Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp520548rwr; Wed, 26 Apr 2023 02:38:36 -0700 (PDT) X-Google-Smtp-Source: AKy350YCGSiUfpY1sRCQs4mjfYpf4NxJ7xGtLvzWnvZbxk63GBK03Zgd5TD5Z1XVPx25+IqqKJ7y X-Received: by 2002:a05:6a20:7f99:b0:f3:d92:a209 with SMTP id d25-20020a056a207f9900b000f30d92a209mr17117439pzj.0.1682501915998; Wed, 26 Apr 2023 02:38:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682501915; cv=none; d=google.com; s=arc-20160816; b=kFp8rdz6CIRsc1HwHlOU/3dvsYdSvIHPF46z5LSn8qcGLOJyUWongUzteuPEPoQp2f Ft33U4WT7xpskoVu1/mLpjPczvscLI9Ktfaq1Lg1M8INjqLA9INYaAXFrRwoUm/Y64qT P6IL/SlkCrcsiMWkhvUZTRv8wuc6u2fCQB8CKrVMD5QtQmSuYjpCYVg6FL44+4XCb20W RELeV1dzjdWWi+iMagPsPDPdQx+/AyjDWbqgWPggvVw+Tj77CySZlsUZMDlJ78uP1oKo 2zbqNsg9XR/V9d/2E65SjNjCkiVL43PS3vshFYPh40Or7nn7wEflLn4YA9IzqsfPqChR xHrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=GmsYeOoxUn9L7sBnEaQ+UMEzt8faATycaaMKxVPidDs=; b=LLoyXiCUCaxd3MLFd5MP0iiCgbaG6EdQKmJKxlN/RPcQe7ZhSeR/LiqytNvG66exWy 4SRDSkRLPFUsA6HkUR7Q0k0GYfuFC4E+5kZXQZbv3OQN/ruLe0VU7nZ7qGalaKKXViiS 4aBjd8zCh0O15GZXIfZ+srxdfAAw2/ZTI+tWsdwhx9+fEpruKIcM3WkfPTNbsFr+y8md VdC6nK0XdOmqHhGtbSq3xxQ+pVUsglBDSDzmZNo+8Y5xXVLWO6DuTuBW8+vt/TbJfNOd ZmABB4MYtQnjcwj24gk4+K0k+ClAtAt1F1AFbiSmg8W3HIw5kVYkjjr8z2pit9ObH6AC 5tng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f16-20020a63f110000000b0050aea0375afsi12185787pgi.765.2023.04.26.02.38.17; Wed, 26 Apr 2023 02:38:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239757AbjDZJ1a (ORCPT + 99 others); Wed, 26 Apr 2023 05:27:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51506 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240136AbjDZJ1C (ORCPT ); Wed, 26 Apr 2023 05:27:02 -0400 Received: from 167-179-156-38.a7b39c.syd.nbn.aussiebb.net (167-179-156-38.a7b39c.syd.nbn.aussiebb.net [167.179.156.38]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9585B3598 for ; Wed, 26 Apr 2023 02:26:53 -0700 (PDT) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1prbQ8-002Wa4-TT; Wed, 26 Apr 2023 17:26:43 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Wed, 26 Apr 2023 17:26:42 +0800 Date: Wed, 26 Apr 2023 17:26:42 +0800 From: Herbert Xu To: cuigaosheng Cc: davem@davemloft.net, linux-crypto@vger.kernel.org Subject: Re: [PATCH -next] crypto: jitter - change module_init(jent_mod_init) to subsys_initcall(jent_mod_init) Message-ID: References: <20230425125709.39470-1-cuigaosheng1@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=2.7 required=5.0 tests=BAYES_00,HELO_DYNAMIC_IPADDR2, RDNS_DYNAMIC,SPF_HELO_NONE,SPF_PASS,TVD_RCVD_IP,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Apr 26, 2023 at 05:18:11PM +0800, cuigaosheng wrote: > Thanks for taking time to review this patch. > > We have not used subsystem initialisation ordering to guarantee the > order of registration since commit adad556efcdd ("crypto: api - Fix > built-in testing dependency failures"),but this patch is not a bugfix, > it's not merged into the earlier stable branch. You're going about this backwards. We don't apply patches to the mainline kernel to fix problems that only exist in an older version. If you have a problem with an older kernel then you should fix it there. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt