Patch Series

Subject Compiler-Based Context- and Locking-Analysis
Author elver@google.com
Date 2025-12-19 15:39:50 +0000 UTC
Version 5
Cc arnd@arndb.de boqun.feng@gmail.com bvanassche@acm.org corbet@lwn.net davem@davemloft.net dvyukov@google.com edumazet@google.com elver@google.com frederic@kernel.org glider@google.com gregkh@linuxfoundation.org hch@lst.de herbert@gondor.apana.org.au irogers@google.com jannh@google.com joelagnelf@nvidia.com johannes.berg@intel.com johannes@sipsolutions.net josh@joshtriplett.org justinstitt@google.com kasan-dev@googlegroups.com kees@kernel.org linux-crypto@vger.kernel.org linux-doc@vger.kernel.org linux-kbuild@vger.kernel.org linux-kernel@vger.kernel.org linux-mm@kvack.org linux-security-module@vger.kernel.org linux-sparse@vger.kernel.org linux-wireless@vger.kernel.org lkp@intel.com llvm@lists.linux.dev longman@redhat.com luc.vanoostenryck@gmail.com lukas.bulwahn@gmail.com mark.rutland@arm.com mathieu.desnoyers@efficios.com mingo@kernel.org mingo@redhat.com nathan@kernel.org neeraj.upadhyay@kernel.org nick.desaulniers@gmail.com ojeda@kernel.org paulmck@kernel.org penguin-kernel@i-love.sakura.ne.jp peterz@infradead.org rcu@vger.kernel.org rostedt@goodmis.org sparse@chrisli.org takedakn@nttdata.co.jp tglx@linutronix.de tgraf@suug.ch urezki@gmail.com

Patches (36)

Name Content [All]
[PATCH v5 01/36] compiler_types: Move lock checking attributes to compiler-context-analysis.h [Body]
[PATCH v5 02/36] compiler-context-analysis: Add infrastructure for Context Analysis with Clang [Body]
[PATCH v5 03/36] compiler-context-analysis: Add test stub [Body]
[PATCH v5 04/36] Documentation: Add documentation for Compiler-Based Context Analysis [Body]
[PATCH v5 05/36] checkpatch: Warn about context_unsafe() without comment [Body]
[PATCH v5 06/36] cleanup: Basic compatibility with context analysis [Body]
[PATCH v5 07/36] lockdep: Annotate lockdep assertions for context analysis [Body]
[PATCH v5 08/36] locking/rwlock, spinlock: Support Clang's context analysis [Body]
[PATCH v5 09/36] compiler-context-analysis: Change __cond_acquires to take return value [Body]
[PATCH v5 10/36] locking/mutex: Support Clang's context analysis [Body]
[PATCH v5 11/36] locking/seqlock: Support Clang's context analysis [Body]
[PATCH v5 12/36] bit_spinlock: Include missing <asm/processor.h> [Body]
[PATCH v5 13/36] bit_spinlock: Support Clang's context analysis [Body]
[PATCH v5 14/36] rcu: Support Clang's context analysis [Body]
[PATCH v5 15/36] srcu: Support Clang's context analysis [Body]
[PATCH v5 16/36] kref: Add context-analysis annotations [Body]
[PATCH v5 17/36] locking/rwsem: Support Clang's context analysis [Body]
[PATCH v5 18/36] locking/local_lock: Include missing headers [Body]
[PATCH v5 19/36] locking/local_lock: Support Clang's context analysis [Body]
[PATCH v5 20/36] locking/ww_mutex: Support Clang's context analysis [Body]
[PATCH v5 21/36] debugfs: Make debugfs_cancellation a context lock struct [Body]
[PATCH v5 22/36] um: Fix incorrect __acquires/__releases annotations [Body]
[PATCH v5 23/36] compiler-context-analysis: Remove Sparse support [Body]
[PATCH v5 24/36] compiler-context-analysis: Remove __cond_lock() function-like helper [Body]
[PATCH v5 25/36] compiler-context-analysis: Introduce header suppressions [Body]
[PATCH v5 26/36] compiler: Let data_race() imply disabled context analysis [Body]
[PATCH v5 27/36] MAINTAINERS: Add entry for Context Analysis [Body]
[PATCH v5 28/36] kfence: Enable context analysis [Body]
[PATCH v5 29/36] kcov: Enable context analysis [Body]
[PATCH v5 30/36] kcsan: Enable context analysis [Body]
[PATCH v5 31/36] stackdepot: Enable context analysis [Body]
[PATCH v5 32/36] rhashtable: Enable context analysis [Body]
[PATCH v5 33/36] printk: Move locking annotation to printk.c [Body]
[PATCH v5 34/36] security/tomoyo: Enable context analysis [Body]
[PATCH v5 35/36] crypto: Enable context analysis [Body]
[PATCH v5 36/36] sched: Enable context analysis for core.c and fair.c [Body]

Session 2025-12-19

ID (for dev) bcb1aedc-38b0-4213-a7e0-2adb57a1014c
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base c642ecda5b136882e518d8303863473c0d21ab2f [Config] passed [Log]
[KASAN] Boot test: Base c642ecda5b136882e518d8303863473c0d21ab2f [Config] passed [Log]
[KASAN] Build Patched c642ecda5b136882e518d8303863473c0d21ab2f [Config] [patched] passed [Log]
[KASAN] Boot test: Patched c642ecda5b136882e518d8303863473c0d21ab2f [Config] [patched] passed [Log]
[KASAN] Fuzzing c642ecda5b136882e518d8303863473c0d21ab2f [Config] c642ecda5b136882e518d8303863473c0d21ab2f [Config] [patched] passed [Log] [Artifacts]