lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080430123536.GD30735@elte.hu>
Date:	Wed, 30 Apr 2008 14:35:36 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	Björn Steinbrink <B.Steinbrink@....de>
Cc:	Al Viro <viro@...IV.linux.org.uk>,
	Harvey Harrison <harvey.harrison@...il.com>,
	Thomas Gleixner <tglx@...utronix.de>,
	"H. Peter Anvin" <hpa@...or.com>,
	LKML <linux-kernel@...r.kernel.org>,
	"Pallipadi, Venkatesh" <venkatesh.pallipadi@...el.com>
Subject: Re: [PATCH] x86: !x & y typo in mtrr code


* Björn Steinbrink <B.Steinbrink@....de> wrote:

> On 2008.04.30 11:32:33 +0200, Ingo Molnar wrote:
> > Automating Sparse runs so that it can become part of our daily 
> > patch-flow is _not_ trivial and it's not just a matter of typing 
> > make C=1. Thomas is working on integrating Sparse delta analysis 
> > into our daily patch workflow nevertheless.
> 
> Who said daily? More often can be better, but just before the pull 
> request is still better than nothing. [...]

Suffice to say that the number of large subsystems that actually run 
Sparse before each and every pull request is extremely low - this simply 
matches the practical difficulties involved.

You are suggesting ad-hoc solutions without having tried it all 
yourself. And i'd very much agree with doing an upstream kernel Sparse 
sweep shortly before the final release. Do you volunteer for that?

We for one simply concentrate on the the things that we think makes it 
more likely to find bugs. For example we build and boot x86.git with 
many different configs before every pull request. In practice that 
catches far more tester-critical bugs than Sparse - and we know that 
simply from the fact because we use both methods and have a good 
comparison of the results. We also work on automating Sparse checks in 
the future but as i said it, it's not easy.

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ