From: Theodore Ts'o Subject: Re: [kernel-hardening] [PATCH v4 07/13] ceph: ensure RNG is seeded before using Date: Wed, 7 Jun 2017 22:45:12 -0400 Message-ID: <20170608024512.vjmut7buvimilpfx@thunk.org> References: <20170606174804.31124-1-Jason@zx2c4.com> <20170606174804.31124-8-Jason@zx2c4.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Linux Crypto Mailing List , LKML , kernel-hardening@lists.openwall.com, Greg Kroah-Hartman , David Miller , Eric Biggers , Ilya Dryomov , "Yan, Zheng" , Sage Weil To: "Jason A. Donenfeld" Return-path: Received: from imap.thunk.org ([74.207.234.97]:58058 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751449AbdFHCpR (ORCPT ); Wed, 7 Jun 2017 22:45:17 -0400 Content-Disposition: inline In-Reply-To: <20170606174804.31124-8-Jason@zx2c4.com> Sender: linux-crypto-owner@vger.kernel.org List-ID: On Tue, Jun 06, 2017 at 07:47:58PM +0200, Jason A. Donenfeld wrote: > Ceph uses the RNG for various nonce generations, and it shouldn't accept > using bad randomness. So, we wait for the RNG to be properly seeded. We > do this by calling wait_for_random_bytes() in a function that is > certainly called in process context, early on, so that all subsequent > calls to get_random_bytes are necessarily acceptable. > > Signed-off-by: Jason A. Donenfeld > Cc: Ilya Dryomov > Cc: "Yan, Zheng" > Cc: Sage Weil Thanks, applied to the dev branch. - Ted