2021-10-25 13:23:39
|
linux-kernel
|
Re: [syzbot] KCSAN: data-race in call_rcu / rcu_gp_fqs_loop |
2021-10-25 06:39:02
|
linux-kernel
|
Re: [PATCH] mm/kfence: fix null pointer dereference on pointer meta |
2021-10-23 18:52:10
|
linux-kernel
|
Re: [PATCH] mm/kfence: fix null pointer dereference on pointer meta |
2021-10-21 08:49:34
|
linux-kernel
|
Re: [PATCH] compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer |
2021-10-21 06:02:44
|
linux-kernel
|
Re: [PATCH] compiler-gcc.h: Define __SANITIZE_ADDRESS__ under hwaddress sanitizer |
2021-10-20 09:59:57
|
linux-kernel
|
Re: [PATCH v3] kasan: add kasan mode messages when kasan init |
2021-10-20 07:25:03
|
linux-kernel
|
Re: [PATCH v2] kasan: add kasan mode messages when kasan init |
2021-10-20 06:06:08
|
linux-kernel
|
Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled |
2021-10-19 14:16:58
|
linux-kernel
|
Re: [PATCH] kasan: add kasan mode messages when kasan init |
2021-10-19 10:34:14
|
linux-kernel
|
[PATCH 2/2] kfence: default to dynamic branch instead of static keys mode |
2021-10-19 10:29:33
|
linux-kernel
|
[PATCH 1/2] kfence: always use static branches to guard kfence_alloc() |
2021-10-12 09:59:38
|
linux-kernel
|
Re: [PATCH v2] lib/stackdepot: allow optional init and stack_table allocation by kvmalloc() |
2021-10-11 17:10:38
|
linux-kernel
|
Re: [PATCH] lib/stackdepot: allow optional init and stack_table allocation by kvmalloc() |
2021-10-11 13:31:52
|
linux-kernel
|
Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled |
2021-10-11 11:28:07
|
linux-kernel
|
Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled |
2021-10-11 07:03:57
|
linux-kernel
|
Re: BUG: soft lockup in __kmalloc_node() with KFENCE enabled |
2021-10-07 12:53:10
|
linux-kernel
|
Re: [PATCH] lib/stackdepot: allow optional init and stack_table allocation by kvmalloc() |
2021-10-06 11:36:20
|
linux-kernel
|
Re: [PATCH v2 5/5] kasan: Extend KASAN mode kernel parameter |
2021-10-05 15:14:49
|
linux-kernel
|
Re: [PATCH -rcu/kcsan 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr |
2021-10-05 13:15:40
|
linux-kernel
|
Re: [PATCH -rcu/kcsan 04/23] kcsan: Add core support for a subset of weak memory modeling |
2021-10-05 12:18:16
|
linux-kernel
|
Re: [PATCH -rcu/kcsan 16/23] locking/atomics, kcsan: Add instrumentation for barriers |
2021-10-05 11:51:57
|
linux-kernel
|
Re: [PATCH -rcu/kcsan 05/23] kcsan: Add core memory barrier instrumentation functions |
2021-10-05 11:06:45
|
linux-kernel
|
[PATCH -rcu/kcsan 22/23] objtool, kcsan: Add memory barrier instrumentation to whitelist |
2021-10-05 11:06:32
|
linux-kernel
|
[PATCH -rcu/kcsan 15/23] locking/barriers, kcsan: Support generic instrumentation |
2021-10-05 11:06:28
|
linux-kernel
|
[PATCH -rcu/kcsan 21/23] sched, kcsan: Enable memory barrier instrumentation |
2021-10-05 11:05:31
|
linux-kernel
|
[PATCH -rcu/kcsan 10/23] kcsan: test: Match reordered or normal accesses |
2021-10-05 11:04:56
|
linux-kernel
|
[PATCH -rcu/kcsan 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr |
2021-10-05 11:04:56
|
linux-kernel
|
[PATCH -rcu/kcsan 20/23] mm, kcsan: Enable barrier instrumentation |
2021-10-05 11:04:33
|
linux-kernel
|
[PATCH -rcu/kcsan 05/23] kcsan: Add core memory barrier instrumentation functions |
2021-10-05 11:04:22
|
linux-kernel
|
[PATCH -rcu/kcsan 09/23] kcsan: Document modeling of weak memory |
2021-10-05 11:04:18
|
linux-kernel
|
[PATCH -rcu/kcsan 17/23] asm-generic/bitops, kcsan: Add instrumentation for barriers |
2021-10-05 11:04:05
|
linux-kernel
|
[PATCH -rcu/kcsan 13/23] kcsan: selftest: Add test case to check memory barrier instrumentation |
2021-10-05 11:04:03
|
linux-kernel
|
[PATCH -rcu/kcsan 18/23] x86/barriers, kcsan: Use generic instrumentation for non-smp barriers |
2021-10-05 11:04:02
|
linux-kernel
|
[PATCH -rcu/kcsan 12/23] kcsan: Ignore GCC 11+ warnings about TSan runtime support |
2021-10-05 11:03:54
|
linux-kernel
|
[PATCH -rcu/kcsan 16/23] locking/atomics, kcsan: Add instrumentation for barriers |
2021-10-05 11:03:46
|
linux-kernel
|
[PATCH -rcu/kcsan 14/23] locking/barriers, kcsan: Add instrumentation for barriers |
2021-10-05 11:03:37
|
linux-kernel
|
[PATCH -rcu/kcsan 07/23] kcsan: Call scoped accesses reordered in reports |
2021-10-05 11:03:35
|
linux-kernel
|
[PATCH -rcu/kcsan 11/23] kcsan: test: Add test cases for memory barrier instrumentation |
2021-10-05 11:03:31
|
linux-kernel
|
[PATCH -rcu/kcsan 19/23] x86/qspinlock, kcsan: Instrument barrier of pv_queued_spin_unlock() |
2021-10-05 11:03:12
|
linux-kernel
|
[PATCH -rcu/kcsan 08/23] kcsan: Show location access was reordered to |
2021-10-05 11:02:43
|
linux-kernel
|
[PATCH -rcu/kcsan 06/23] kcsan, kbuild: Add option for barrier instrumentation only |
2021-10-05 11:02:08
|
linux-kernel
|
[PATCH -rcu/kcsan 04/23] kcsan: Add core support for a subset of weak memory modeling |
2021-10-05 11:01:57
|
linux-kernel
|
[PATCH -rcu/kcsan 03/23] kcsan: Avoid checking scoped accesses from nested contexts |
2021-10-05 11:01:51
|
linux-kernel
|
[PATCH -rcu/kcsan 00/23] kcsan: Support detecting a subset of missing memory barriers |
2021-10-05 11:01:51
|
linux-kernel
|
[PATCH -rcu/kcsan 01/23] kcsan: Refactor reading of instrumented memory |