lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <e8e78f5e-748b-6db4-7abe-4ccbf70eaaf0@mojatatu.com> Date: Mon, 17 Jan 2022 10:29:02 -0500 From: Jamal Hadi Salim <jhs@...atatu.com> To: David Ahern <dsahern@...il.com>, Stephen Hemminger <stephen@...workplumber.org>, netdev@...r.kernel.org, victor@...atatu.com, Davide Caratti <dcaratti@...hat.com>, Marcelo Ricardo Leitner <marcelo.leitner@...il.com>, Vlad Buslov <vladbu@...dia.com> Subject: Re: [PATCH v2 iproute2-next 00/11] clang warning fixes On 2022-01-16 18:18, David Ahern wrote: > On 1/11/22 10:54 AM, Stephen Hemminger wrote: >> This patch set makes iproute2-next main branch compile without warnings >> on Clang 11 (and probably later versions). >> >> Still needs more testing before merge. There are likely to be some >> unnecessary output format changes from this. >> > > I think the tc patches are the only likely candidates. The > print_string_name_value conversion should be clean. > > Jamal: As I recall you have a test suite for tc. Can you test this set? We try to push, whenever we can, to kernel tdc tests. The Intel robot should catch issues based on what we have there. If we make part of the acceptance process (incumbent on people who create the patches) to run those tests it would help getting cleaner submissions. Not sure if we can have a bot doing this.. Punting to Victor(on Cc) to run the tests and double check if we have test cases that cover for these changes. cheers, jamal
Powered by blists - more mailing lists