Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
random: set up the NUMA crng instances after the CRNG is fully initia…
…lized Until the primary_crng is fully initialized, don't initialize the NUMA crng nodes. Otherwise users of /dev/urandom on NUMA systems before the CRNG is fully initialized can get very bad quality randomness. Of course everyone should move to getrandom(2) where this won't be an issue, but there's a lot of legacy code out there. This related to CVE-2018-1108. Reported-by: Jann Horn <[email protected]> Fixes: 1e7f583 ("random: make /dev/urandom scalable for silly...") Cc: [email protected] # 4.8+ Signed-off-by: Theodore Ts'o <[email protected]>
- Loading branch information