lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sun, 22 Nov 2020 23:10:40 +0100
From:   Sam Ravnborg <>
To:     James Bottomley <>
Cc:     Kees Cook <>,
        Jakub Kicinski <>,,,,,,,,,
        Nathan Chancellor <>,,,,,,,,,,,,,,,,
        Nick Desaulniers <>,,,,,,,,,,,,,
        Miguel Ojeda <>,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
        "Gustavo A. R. Silva" <>,,,,,,,
        Joe Perches <>,,
Subject: Re: [PATCH 000/141] Fix fall-through warnings for Clang

Hi James.

> > > If none of the 140 patches here fix a real bug, and there is no
> > > change to machine code then it sounds to me like a W=2 kind of a
> > > warning.
> > 
> > FWIW, this series has found at least one bug so far:
> >
> Well, it's a problem in an error leg, sure, but it's not a really
> compelling reason for a 141 patch series, is it?  All that fixing this
> error will do is get the driver to print "oh dear there's a problem"
> under four more conditions than it previously did.

You are asking the wrong question here.

Yuo should ask  how many hours could have been saved by all the bugs
people have been fighting with and then fixed *before* the code
hit the kernel at all.

My personal experience is that I, more than once, have had errors
related to a missing break in my code. So this warnings is IMO a win.

And if we are only ~100 patches to have it globally enabled then it is a
no-brainer in my book.


Powered by blists - more mailing lists