YoVDO

Using Coccinelle to Detect and Fix Nested Execution Context Violations

Offered By: Linux Foundation via YouTube

Tags

Static Analysis Courses Code Quality Courses Mutex Courses Spinlocks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to utilize Coccinelle, a powerful static analysis tool, to identify and resolve nested execution context violations in Linux kernel code. Explore techniques for detecting potential issues related to improper nesting of execution contexts, such as spinlocks, mutexes, and interrupt handlers. Gain insights into writing semantic patches that can automatically find and correct these violations, improving the reliability and performance of kernel code. Discover best practices for implementing Coccinelle-based checks in your development workflow to enhance code quality and prevent common pitfalls associated with nested execution contexts.

Syllabus

Julia Cartwright: Using coccinelle to detect (and fix) nested execution context violations


Taught by

Linux Foundation

Tags

Related Courses

Malware Analysis and Assembly Language Introduction
IBM via edX
Advanced Malware Analysis: Redux
Cybrary
Intro to Malware Analysis and Reverse Engineering
Cybrary
RIP : Rétro-Ingénierie de Programmes
Université de Lille via France Université Numerique
CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent