lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YS8eLmLdB7a9WLGd@gmail.com>
Date:   Wed, 1 Sep 2021 08:31:10 +0200
From:   Ingo Molnar <mingo@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org,
        Peter Zijlstra <peterz@...radead.org>,
        "Paul E. McKenney" <paulmck@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Andrew Morton <akpm@...ux-foundation.org>
Subject: [GIT PULL] locking/debug updates for v5.15

Linus,

Please pull the latest locking/debug git tree from:

   git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git locking-debug-2021-09-01

   # HEAD: 4812c9111220b0af00f7a436cc02ffaed289962c Merge branch 'lkmm' of git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu into locking/debug

LKMM updates:

 - Update documentation and code example

KCSAN updates:

 - Introduce CONFIG_KCSAN_STRICT (which RCU uses)
 - Optimize use of get_ctx() by kcsan_found_watchpoint()
 - Rework atomic.h into permissive.h
 - Add the ability to ignore writes that change only one bit of a given data-racy variable.
 - Improve comments

 Thanks,

	Ingo

------------------>
Manfred Spraul (1):
      tools/memory-model: Heuristics using data_race() must handle all values

Marco Elver (8):
      kcsan: Improve some Kconfig comments
      kcsan: Remove CONFIG_KCSAN_DEBUG
      kcsan: Introduce CONFIG_KCSAN_STRICT
      kcsan: Reduce get_ctx() uses in kcsan_found_watchpoint()
      kcsan: Rework atomic.h into permissive.h
      kcsan: Print if strict or non-strict during init
      kcsan: permissive: Ignore data-racy 1-bit value changes
      kcsan: Make strict mode imply interruptible watchers

Paul E. McKenney (3):
      tools/memory-model: Make read_foo_diagnostic() more clearly diagnostic
      tools/memory-model: Add example for heuristic lockless reads
      tools/memory-model: Document data_race(READ_ONCE())


 Documentation/dev-tools/kcsan.rst                  |  12 ++
 kernel/kcsan/atomic.h                              |  23 ----
 kernel/kcsan/core.c                                |  77 +++++++----
 kernel/kcsan/kcsan_test.c                          |  32 +++++
 kernel/kcsan/permissive.h                          |  94 +++++++++++++
 lib/Kconfig.kcsan                                  |  42 ++++--
 .../memory-model/Documentation/access-marking.txt  | 151 ++++++++++++++++++---
 7 files changed, 352 insertions(+), 79 deletions(-)
 delete mode 100644 kernel/kcsan/atomic.h
 create mode 100644 kernel/kcsan/permissive.h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ