public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [linux-next] automatic use of checkpatch.pl for security?
@ 2010-11-09 17:33 Kees Cook
  2010-11-09 17:44 ` David Daney
  0 siblings, 1 reply; 5+ messages in thread
From: Kees Cook @ 2010-11-09 17:33 UTC (permalink / raw)
  To: linux-kernel; +Cc: Andy Whitcroft

Hi,

In an effort to continue the constification work, it'd be nice to
not accidentally introduce regressions or add additional work. Since
checkpatch.pl already knows to warn about a lot of things including const
structures, it would be great to have all commits going through linux-next
(or something) have to pass at least a subset of checkpatch.pl's checks.

For example, Lionel Debroux pointed out to me that looking at the last
1000 commits, there are a lot of warnings, including things like:

WARNING: struct dma_map_ops should normally be const
#499: FILE: arch/mips/mm/dma-default.c:301:
+static struct dma_map_ops mips_default_dma_map_ops = {

Can we add some kind of automatic checking to actually give checkpatch.pl
some real teeth for at least some of its checks?

-Kees

-- 
Kees Cook
Ubuntu Security Team

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2010-11-10 18:28 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-11-09 17:33 [linux-next] automatic use of checkpatch.pl for security? Kees Cook
2010-11-09 17:44 ` David Daney
2010-11-09 17:59   ` Kees Cook
2010-11-09 20:49     ` Lionel Debroux
2010-11-10 18:28       ` Randy Dunlap

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox