|
Message-ID: <20170608024512.vjmut7buvimilpfx@thunk.org> Date: Wed, 7 Jun 2017 22:45:12 -0400 From: Theodore Ts'o <tytso@....edu> To: "Jason A. Donenfeld" <Jason@...c4.com> Cc: Linux Crypto Mailing List <linux-crypto@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, kernel-hardening@...ts.openwall.com, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, David Miller <davem@...emloft.net>, Eric Biggers <ebiggers3@...il.com>, Ilya Dryomov <idryomov@...il.com>, "Yan, Zheng" <zyan@...hat.com>, Sage Weil <sage@...hat.com> Subject: Re: [PATCH v4 07/13] ceph: ensure RNG is seeded before using On Tue, Jun 06, 2017 at 07:47:58PM +0200, Jason A. Donenfeld wrote: > Ceph uses the RNG for various nonce generations, and it shouldn't accept > using bad randomness. So, we wait for the RNG to be properly seeded. We > do this by calling wait_for_random_bytes() in a function that is > certainly called in process context, early on, so that all subsequent > calls to get_random_bytes are necessarily acceptable. > > Signed-off-by: Jason A. Donenfeld <Jason@...c4.com> > Cc: Ilya Dryomov <idryomov@...il.com> > Cc: "Yan, Zheng" <zyan@...hat.com> > Cc: Sage Weil <sage@...hat.com> Thanks, applied to the dev branch. - Ted
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.