summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Add linux-next specific files for 20201209next-20201209Stephen Rothwell2020-12-094-0/+15838
* Merge branch 'akpm/master'Stephen Rothwell2020-12-09158-1913/+4191
|\
| * secretmem: test: add basic selftest for memfd_secret(2)Mike Rapoport2020-12-094-1/+318
| * arch, mm: wire up memfd_secret system call were relevantMike Rapoport2020-12-097-0/+12
| * PM: hibernate: disable when there are active secretmem usersMike Rapoport2020-12-093-1/+25
| * secretmem: add memcg accountingMike Rapoport2020-12-092-2/+37
| * secretmem: use PMD-size pages to amortize direct map fragmentationMike Rapoport2020-12-092-19/+135
| * mm: introduce memfd_secret system call to create "secret" memory areasMike Rapoport2020-12-098-1/+315
| * set_memory: allow querying whether set_direct_map_*() is actually enabledMike Rapoport2020-12-097-14/+42
| * set_memory-allow-set_direct_map__noflush-for-multiple-pages-fixAndrew Morton2020-12-091-1/+1
| * set_memory: allow set_direct_map_*_noflush() for multiple pagesMike Rapoport2020-12-099-23/+26
| * mmap: make mlock_future_check() globalMike Rapoport2020-12-092-3/+5
| * mm: add definition of PMD_PAGE_ORDERMike Rapoport2020-12-092-7/+7
| * mm/gup: assert that the mmap lock is held in __get_user_pages()Jann Horn2020-12-091-0/+2
| * mmap locking API: don't check locking if the mm isn't live yetJann Horn2020-12-093-4/+30
| * selftests/filesystems: expand epoll with epoll_pwait2Willem de Bruijn2020-12-091-0/+72
| * epoll: wire up syscall epoll_pwait2Willem de Bruijn2020-12-0922-2/+35
| * epoll: add syscall epoll_pwait2Willem de Bruijn2020-12-091-14/+73
| * epoll: convert internal api to timespec64Willem de Bruijn2020-12-091-20/+37
| * mm: fix some spelling mistakes in commentsHaitao Shi2020-12-096-6/+6
| * kasan: update documentationAndrey Konovalov2020-12-091-69/+115
| * kasan, mm: allow cache merging with no metadataAndrey Konovalov2020-12-093-3/+32
| * kasan: sanitize objects when metadata doesn't fitAndrey Konovalov2020-12-098-74/+146
| * kasan: clarify comment in __kasan_kfree_largeAndrey Konovalov2020-12-091-1/+1
| * kasan: simplify assign_tag and set_tag callsAndrey Konovalov2020-12-091-6/+7
| * kasan: don't round_up too muchAndrey Konovalov2020-12-092-6/+3
| * kasan, mm: rename kasan_poison_kfreeAndrey Konovalov2020-12-093-26/+32
| * kasan, mm: check kasan_enabled in annotationsAndrey Konovalov2020-12-093-81/+210
| * kasan: add and integrate kasan boot parametersAndrey Konovalov2020-12-094-7/+196
| * kasan: inline (un)poison_range and check_invalid_freeAndrey Konovalov2020-12-092-35/+40
| * kasan: open-code kasan_unpoison_slabAndrey Konovalov2020-12-092-7/+1
| * kasan: inline random_tag for HW_TAGSAndrey Konovalov2020-12-092-22/+14
| * kasan: inline kasan_reset_tag for tag-based modesAndrey Konovalov2020-12-099-29/+18
| * kasan: remove __kasan_unpoison_stackAndrey Konovalov2020-12-091-9/+3
| * kasan: allow VMAP_STACK for HW_TAGS modeAndrey Konovalov2020-12-091-4/+4
| * kasan, arm64: unpoison stack only with CONFIG_KASAN_STACKAndrey Konovalov2020-12-094-6/+10
| * kasan: introduce set_alloc_infoAndrey Konovalov2020-12-091-1/+6
| * kasan: rename get_alloc/free_infoAndrey Konovalov2020-12-098-27/+27
| * kasan: simplify quarantine_put call siteAndrey Konovalov2020-12-093-5/+5
| * kselftest/arm64: check GCR_EL1 after context switchVincenzo Frascino2020-12-092-1/+156
| * kasan: add documentation for hardware tag-based modeAndrey Konovalov2020-12-091-21/+59
| * kasan, arm64: enable CONFIG_KASAN_HW_TAGSAndrey Konovalov2020-12-091-0/+1
| * kasan, mm: reset tags when accessing metadataAndrey Konovalov2020-12-093-15/+20
| * kasan, arm64: print report from tag fault handlerAndrey Konovalov2020-12-092-3/+22
| * kasan, arm64: implement HW_TAGS runtimeAndrey Konovalov2020-12-0914-26/+187
| * kasan, arm64: expand CONFIG_KASAN checksAndrey Konovalov2020-12-0916-25/+36
| * kasan, x86, s390: update undef CONFIG_KASANAndrey Konovalov2020-12-092-0/+2
| * kasan: define KASAN_GRANULE_SIZE for HW_TAGSAndrey Konovalov2020-12-091-0/+6
| * arm64: kasan: add arch layer for memory tagging helpersAndrey Konovalov2020-12-092-0/+35
| * arm64: kasan: align allocations for HW_TAGSAndrey Konovalov2020-12-091-0/+3