Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2437086ioo; Sat, 28 May 2022 13:39:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwXc16Nye4Ks1fgt9IL8iybmBOmzy4eg1Vb0xTJ3IK8o5iQs1okdev/CWoGRD7RCcAVE7d9 X-Received: by 2002:a17:90b:4b83:b0:1df:6862:fa9d with SMTP id lr3-20020a17090b4b8300b001df6862fa9dmr15514406pjb.32.1653770372538; Sat, 28 May 2022 13:39:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653770372; cv=none; d=google.com; s=arc-20160816; b=xwNSG8OG8eybzQnnwnqGP7wSn8uYlaDO8sNU5R75MczIF9vwXsinpT36jibhQv6lvE R6Mapt4TfKwMYPHXvSfokYxACEfefo881XXK0SGJS5kIld4MNIRFT6MBRpgNj9ldx55Q 6p6ETWpUo6usr+O6s1vnH0Mx7chfdYVm8UpWKuxEKMplaD21izsSUb5XZshxakG/jTu8 Hg79XlRWU67adfThK/lEd8/vKBOLef38BcnfDqS/9BWckiywpwsP/7i/zPK4XvKLygAB 0id8/WYkEgCAis3dguu1koX9ejTi87+fjque9Q7/26YTQS9PUbcU0VaFMQsGaoOJdMYm 5rlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ue0fQCuxdsJsE0RQINA+mqrbRgP9CeDPnvYb1aW08uo=; b=P2bSbofsxO2Qlroc4Pk5N8YrZWTN1mthLO8JX859ZRVr7jfEeDXXrBpaSI0xgGotRF mJlqHltip4FbT7xl9pQ5M8AuIXsouSWmxn/pc58yGRA/Nvml+Q9Yv1zSmxO31iQDUv5/ OQdVo4wFN6dM6W8mz0IxoqLh3H2C/sT0M9p2BlSEUFIqkXZJFrH0IG0Ot/h7YNwtfOEY qWenAykv6TWfwi6jV7h5eTHAJD3dqLy5dhI6dYmc1yPNYJwiFxvHotoGs7UKL8S46CRD C+TDZE08+wiS/kGoeWECmzOnHztU8LmNneWjujwt93SEmwjIr7QukCYx6pfFphfVN2BO hCpg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VAGWAqzw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id s127-20020a637785000000b00398586b09e0si10632206pgc.278.2022.05.28.13.39.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 13:39:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VAGWAqzw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id BFE5B156451; Sat, 28 May 2022 12:41:39 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351431AbiE0Lij (ORCPT + 99 others); Fri, 27 May 2022 07:38:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45586 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351486AbiE0LiQ (ORCPT ); Fri, 27 May 2022 07:38:16 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1961E1269A1; Fri, 27 May 2022 04:38:04 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 7516461C3F; Fri, 27 May 2022 11:38:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8186CC385A9; Fri, 27 May 2022 11:38:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653651482; bh=7HTA8dBismSNtEddUBqn+LQFyLT1UhrR03jQn5QntLw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VAGWAqzwfoo2w7Q6zC4AN5ae45uZ4n8EuUPPn9mAP2OopNVq51LCsHWHgGVShfoIK 3pM5y2Uyj9U8aTQIgxyDCQ19JNONTS2KRVJNMB/FEGbB3OwzD1H6tzv9aD9s66Yq6m ABMZZscVNDgzzFSTjYcsNQUdPSBuaUSL4CrZpDls= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Theodore Tso , Dominik Brodowski , "Jason A. Donenfeld" Subject: [PATCH 5.17 049/111] random: give sysctl_random_min_urandom_seed a more sensible value Date: Fri, 27 May 2022 10:49:21 +0200 Message-Id: <20220527084826.370322288@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220527084819.133490171@linuxfoundation.org> References: <20220527084819.133490171@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Jason A. Donenfeld" commit d0efdf35a6a71d307a250199af6fce122a7c7e11 upstream. This isn't used by anything or anywhere, but we can't delete it due to compatibility. So at least give it the correct value of what it's supposed to be instead of a garbage one. Cc: Theodore Ts'o Reviewed-by: Dominik Brodowski Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -1619,7 +1619,7 @@ const struct file_operations urandom_fop * to avoid breaking old userspaces, but writing to it does not * change any behavior of the RNG. * - * - urandom_min_reseed_secs - fixed to the meaningless value "60". + * - urandom_min_reseed_secs - fixed to the value CRNG_RESEED_INTERVAL. * It is writable to avoid breaking old userspaces, but writing * to it does not change any behavior of the RNG. * @@ -1629,7 +1629,7 @@ const struct file_operations urandom_fop #include -static int sysctl_random_min_urandom_seed = 60; +static int sysctl_random_min_urandom_seed = CRNG_RESEED_INTERVAL / HZ; static int sysctl_random_write_wakeup_bits = POOL_MIN_BITS; static int sysctl_poolsize = POOL_BITS; static u8 sysctl_bootid[UUID_SIZE];