lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 17 Nov 2016 12:55:15 +0100
From:   Paul Bolle <pebolle@...cali.nl>
To:     Valentin Rothberg <valentinrothberg@...il.com>
Cc:     smohammed@...dia.com, treding@...dia.com,
        Michal Marek <mmarek@...e.cz>, linux-kernel@...r.kernel.org
Subject: Re: i2c: undefined option I2C_ALGO_BUSCLEAR

Hi Valentin,

On Thu, 2016-11-17 at 12:33 +0100, Valentin Rothberg wrote:
> I tested your patch and it works properly for me.  It even still applies
> on linux-next.

Cool.

(We should probably compile a list of current invalid selects somewhere
publicly, and team up to submit patches for the low hanging fruit (ie, obvious
typos) and for the arches that actually matter before I resubmit.)

> Would it be possible to extend your patch to also check
> symbols in other statements (depends on, if, etc.)?

No. Depending on an unknown symbol is common and correct. Think
    depends on SOME_OBSCURE_ARM_BOARD

somewhere in drivers. Only arm builds will ever know about the
SOME_OBSCURE_ARM_BOARD symbol.

What could be done is starting any "make *config" target with a treewide pass
over all Kconfig files to collect all valid symbols and so spot typos and
other obviously incorrect. The example that comes to mind is
    depends on SH

that I have spotted a few times in the past years. But this treewide pass will
incur some runtime cost and might not be easy to implement cleanly. Perhaps
we're better of with using your script for that.

Thanks,


Paul Bolle

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ