Re: [PATCH] random: wait for system_wq before pushing entropy into output pools

2014-11-20 Thread Konstantin Khlebnikov
kasan splash and kernel oops, just for the record. [ 105.538000] == [ 105.538000] BUG: AddressSanitizer: user-memory-access on address 100 [ 105.538000] Read of size 4 by thread T1: [ 105.538000] CPU: 0 PID: 1 Comm: swapper/0

[PATCH] random: wait for system_wq before pushing entropy into output pools

2014-11-20 Thread Konstantin Khlebnikov
First prototype of tool which injects random delays in random places (implemented on top of kernel address sanitizer by Andrey Ryabinin) have caught race right at the first try. credit_entropy_bits() schedules work for pushing entropy from one pool into another too early, when system_wq isn't yet

[PATCH] random: wait for system_wq before pushing entropy into output pools

2014-11-20 Thread Konstantin Khlebnikov
First prototype of tool which injects random delays in random places (implemented on top of kernel address sanitizer by Andrey Ryabinin) have caught race right at the first try. credit_entropy_bits() schedules work for pushing entropy from one pool into another too early, when system_wq isn't yet

Re: [PATCH] random: wait for system_wq before pushing entropy into output pools

2014-11-20 Thread Konstantin Khlebnikov
kasan splash and kernel oops, just for the record. [ 105.538000] == [ 105.538000] BUG: AddressSanitizer: user-memory-access on address 100 [ 105.538000] Read of size 4 by thread T1: [ 105.538000] CPU: 0 PID: 1 Comm: swapper/0