lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <YRyrEQt52d0kaxQI@gmail.com>
Date:   Wed, 18 Aug 2021 08:39:13 +0200
From:   Ingo Molnar <mingo@...nel.org>
To:     "Paul E. McKenney" <paulmck@...nel.org>
Cc:     elver@...gle.com, mark.rutland@....com, tglx@...utronix.de,
        linux-kernel@...r.kernel.org, kasan-dev@...glegroups.com,
        kernel-team@...com, Peter Zijlstra <peterz@...radead.org>
Subject: Re: [GIT PULL kcsan] KCSAN commits for v5.15


* Paul E. McKenney <paulmck@...nel.org> wrote:

> Hello, Ingo,
> 
> This pull request contains updates for the Kernel concurrency sanitizer
> (KCSAN).
> 
> These updates improve comments, introduce CONFIG_KCSAN_STRICT (which RCU
> uses), optimize use of get_ctx() by kcsan_found_watchpoint(), rework
> atomic.h into permissive.h, and add the ability to ignore writes that
> change only one bit of a given data-racy variable.
> 
> These updates have been posted on LKML:
> 
> https://lore.kernel.org/lkml/20210721210726.GA828672@paulmck-ThinkPad-P17-Gen-1/
> 
> These changes are based on v5.14-rc2, have been exposed to -next and to
> kbuild test robot, and are available in the Git repository at:
> 
>   git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu.git kcsan
> 
> for you to fetch changes up to e04938042d77addc7f41d983aebea125cddbed33:
> 
>   kcsan: Make strict mode imply interruptible watchers (2021-07-20 13:49:44 -0700)
> 
> ----------------------------------------------------------------
> Marco Elver (8):
>       kcsan: Improve some Kconfig comments
>       kcsan: Remove CONFIG_KCSAN_DEBUG
>       kcsan: Introduce CONFIG_KCSAN_STRICT
>       kcsan: Reduce get_ctx() uses in kcsan_found_watchpoint()
>       kcsan: Rework atomic.h into permissive.h
>       kcsan: Print if strict or non-strict during init
>       kcsan: permissive: Ignore data-racy 1-bit value changes
>       kcsan: Make strict mode imply interruptible watchers
> 
>  Documentation/dev-tools/kcsan.rst | 12 +++++
>  kernel/kcsan/atomic.h             | 23 ----------
>  kernel/kcsan/core.c               | 77 ++++++++++++++++++++------------
>  kernel/kcsan/kcsan_test.c         | 32 +++++++++++++
>  kernel/kcsan/permissive.h         | 94 +++++++++++++++++++++++++++++++++++++++
>  lib/Kconfig.kcsan                 | 42 ++++++++++++-----
>  6 files changed, 217 insertions(+), 63 deletions(-)
>  delete mode 100644 kernel/kcsan/atomic.h
>  create mode 100644 kernel/kcsan/permissive.h

Pulled into tip:locking/debug, thanks a lot Paul!

	Ingo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ