lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240822101430.GJ2164@kernel.org>
Date: Thu, 22 Aug 2024 11:14:30 +0100
From: Simon Horman <horms@...nel.org>
To: Dmitry Safonov <0x7f454c46@...il.com>
Cc: "David S. Miller" <davem@...emloft.net>,
	Eric Dumazet <edumazet@...gle.com>,
	Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>,
	Shuah Khan <shuah@...nel.org>,
	Mohammad Nassiri <mnassiri@...na.com>, netdev@...r.kernel.org,
	linux-kselftest@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH net-next v3 4/8] selftests/net: Open /proc/thread-self in
 open_netns()

On Wed, Aug 21, 2024 at 10:44:30PM +0100, Dmitry Safonov wrote:
> On Wed, 21 Aug 2024 at 20:11, Simon Horman <horms@...nel.org> wrote:
> >
> > On Thu, Aug 15, 2024 at 10:32:29PM +0100, Dmitry Safonov via B4 Relay wrote:
> > > From: Dmitry Safonov <0x7f454c46@...il.com>
> > >
> > > It turns to be that open_netns() is called rarely from the child-thread
> > > and more often from parent-thread. Yet, on initialization of kconfig
> > > checks, either of threads may reach kconfig_lock mutex first.
> > > VRF-related checks do create a temprary ksft-check VRF in
> >
> > nit: temporary
> >
> >      Flagged by checkpatch.pl --codespell
> 
> A-ha, b4 has this b4.prep-perpatch-check-cmd git setting:
> https://github.com/mricon/b4/blob/37811c93f50e70f325e45107a9a20ffc69f2f6dc/src/b4/ez.py#L1667C20-L1667C43
> 
> Going to set it and hopefully, it will help avoid spellings/typos in
> future, thanks!

--codespell is very handy for that :)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ