<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>5eb39cde - kcsan: avoid passing -g for test</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#5eb39cde</link>
        <description>kcsan: avoid passing -g for testNathan reported that when building with GNU as and a version of clang thatdefaults to DWARF5, the assembler will complain with:  Error: non-constant .uleb128 is not supportedThis is because `-g` defaults to the compiler debug info default. If theassembler does not support some of the directives used, the above errorsoccur. To fix, remove the explicit passing of `-g`.All the test wants is that stack traces print valid function names, anddebug info is not required for that. (I currently cannot recall why Iadded the explicit `-g`.)Link: https://lkml.kernel.org/r/20230316224705.709984-2-elver@google.comFixes: 1fe84fd4a402 (&quot;kcsan: Add test suite&quot;)Signed-off-by: Marco Elver &lt;elver@google.com&gt;Reported-by: Nathan Chancellor &lt;nathan@kernel.org&gt;Cc: Alexander Potapenko &lt;glider@google.com&gt;Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt;Cc: &lt;stable@vger.kernel.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Thu, 16 Mar 2023 22:47:05 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>6fcd4267 - kernel: kcsan: kcsan_test: build without structleak plugin</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#6fcd4267</link>
        <description>kernel: kcsan: kcsan_test: build without structleak pluginBuilding kcsan_test with structleak plugin enabled makes the stack framesize to grow.kernel/kcsan/kcsan_test.c:704:1: error: the frame size of 3296 bytes is larger than 2048 bytes [-Werror=frame-larger-than=]Turn off the structleak plugin checks for kcsan_test.Link: https://lkml.kernel.org/r/20221128104358.2660634-1-anders.roxell@linaro.orgSigned-off-by: Anders Roxell &lt;anders.roxell@linaro.org&gt;Suggested-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Acked-by: Marco Elver &lt;elver@google.com&gt;Cc: Arnd Bergmann &lt;arnd@arndb.de&gt;Cc: David Gow &lt;davidgow@google.com&gt;Cc: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;Cc: Kees Cook &lt;keescook@chromium.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Mon, 28 Nov 2022 10:43:58 +0000</pubDate>
        <dc:creator>Anders Roxell &lt;anders.roxell@linaro.org&gt;</dc:creator>
    </item>
<item>
        <title>dd03762a - arm64: Enable KCSAN</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#dd03762a</link>
        <description>arm64: Enable KCSANThis patch enables KCSAN for arm64, with updates to build rulesto not use KCSAN for several incompatible compilation units.Recent GCC version(at least GCC10) made outline-atomics as thedefault option(unlike Clang), which will cause linker errorsfor kernel/kcsan/core.o. Disables the out-of-line atomics byno-outline-atomics to fix the linker errors.Meanwhile, as Mark said[1], some latent issues are needed to befixed which isn&apos;t just a KCSAN problem, we make the KCSAN dependson EXPERT for now.Tested selftest and kcsan_test(built with GCC11 and Clang 13),and all passed.[1] https://lkml.kernel.org/r/YadiUPpJ0gADbiHQ@FVFF77S0Q05NAcked-by: Marco Elver &lt;elver@google.com&gt; # kernel/kcsanTested-by: Joey Gouly &lt;joey.gouly@arm.com&gt;Signed-off-by: Kefeng Wang &lt;wangkefeng.wang@huawei.com&gt;Link: https://lore.kernel.org/r/20211211131734.126874-1-wangkefeng.wang@huawei.com[catalin.marinas@arm.com: added comment to justify EXPERT]Signed-off-by: Catalin Marinas &lt;catalin.marinas@arm.com&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Sat, 11 Dec 2021 13:17:34 +0000</pubDate>
        <dc:creator>Kefeng Wang &lt;wangkefeng.wang@huawei.com&gt;</dc:creator>
    </item>
<item>
        <title>71b0e3ae - kcsan: selftest: Add test case to check memory barrier instrumentation</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#71b0e3ae</link>
        <description>kcsan: selftest: Add test case to check memory barrier instrumentationMemory barrier instrumentation is crucial to avoid false positives. Toavoid surprises, run a simple test case in the boot-time selftest toensure memory barriers are still instrumented correctly.Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Tue, 30 Nov 2021 11:44:21 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>a146fed5 - kcsan: Make test follow KUnit style recommendations</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#a146fed5</link>
        <description>kcsan: Make test follow KUnit style recommendationsPer recently added KUnit style recommendations atDocumentation/dev-tools/kunit/style.rst, make the following changes tothe KCSAN test:	1. Rename &apos;kcsan-test.c&apos; to &apos;kcsan_test.c&apos;.	2. Rename suite name &apos;kcsan-test&apos; to &apos;kcsan&apos;.	3. Rename CONFIG_KCSAN_TEST to CONFIG_KCSAN_KUNIT_TEST and	   default to KUNIT_ALL_TESTS.Reviewed-by: David Gow &lt;davidgow@google.com&gt;Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Wed, 13 Jan 2021 16:05:56 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>61d56d7a - kcsan: Disable branch tracing in core runtime</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#61d56d7a</link>
        <description>kcsan: Disable branch tracing in core runtimeDisable branch tracing in core KCSAN runtime if branches are beingtraced (TRACE_BRANCH_PROFILING). This it to avoid its performanceimpact, but also avoid recursion in case KCSAN is enabled for the branchtracing runtime.The latter had already been a problem for KASAN:https://lore.kernel.org/lkml/CANpmjNOeXmD5E3O50Z3MjkiuCYaYOPyi+1rq=GZvEKwBvLR0Ug@mail.gmail.com/Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Thu, 18 Jun 2020 09:31:18 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>2839a232 - kcsan: Simplify compiler flags</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#2839a232</link>
        <description>kcsan: Simplify compiler flagsSimplify the set of compiler flags for the runtime by removing cc-optionfrom -fno-stack-protector, because all supported compilers support it.This saves us one compiler invocation during build.Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Thu, 18 Jun 2020 09:31:17 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>acfa087c - kcsan: Rename test.c to selftest.c</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#acfa087c</link>
        <description>kcsan: Rename test.c to selftest.cRename &apos;test.c&apos; to &apos;selftest.c&apos; to better reflect its purpose (Kconfigvariable and code inside already match this). This is to avoid confusionwith the test suite module in &apos;kcsan-test.c&apos;.No functional change.Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Tue, 16 Jun 2020 12:36:23 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>1fe84fd4 - kcsan: Add test suite</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#1fe84fd4</link>
        <description>kcsan: Add test suiteThis adds KCSAN test focusing on behaviour of the integrated runtime.Tests various race scenarios, and verifies the reports generated toconsole. Makes use of KUnit for test organization, and the Tortureframework for test thread control.Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Tue, 05 May 2020 18:28:21 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>f5d2313b - kcsan, trace: Make KCSAN compatible with tracing</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#f5d2313b</link>
        <description>kcsan, trace: Make KCSAN compatible with tracingPreviously the system would lock up if ftrace was enabled together withKCSAN. This is due to recursion on reporting if the tracer code isinstrumented with KCSAN.To avoid this for all types of tracing, disable KCSAN instrumentationfor all of kernel/trace.Furthermore, since KCSAN relies on udelay() to introduce delay, we haveto disable ftrace for udelay() (currently done for x86) in case KCSAN isused together with lockdep and ftrace. The reason is that it may corruptlockdep IRQ flags tracing state due to a peculiar case of recursion(details in Makefile comment).Reported-by: Qian Cai &lt;cai@lca.pw&gt;Tested-by: Qian Cai &lt;cai@lca.pw&gt;Acked-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Fri, 14 Feb 2020 21:10:35 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>d47715f5 - kcsan, ubsan: Make KCSAN+UBSAN work together</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#d47715f5</link>
        <description>kcsan, ubsan: Make KCSAN+UBSAN work togetherContext:http://lkml.kernel.org/r/fb7e25d8-aba4-3dcf-7761-cb7ecb3ebb71@infradead.orgReported-by: Randy Dunlap &lt;rdunlap@infradead.org&gt;Signed-off-by: Marco Elver &lt;elver@google.com&gt;Acked-by: Randy Dunlap &lt;rdunlap@infradead.org&gt; # build-testedSigned-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Tue, 19 Nov 2019 18:57:42 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>dfd402a4 - kcsan: Add Kernel Concurrency Sanitizer infrastructure</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/kcsan/Makefile#dfd402a4</link>
        <description>kcsan: Add Kernel Concurrency Sanitizer infrastructureKernel Concurrency Sanitizer (KCSAN) is a dynamic data-race detector forkernel space. KCSAN is a sampling watchpoint-based data-race detector.See the included Documentation/dev-tools/kcsan.rst for more details.This patch adds basic infrastructure, but does not yet enable KCSAN forany architecture.Signed-off-by: Marco Elver &lt;elver@google.com&gt;Acked-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/kcsan/Makefile</description>
        <pubDate>Thu, 14 Nov 2019 18:02:54 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
</channel>
</rss>
