From: "Jason A. Donenfeld" Subject: Re: [PATCH v5 01/13] random: invalidate batched entropy after crng init Date: Thu, 15 Jun 2017 00:33:12 +0200 Message-ID: References: <20170607232607.26870-1-Jason@zx2c4.com> <20170607232607.26870-2-Jason@zx2c4.com> <20170614192838.3jz4sxpcuhxygx4z@breakpoint.cc> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Cc: "Theodore Ts'o" , Linux Crypto Mailing List , LKML , kernel-hardening@lists.openwall.com, Greg Kroah-Hartman , Eric Biggers , Linus Torvalds , David Miller , tglx@breakpoint.cc To: Sebastian Andrzej Siewior Return-path: Received: from frisell.zx2c4.com ([192.95.5.64]:38907 "EHLO frisell.zx2c4.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752628AbdFNWdV (ORCPT ); Wed, 14 Jun 2017 18:33:21 -0400 In-Reply-To: <20170614192838.3jz4sxpcuhxygx4z@breakpoint.cc> Sender: linux-crypto-owner@vger.kernel.org List-ID: There's a potential race that I fixed in my v5 of that patch set, but Ted only took v4, and for whatever reason has been to busy to submit the additional patch I already posted showing the diff between v4&v5. Hopefully he actually gets around to it and sends this for the next rc. Here it is: https://patchwork.kernel.org/patch/9774563/