diff options
author | Theodore Ts'o <tytso@mit.edu> | 2019-02-20 16:06:38 -0500 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2019-04-17 10:30:21 -0400 |
commit | eb9d1bf079bb438d1a066d72337092935fc770f6 (patch) | |
tree | 1468f49bdedaa14160e4d8236926f2447381988b /kernel/gcov | |
parent | 764ed189c82090c1d85f0e30636156736d8f09a8 (diff) | |
download | linux-eb9d1bf079bb438d1a066d72337092935fc770f6.tar.gz linux-eb9d1bf079bb438d1a066d72337092935fc770f6.tar.bz2 linux-eb9d1bf079bb438d1a066d72337092935fc770f6.zip |
random: only read from /dev/random after its pool has received 128 bits
Immediately after boot, we allow reads from /dev/random before its
entropy pool has been fully initialized. Fix this so that we don't
allow this until the blocking pool has received 128 bits.
We do this by repurposing the initialized flag in the entropy pool
struct, and use the initialized flag in the blocking pool to indicate
whether it is safe to pull from the blocking pool.
To do this, we needed to rework when we decide to push entropy from the
input pool to the blocking pool, since the initialized flag for the
input pool was used for this purpose. To simplify things, we no
longer use the initialized flag for that purpose, nor do we use the
entropy_total field any more.
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to 'kernel/gcov')
0 files changed, 0 insertions, 0 deletions