The patch titled Subject: fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix has been added to the -mm mm-nonmm-unstable branch. Its filename is fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix.patch This patch will shortly appear at https://git.kernel.org/pub/scm/linux/kernel/git/akpm/25-new.git/tree/patches/fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix.patch This patch will later appear in the mm-nonmm-unstable branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next via the mm-everything branch at git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm and is updated there every 2-3 working days ------------------------------------------------------ From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Subject: fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix Date: Mon Dec 9 07:12:31 PM PST 2024 tweak and reflow comment Cc: Akinobu Mita <akinobu.mita@xxxxxxxxx> Cc: Masami Hiramatsu <mhiramat@xxxxxxxxxx> Cc: Peter Zijlstra <peterz@xxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- lib/fault-inject.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/lib/fault-inject.c~fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix +++ a/lib/fault-inject.c @@ -13,8 +13,8 @@ #include <linux/fault-inject.h> /* - * The should_fail() use prandom instead of the normal Linux RNG since they don't - * need cryptographically secure random numbers. + * The should_fail() functions use prandom instead of the normal Linux RNG + * since they don't need cryptographically secure random numbers. */ static DEFINE_PER_CPU(struct rnd_state, fault_rnd_state); _ Patches currently in -mm which might be from akpm@xxxxxxxxxxxxxxxxxxxx are mm-vmscan-account-for-free-pages-to-prevent-infinite-loop-in-throttle_direct_reclaim-checkpatch-fixes.patch mm-swap_cgroup-allocate-swap_cgroup-map-using-vcalloc-fix.patch mm-page_alloc-add-some-detailed-comments-in-can_steal_fallback-fix.patch mm-introduce-mmap_lock_speculate_try_beginretry-fix.patch mm-damon-tests-vaddr-kunith-reduce-stack-consumption.patch xarray-port-tests-to-kunit-fix.patch fault-inject-use-prandom-where-cryptographically-secure-randomness-is-not-needed-fix.patch