messages from 2020-10-09 17:01:33 to 2020-10-12 04:29:34 UTC [more...]
[PATCH v4 00/13] mm/debug_vm_pgtable fixes
2020-10-12 4:29 UTC (4+ messages)
` [PATCH v4 13/13] mm/debug_vm_pgtable: Avoid none pte in pte_clear_test
[PATCH] mm: proc: add Sock to /proc/meminfo
2020-10-12 4:22 UTC (7+ messages)
` [External] "
[PATCH FIX v0] mm: memcg/slab: Uncharge during kmem_cache_free_bulk()
2020-10-12 3:33 UTC (3+ messages)
[PATCH RFC PKS/PMEM 00/58] PMEM: Introduce stray write protection for PMEM
2020-10-12 2:30 UTC (70+ messages)
` [PATCH RFC PKS/PMEM 01/58] x86/pks: Add a global pkrs option
` [PATCH RFC PKS/PMEM 02/58] x86/pks/test: Add testing for global option
` [PATCH RFC PKS/PMEM 03/58] memremap: Add zone device access protection
` [PATCH RFC PKS/PMEM 04/58] kmap: Add stray access protection for device pages
` [PATCH RFC PKS/PMEM 05/58] kmap: Introduce k[un]map_thread
` [PATCH RFC PKS/PMEM 06/58] kmap: Introduce k[un]map_thread debugging
` [PATCH RFC PKS/PMEM 07/58] drivers/drbd: Utilize new kmap_thread()
` [PATCH RFC PKS/PMEM 08/58] drivers/firmware_loader: "
` [PATCH RFC PKS/PMEM 09/58] drivers/gpu: "
` [PATCH RFC PKS/PMEM 10/58] drivers/rdma: "
` [PATCH RFC PKS/PMEM 11/58] drivers/net: "
` [PATCH RFC PKS/PMEM 12/58] fs/afs: "
` [PATCH RFC PKS/PMEM 13/58] fs/btrfs: "
` [PATCH RFC PKS/PMEM 14/58] fs/cifs: "
` [PATCH RFC PKS/PMEM 15/58] fs/ecryptfs: "
` [PATCH RFC PKS/PMEM 16/58] fs/gfs2: "
` [PATCH RFC PKS/PMEM 17/58] fs/nilfs2: "
` [PATCH RFC PKS/PMEM 18/58] fs/hfs: "
` [PATCH RFC PKS/PMEM 19/58] fs/hfsplus: "
` [PATCH RFC PKS/PMEM 20/58] fs/jffs2: "
` [PATCH RFC PKS/PMEM 21/58] fs/nfs: "
` [PATCH RFC PKS/PMEM 22/58] fs/f2fs: "
` [PATCH RFC PKS/PMEM 23/58] fs/fuse: "
` [PATCH RFC PKS/PMEM 24/58] fs/freevxfs: "
` [PATCH RFC PKS/PMEM 25/58] fs/reiserfs: "
` [PATCH RFC PKS/PMEM 26/58] fs/zonefs: "
` [PATCH RFC PKS/PMEM 27/58] fs/ubifs: "
` [PATCH RFC PKS/PMEM 28/58] fs/cachefiles: "
` [PATCH RFC PKS/PMEM 29/58] fs/ntfs: "
` [PATCH RFC PKS/PMEM 30/58] fs/romfs: "
` [PATCH RFC PKS/PMEM 31/58] fs/vboxsf: "
` [PATCH RFC PKS/PMEM 32/58] fs/hostfs: "
` [PATCH RFC PKS/PMEM 33/58] fs/cramfs: "
` [PATCH RFC PKS/PMEM 34/58] fs/erofs: "
` [PATCH RFC PKS/PMEM 35/58] fs: "
` [PATCH RFC PKS/PMEM 36/58] fs/ext2: Use ext2_put_page
` [PATCH RFC PKS/PMEM 37/58] fs/ext2: Utilize new kmap_thread()
` [PATCH RFC PKS/PMEM 38/58] fs/isofs: "
` [PATCH RFC PKS/PMEM 39/58] fs/jffs2: "
` [PATCH RFC PKS/PMEM 40/58] net: "
` [PATCH RFC PKS/PMEM 41/58] drivers/target: "
` [PATCH RFC PKS/PMEM 42/58] drivers/scsi: "
` [PATCH RFC PKS/PMEM 43/58] drivers/mmc: "
` [PATCH RFC PKS/PMEM 44/58] drivers/xen: "
` [PATCH RFC PKS/PMEM 45/58] drivers/firmware: "
` [PATCH RFC PKS/PMEM 46/58] drives/staging: "
` [PATCH RFC PKS/PMEM 47/58] drivers/mtd: "
` [PATCH RFC PKS/PMEM 48/58] drivers/md: "
` [PATCH RFC PKS/PMEM 49/58] drivers/misc: "
` [PATCH RFC PKS/PMEM 50/58] drivers/android: "
` [PATCH RFC PKS/PMEM 51/58] kernel: "
` [PATCH RFC PKS/PMEM 52/58] mm: "
` [PATCH RFC PKS/PMEM 53/58] lib: "
` [PATCH RFC PKS/PMEM 54/58] powerpc: "
` [PATCH RFC PKS/PMEM 55/58] samples: "
` [PATCH RFC PKS/PMEM 56/58] dax: Stray access protection for dax_direct_access()
` [PATCH RFC PKS/PMEM 57/58] nvdimm/pmem: Stray access protection for pmem->virt_addr
` [PATCH RFC PKS/PMEM 58/58] [dax|pmem]: Enable stray access protection
[PATCH] page-flags: Remove unused __[Set|Clear]PagePrivate
2020-10-12 2:10 UTC
incoming
2020-10-12 2:01 UTC (9+ messages)
` [patch 04/15] shmem: shmem_writepage() split unlikely i915 THP
[PATCH RESEND] drm/aspeed: fix Kconfig warning & subsequent build errors
2020-10-11 23:01 UTC
[PATCH] mm/hmm/test: Fix an error code in dmirror_allocate_chunk()
2020-10-11 20:58 UTC (2+ messages)
VM_BUG_ON_PAGE(page_to_pgoff(page) != offset) on s390
2020-10-11 20:23 UTC (2+ messages)
[Bug 206569] BUG at mm/filemap.c:2529: VM_BUG_ON_PAGE(page_to_pgoff(page) != offset)
2020-10-11 20:21 UTC (8+ messages)
[linux-next:master 10034/14669] drivers/md/raid5.c:2539 resize_stripes() warn: inconsistent indenting
2020-10-11 16:54 UTC
[PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
2020-10-11 9:42 UTC (8+ messages)
` [PATCH v6 3/6] "
[PATCH v2 00/17] follow_pfn and other iomap races
2020-10-11 6:36 UTC (32+ messages)
` [PATCH v2 03/17] misc/habana: Stop using frame_vector helpers
` [PATCH v2 09/17] mm: Add unsafe_follow_pfn
` [PATCH v2 10/17] media/videbuf1|2: Mark follow_pfn usage as unsafe
` [PATCH v2 14/17] resource: Move devmem revoke code to resource framework
incoming
2020-10-11 6:16 UTC (6+ messages)
` [patch 1/5] MAINTAINERS: change hardening mailing list
` [patch 2/5] MAINTAINERS: Antoine Tenart's email address
` [patch 3/5] mm: mmap: fix general protection fault in unlink_file_vma()
` [patch 4/5] mm: validate inode in mapping_set_error()
` [patch 5/5] mm: khugepaged: recalculate min_free_kbytes after memory hotplug as expected by khugepaged
[PATCH v2] kcov, usb, vhost: specify contexts for remote coverage sections
2020-10-10 20:08 UTC (2+ messages)
[PATCH v3 00/23] Use asm-generic for mmu_context no-op functions
2020-10-10 19:00 UTC (6+ messages)
[PATCH v2 0/5] arm64: Default to 32-bit wide ZONE_DMA
2020-10-10 15:12 UTC (2+ messages)
` [PATCH v2 5/5] mm: Update DMA zones description
[PATCH] mm/khugepaged: fix filemap page_to_pgoff(page) != offset
2020-10-10 15:09 UTC (2+ messages)
INFO: task can't die in congestion_wait
2020-10-10 14:11 UTC
[PATCH] page-flags: Remove unused __[Set|Clear]PagePrivate
2020-10-10 12:56 UTC (2+ messages)
[PATCH 1/4] of/fdt: Update zone_dma_bits when running in bcm2711
2020-10-10 12:38 UTC (14+ messages)
[PATCH] mm: validate inode in mapping_set_error
2020-10-10 11:58 UTC (2+ messages)
[PATCH 1/2] mm/mprotect: Call arch_validate_prot under mmap_lock and with length
2020-10-10 11:09 UTC (3+ messages)
[PATCH] mm: memcontrol: localize mem_cgroup_sockets_enabled() check
2020-10-10 10:45 UTC
Performance regressions in "boot_time" tests in Linux 5.8 Kernel
2020-10-10 6:11 UTC (2+ messages)
[PATCH v3 0/2] Add tracepoints around mmap_lock acquisition
2020-10-10 5:31 UTC (5+ messages)
` [PATCH v3 1/2] tracing: support "bool" type in synthetic trace events
` [PATCH v3 2/2] mmap_lock: add tracepoints around lock acquisition
[PATCH] mm: memcontrol: eliminate redundant check in __mem_cgroup_insert_exceeded()
2020-10-10 1:58 UTC
[PATCH 1/6] mm: mmap: fix fput in error path
2020-10-10 1:48 UTC
[PATCH v3 0/8] clean-up the migration target allocation functions
2020-10-10 0:25 UTC (8+ messages)
` [PATCH v3 7/8] mm/mempolicy: use a standard migration target allocation callback
[PATCH] mm: Fix a race during split THP
2020-10-10 0:26 UTC (3+ messages)
[PATCH] mm/memcg: fix device private memcg accounting
2020-10-10 0:00 UTC (3+ messages)
[PATCH 0/4] Remove nrexceptional tracking
2020-10-09 23:04 UTC (5+ messages)
[PATCH 1/6] mm: mmap: fix fput in error path
2020-10-09 22:25 UTC (3+ messages)
[linux-next:master] BUILD REGRESSION d67bc7812221606e1886620a357b13f906814af7
2020-10-09 22:05 UTC
[PATCH v4] mm: cma: indefinitely retry allocations in cma_alloc
2020-10-09 20:26 UTC (4+ messages)
[PATCH RFC V3 0/9] PKS: Add Protection Keys Supervisor (PKS) support RFC v3
2020-10-09 20:18 UTC (11+ messages)
` [PATCH RFC V3 1/9] x86/pkeys: Create pkeys_common.h
` [PATCH RFC V3 2/9] x86/fpu: Refactor arch_set_user_pkey_access() for PKS support
` [PATCH RFC V3 3/9] x86/pks: Enable Protection Keys Supervisor (PKS)
` [PATCH RFC V3 4/9] x86/pks: Preserve the PKRS MSR on context switch
` [PATCH RFC V3 5/9] x86/pks: Add PKS kernel API
` [PATCH RFC V3 6/9] x86/entry: Pass irqentry_state_t by reference
` [PATCH RFC V3 7/9] x86/entry: Preserve PKRS MSR across exceptions
` [PATCH RFC V3 8/9] x86/fault: Report the PKRS state on fault
` [PATCH RFC V3 9/9] x86/pks: Add PKS test code
[PATCH RFC PKS/Trusted keys 0/2] trusted keys: Add PKS protection to trusted keys
2020-10-09 20:14 UTC (3+ messages)
` [PATCH RFC PKS/Trusted keys 1/2] vmalloc: Add vmalloc_pks() call
` [PATCH RFC PKS/Trusted keys 2/2] keys/trusted: protect trusted keys using PKS
[PATCH v2 0/3] Actually fix freelist pointer vs redzoning
2020-10-09 19:54 UTC (4+ messages)
` [PATCH v2 1/3] mm/slub: Clarify verification reporting
` [PATCH v2 2/3] mm/slub: Fix redzoning for small allocations
` [PATCH v2 3/3] mm/slub: Actually fix freelist pointer vs redzoning
[PATCH v14 00/26] Control-flow Enforcement: Shadow Stack
2020-10-09 18:45 UTC (21+ messages)
` [PATCH v14 01/26] Documentation/x86: Add CET description
` [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
` [PATCH v14 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
` [PATCH v14 04/26] x86/cet: Add control-protection fault handler
` [PATCH v14 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
` [PATCH v14 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [PATCH v14 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
` [PATCH v14 08/26] x86/mm: Introduce _PAGE_COW
` [PATCH v14 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [PATCH v14 10/26] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v14 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
` [PATCH v14 12/26] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH v14 13/26] x86/mm: Shadow Stack page fault error checking
` [PATCH v14 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v14 15/26] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v14 16/26] mm: Add guard pages around a shadow stack
` [PATCH v14 17/26] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v14 18/26] mm: Update can_follow_write_pte() for shadow stack
` [PATCH v14 19/26] mm: Re-introduce vm_flags to do_mmap()
[PATCH v13 8/8] x86/vsyscall/64: Fixup Shadow Stack and Indirect Branch Tracking for vsyscall emulation
2020-10-09 17:42 UTC (15+ messages)
[PATCH v4 00/11] KFENCE: A low-overhead sampling-based memory safety error detector
2020-10-09 17:40 UTC (7+ messages)
` [PATCH v4 02/11] x86, kfence: enable KFENCE for x86
[PATCH] mm: make device private reference counts zero based
2020-10-09 17:23 UTC (3+ messages)
[tip: core/rcu] mm/pagemap: Cleanup PREEMPT_COUNT leftovers
2020-10-09 17:01 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).