lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Wed, 3 Mar 2021 16:40:22 -0800
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     linux-kernel@...r.kernel.org, kasan-dev@...glegroups.com,
        kernel-team@...com, mingo@...nel.org
Cc:     elver@...gle.com, andreyknvl@...gle.com, glider@...gle.com,
        dvyukov@...gle.com, cai@....pw, boqun.feng@...il.com
Subject: [PATCH kcsan 0/4] KCSAN updates for v5.13

Hello!

This series contains KCSAN updates:

1.	kcsan, debugfs: Move debugfs file creation out of early init,
	courtesy of Marco Elver.

2.	Make test follow KUnit style recommendations, courtesy of
	Marco Elver.

3.	Switch to KUNIT_CASE_PARAM for parameterized tests, courtesy of
	Marco Elver.

4.	Add missing license and copyright headers, courtesy of Marco
	Elver.

						Thanx, Paul

------------------------------------------------------------------------

 Documentation/dev-tools/kcsan.rst |    3 
 include/linux/kcsan-checks.h      |    6 +
 include/linux/kcsan.h             |    7 ++
 kernel/kcsan/Makefile             |    4 -
 kernel/kcsan/atomic.h             |    5 +
 kernel/kcsan/core.c               |    7 +-
 kernel/kcsan/debugfs.c            |    9 ++
 kernel/kcsan/encoding.h           |    5 +
 kernel/kcsan/kcsan.h              |    8 --
 kernel/kcsan/kcsan_test.c         |  118 +++++++++++++++++---------------------
 kernel/kcsan/report.c             |    5 +
 kernel/kcsan/selftest.c           |    5 +
 lib/Kconfig.kcsan                 |    5 -
 13 files changed, 111 insertions(+), 76 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ