Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752440AbdHPXPE (ORCPT ); Wed, 16 Aug 2017 19:15:04 -0400 Received: from mail-qt0-f169.google.com ([209.85.216.169]:35835 "EHLO mail-qt0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752353AbdHPXPD (ORCPT ); Wed, 16 Aug 2017 19:15:03 -0400 From: Laura Abbott To: Kees Cook Cc: Laura Abbott , kernel-hardening@lists.openwall.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Andrew Morton , Daniel Micay Subject: [PATCHv3 0/2] Command line randomness Date: Wed, 16 Aug 2017 16:14:56 -0700 Message-Id: <20170816231458.2299-1-labbott@redhat.com> X-Mailer: git-send-email 2.13.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 488 Lines: 18 Hi, This is v3 of the series to add the kernel command line as a source of randomness. The main change from v2 is to correctly place the command line randomness _before_ the stack canary initialization so the canary can take advantage of that. Daniel Micay (1): extract early boot entropy from the passed cmdline Laura Abbott (1): init: Move stack canary initialization after setup_arch init/main.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) -- 2.13.0