Patch Series

Subject Use killable vma write locking in most places
Author surenb@google.com
Date 2026-03-26 08:08:31 +0000 UTC
Version
Cc agordeev@linux.ibm.com akpm@linux-foundation.org apopple@nvidia.com baohua@kernel.org baolin.wang@linux.alibaba.com borntraeger@linux.ibm.com byungchul@sk.com chleroy@kernel.org david@kernel.org dev.jain@arm.com frankja@linux.ibm.com gerald.schaefer@linux.ibm.com gor@linux.ibm.com gourry@gourry.net hca@linux.ibm.com imbrenda@linux.ibm.com jannh@google.com joshua.hahnjy@gmail.com kees@kernel.org kvm@vger.kernel.org lance.yang@linux.dev liam.howlett@oracle.com linux-kernel@vger.kernel.org linux-mm@kvack.org linux-s390@vger.kernel.org linuxppc-dev@lists.ozlabs.org ljs@kernel.org lorenzo.stoakes@oracle.com maddy@linux.ibm.com matthew.brost@intel.com mhocko@suse.com mpe@ellerman.id.au npache@redhat.com npiggin@gmail.com pfalcato@suse.de rakie.kim@sk.com ritesh.list@gmail.com rppt@kernel.org ryan.roberts@arm.com surenb@google.com svens@linux.ibm.com vbabka@suse.cz willy@infradead.org ying.huang@linux.alibaba.com ziy@nvidia.com

Patches (6)

Name Content [All]
[PATCH v5 1/6] mm/vma: cleanup error handling path in vma_expand() [Body]
[PATCH v5 2/6] mm: use vma_start_write_killable() in mm syscalls [Body]
[PATCH v5 3/6] mm/khugepaged: use vma_start_write_killable() in collapse_huge_page() [Body]
[PATCH v5 4/6] mm/vma: use vma_start_write_killable() in vma operations [Body]
[PATCH v5 5/6] mm: use vma_start_write_killable() in process_vma_walk_lock() [Body]
[PATCH v5 6/6] KVM: PPC: use vma_start_write_killable() in kvmppc_memslot_page_merge() [Body]

Session 2026-03-26

ID (for dev) 6b181b0d-fb3e-4b32-9dd3-13e724aef418
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 813e1489922365d880afbe91b37d110918e3f780 [Config] passed [Log]
[KASAN] Boot test: Base 813e1489922365d880afbe91b37d110918e3f780 [Config] passed [Log]
[KASAN] Build Patched 813e1489922365d880afbe91b37d110918e3f780 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 813e1489922365d880afbe91b37d110918e3f780 [Config] [patched] passed [Log]
[KASAN] Fuzz 813e1489922365d880afbe91b37d110918e3f780 [Config] 813e1489922365d880afbe91b37d110918e3f780 [Config] [patched] passed [Log] [Artifacts]