[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YkNP4mNOxA6pBqyi@mit.edu>
Date: Tue, 29 Mar 2022 14:28:50 -0400
From: "Theodore Ts'o" <tytso@....edu>
To: Michael Brooks <m@...etwater.ai>
Cc: Eric Biggers <ebiggers@...gle.com>,
Sasha Levin <sashal@...nel.org>, linux-kernel@...r.kernel.org,
stable@...r.kernel.org, "Jason A. Donenfeld" <Jason@...c4.com>,
Dominik Brodowski <linux@...inikbrodowski.net>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Jean-Philippe Aumasson <jeanphilippe.aumasson@...il.com>
Subject: Re: [PATCH AUTOSEL 5.17 16/43] random: use computational hash for
entropy extraction
On Tue, Mar 29, 2022 at 10:34:49AM -0700, Michael Brooks wrote:
> I agree with Ted, this patch is just to start the discussion on how
> we can safely remove these locks for the improvement of safety and
> security. Both boot and interrupt benchmarks stand to benefit from a
> patch like this, so it is worth a deep dive.
>
> Feedback welcome, I am always looking for ways I can be a better
> engineer, and a better hacker and a better person. And we are all here
> to make the very best kernel.
I think you're talking about a different patch than the one mentioned
in the subject line (which is upstream commit 6e8ec2552c7d, authored
by Jason)?
- Ted
Powered by blists - more mailing lists