lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251118184558.4d28aae2@kernel.org>
Date: Tue, 18 Nov 2025 18:45:58 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: Hangbin Liu <liuhangbin@...il.com>
Cc: Matthieu Baerts <matttbe@...nel.org>, netdev@...r.kernel.org, Donald
 Hunter <donald.hunter@...il.com>, "David S. Miller" <davem@...emloft.net>,
 Eric Dumazet <edumazet@...gle.com>, Paolo Abeni <pabeni@...hat.com>, Simon
 Horman <horms@...nel.org>, Jan Stancek <jstancek@...hat.com>,
 Asbjørn Sloth Tønnesen <ast@...erby.net>,
 Stanislav Fomichev <sdf@...ichev.me>, Ido Schimmel <idosch@...dia.com>,
 Guillaume Nault <gnault@...hat.com>, Sabrina Dubroca <sd@...asysnail.net>,
 Petr Machata <petrm@...dia.com>
Subject: Re: [PATCHv5 net-next 3/3] tools: ynl: add YNL test framework

On Tue, 18 Nov 2025 02:43:59 +0000 Hangbin Liu wrote:
> > How did you execute shellcheck?
> > 
> > If I'm not mistaken, you are supposed to execute it from the same directory, and with -x:
> > 
> >   cd "$(dirname "${script}")"
> >   shellcheck -x "$(basename "${script}")"  
> 
> Ah, I forgot to add the "-x" option... I will fix the comment in future test
> case update.

I applied the first two patches of the series, please respin this one.
TBH I'd like to check if this all works in NIPA but probably won't have
time to set up a new worker until the weekend. I suspect I'll need
to touch up the vng wrappers since this is not true ksft TARGET.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ