lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.00.0904181715400.5780@bicker>
Date:	Sat, 18 Apr 2009 18:03:34 +0300 (EAT)
From:	Dan Carpenter <error27@...il.com>
To:	smatch-discuss@...ts.sf.net, linux-kernel@...r.kernel.org
Subject: smatch 1.52 released

Smatch is a static analysis tool.

It's looks for different bugs than sparse.  It's uses sparse as a C 
parser.  It probably can find more complicated bugs than Coccinelle but it 
doesn't fix them.

The repo is:  http://repo.or.cz/w/smatch.git/

I am going to be cycling in southern Africa for the next four months.  I 
will take an eee but will only have irregular internet access.

There have been many changes since 1.51:
  * There are no known crashing bugs.
  * It uses less memory.
  * It is faster.
  * Many of the checks have been improved.
  * It uses a more sophisticated system to represent possible variable 
    values internally.
  * There is a new dereferencing ERR_PTR() check.

One thing that's fairly cool is that Smatch v1.52 understands the 
following code.

    foo = down_trylock(&lock);
    if (foo < 0)            <- implies the lock was not aquired.
            return;
                            <- lock is held here.

Anyway, do email me if you have any questions or issues.  I will probably 
have internet access some days later on next week.

regards,
dan carpenter

http://bikesafari.net


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ