Received: by 10.192.165.148 with SMTP id m20csp3107906imm; Sun, 29 Apr 2018 14:19:38 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrdNJlsBhHGF3K77CiaoQh5aNLwDVcgQ1agSO0Wm7MRTUaDO64qxewSXGPG2MmGJG3UvbWO X-Received: by 2002:a63:3ec9:: with SMTP id l192-v6mr8303723pga.318.1525036778000; Sun, 29 Apr 2018 14:19:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525036777; cv=none; d=google.com; s=arc-20160816; b=qXrO2SfOuD+0X93YPCX2t/OME6QF2mu4vYc2FfhwnIZUzaIGpyGqvyYHGi9VRVsTFH SoqqfC5FRBOF0NzPS1tsnebh3bkHCCln0hUJTyCIYem359L6lBL3yLpjPt7izCZ2PdZ7 LyApMFWrNLC1BN/Qcc2nApIwc4/L75WEzkGbb93EDfqEwrx3xwiswRPCMpP9h+Nnsh9I /3JHPgC25yyUDdaIgIX+m5pZ/GLB7FwRDfnawFGDmWwBKrXfrge0OWuC+DpbiMXzJ0YV co6HVttoUPVHdIhvKhdw4nV0ma640nMBa123ZTHK9AzFt5saiaZGzLC0X8wDrKA0X7CW mswg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=+YWlemk5A6FVHRAGXokB4QIpq5AhTtz8d22zkHYdjsw=; b=h/wXj1E/6QyP3JzwxehrWBVawBn/2H6q+qk/WWUR8dlSxopeBVZiOdyUhOxxmJ4wH8 ARRA72yKJHufcNIn/ABboGYXp9rYBwyd4DDcB1dx0KLBLD35pTL1dGph91bKjuSg9PzL kTMy2qSfZz35Htty6120yb82mDTZsjWJCBrc+b0vLy63y40wgrweQ6vCP6dHj9ZySs0G ocFoBQ+f20fuyEXs+EbI7AFVcjXZbs/cX3vyophJiFvzPGRhqO3fHJreNbbFTYd3nSwB eNL6O7uS2F1UGzS1rksTpe/dvDxKZYlW70QGwRUN7lMrHvnKnc7iw7f2LkltOtw2eXSk y7xw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t5-v6si4547159plo.113.2018.04.29.14.19.22; Sun, 29 Apr 2018 14:19:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754337AbeD2VS7 (ORCPT + 99 others); Sun, 29 Apr 2018 17:18:59 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:60663 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754300AbeD2VS4 (ORCPT ); Sun, 29 Apr 2018 17:18:56 -0400 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id 7E74C8044E; Sun, 29 Apr 2018 23:18:55 +0200 (CEST) Date: Sun, 29 Apr 2018 23:18:55 +0200 From: Pavel Machek To: Sultan Alsawaf Cc: "Theodore Y. Ts'o" , linux-kernel@vger.kernel.org, Jann Horn Subject: Re: Linux messages full of `random: get_random_u32 called from` Message-ID: <20180429211855.GA17525@amd> References: <20180426192524.GD5965@thunk.org> <2add15cb-2113-0504-a732-81255ea61bf5@gmail.com> <20180426235630.GG5965@thunk.org> <3eb5761e-7b25-4178-0560-fba5eb43ce6a@gmail.com> <20180427201036.GL5965@thunk.org> <20180429143205.GD13475@amd> <20180429170541.lrzwyihrd6d75rql@sultan-box> <20180429184101.GA31156@amd> <20180429202033.ysmc42mj2rrk3h7p@sultan-box> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="fUYQa+Pmc3FrFX/N" Content-Disposition: inline In-Reply-To: <20180429202033.ysmc42mj2rrk3h7p@sultan-box> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --fUYQa+Pmc3FrFX/N Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun 2018-04-29 13:20:33, Sultan Alsawaf wrote: > On Sun, Apr 29, 2018 at 08:41:01PM +0200, Pavel Machek wrote: > > Umm. No. https://www.youtube.com/watch?v=3DxneBjc8z0DE >=20 > Okay, but /dev/urandom isn't a solution to this problem because it isn't = usable > until crng init is complete, so it suffers from the same init lag as > /dev/random. So -- I'm pretty sure systemd and friends should be using /dev/urandom. Maybe gpg wants to use /dev/random. _Maybe_. [ 2.948192] random: systemd: uninitialized urandom read (16 bytes read) [ 2.953526] systemd[1]: systemd 215 running in system mode. (+PAM +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ -SECCOMP -APPARMOR) [ 2.980278] systemd[1]: Detected architecture 'x86'. [ 3.115072] usb 5-2: New USB device found, idVendor=3D0483, idProduct=3D2016, bcdDevice=3D 0.01 [ 3.119633] usb 5-2: New USB device strings: Mfr=3D1, Product=3D2, SerialNumber=3D0 [ 3.124147] usb 5-2: Product: Biometric Coprocessor [ 3.128621] usb 5-2: Manufacturer: STMicroelectronics [ 3.163839] systemd[1]: Failed to insert module 'ipv6' [ 3.181266] systemd[1]: Set hostname to . [ 3.267243] random: systemd-sysv-ge: uninitialized urandom read (16 bytes read) [ 3.669590] random: systemd-sysv-ge: uninitialized urandom read (16 bytes read) [ 3.696242] random: systemd: uninitialized urandom read (16 bytes read) [ 3.700066] random: systemd: uninitialized urandom read (16 bytes read) [ 3.703716] random: systemd: uninitialized urandom read (16 bytes read) Anyway, urandom should need to be seeded once, and then provide random data forever... which is not impression I get from the dmesg output above. Boot clearly proceeds... somehow. So now I'm confused. Best regards, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --fUYQa+Pmc3FrFX/N Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlrmNr8ACgkQMOfwapXb+vK3iQCff9UKx1/reD2i2tNzIG19G6Ut /ZwAoKyPt0awKR8UwZ5LUBGbmVCF1I48 =zKgL -----END PGP SIGNATURE----- --fUYQa+Pmc3FrFX/N--