From: "H. Peter Anvin" Subject: Re: [PATCH -v5] random: introduce getrandom(2) system call Date: Thu, 24 Jul 2014 16:27:54 -0700 Message-ID: <53D1967A.3060609@zytor.com> References: <1406212287-9855-1-git-send-email-tytso@mit.edu> <20140724151814.GE32421@khazad-dum.debian.net> <20140724190206.GL6673@thunk.org> <20140724203019.GA20737@khazad-dum.debian.net> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Cc: "Theodore Ts'o" , Linux Kernel Developers List , Linux API , linux-crypto@vger.kernel.org To: Andy Lutomirski , Henrique de Moraes Holschuh Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org On 07/24/2014 01:54 PM, Andy Lutomirski wrote: > > Or that someone writes userspace code that gets -EPERM/-EACCESS on > getrandom with GRND_RANDOM and falls back to something worse than > getrandom w/o GRND_RANDOM. > -ENXIO? -hpa