diff options
author | Theodore Ts'o <tytso@mit.edu> | 2017-06-08 04:16:59 -0400 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2017-07-15 12:19:28 -0400 |
commit | eecabf567422eda02bd179f2707d8fe24f52d888 (patch) | |
tree | 621859908bc9613fa913338d513785072d07ae93 /drivers/target | |
parent | d06bfd1989fe97623b32d6df4ffa6e4338c99dc8 (diff) | |
download | op-kernel-dev-eecabf567422eda02bd179f2707d8fe24f52d888.zip op-kernel-dev-eecabf567422eda02bd179f2707d8fe24f52d888.tar.gz |
random: suppress spammy warnings about unseeded randomness
Unfortunately, on some models of some architectures getting a fully
seeded CRNG is extremely difficult, and so this can result in dmesg
getting spammed for a surprisingly long time. This is really bad from
a security perspective, and so architecture maintainers really need to
do what they can to get the CRNG seeded sooner after the system is
booted. However, users can't do anything actionble to address this,
and spamming the kernel messages log will only just annoy people.
For developers who want to work on improving this situation,
CONFIG_WARN_UNSEEDED_RANDOM has been renamed to
CONFIG_WARN_ALL_UNSEEDED_RANDOM. By default the kernel will always
print the first use of unseeded randomness. This way, hopefully the
security obsessed will be happy that there is _some_ indication when
the kernel boots there may be a potential issue with that architecture
or subarchitecture. To see all uses of unseeded randomness,
developers can enable CONFIG_WARN_ALL_UNSEEDED_RANDOM.
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to 'drivers/target')
0 files changed, 0 insertions, 0 deletions