lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20210511232324.GA2896130@paulmck-ThinkPad-P17-Gen-1>
Date:   Tue, 11 May 2021 16:23:24 -0700
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     linux-kernel@...r.kernel.org, kasan-dev@...glegroups.com,
        kernel-team@...com, mingo@...nel.org
Cc:     elver@...gle.com, andreyknvl@...gle.com, glider@...gle.com,
        dvyukov@...gle.com, cai@....pw, boqun.feng@...il.com
Subject: [PATCH kcsan 0/10] KCSAN updates for v5.14

Hello!

This series provides KCSAN updates.

1.	Add pointer to access-marking.txt to data_race() bullet.

2.	Simplify value change detection, courtesy of Mark Rutland.

3.	Distinguish kcsan_report() calls, courtesy of Mark Rutland.

4.	Refactor passing watchpoint/other_info, courtesy of Mark Rutland.

5.	Fold panic() call into print_report(), courtesy of Mark Rutland.

6.	Refactor access_info initialization, courtesy of Mark Rutland.

7.	Remove reporting indirection, courtesy of Mark Rutland.

8.	Remove kcsan_report_type, courtesy of Mark Rutland.

9.	Report observed value changes, courtesy of Mark Rutland.

10.	Document "value changed" line, courtesy of Marco Elver.

						Thanx, Paul

------------------------------------------------------------------------

 Documentation/dev-tools/kcsan.rst   |   88 +++++-------
 b/Documentation/dev-tools/kcsan.rst |    4 
 b/kernel/kcsan/core.c               |   40 ++---
 b/kernel/kcsan/kcsan.h              |   10 -
 b/kernel/kcsan/report.c             |   26 +++
 kernel/kcsan/core.c                 |   17 +-
 kernel/kcsan/kcsan.h                |   39 ++---
 kernel/kcsan/report.c               |  251 +++++++++++++++++-------------------
 8 files changed, 226 insertions(+), 249 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ