diff options
author | Theodore Ts'o <tytso@mit.edu> | 2013-09-10 18:52:35 +0400 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2013-09-23 14:35:06 +0400 |
commit | 47d06e532e95b71c0db3839ebdef3fe8812fca2c (patch) | |
tree | f8d5c68cf8b0e4a8dcf107a41aa46f5aa82f7722 /include/linux/random.h | |
parent | 6e4664525b1db28f8c4e1130957f70a94c19213e (diff) | |
download | linux-47d06e532e95b71c0db3839ebdef3fe8812fca2c.tar.xz |
random: run random_int_secret_init() run after all late_initcalls
The some platforms (e.g., ARM) initializes their clocks as
late_initcalls for some unknown reason. So make sure
random_int_secret_init() is run after all of the late_initcalls are
run.
Cc: stable@vger.kernel.org
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Diffstat (limited to 'include/linux/random.h')
-rw-r--r-- | include/linux/random.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/random.h b/include/linux/random.h index 3b9377d6b7a5..6312dd9ba449 100644 --- a/include/linux/random.h +++ b/include/linux/random.h @@ -17,6 +17,7 @@ extern void add_interrupt_randomness(int irq, int irq_flags); extern void get_random_bytes(void *buf, int nbytes); extern void get_random_bytes_arch(void *buf, int nbytes); void generate_random_uuid(unsigned char uuid_out[16]); +extern int random_int_secret_init(void); #ifndef MODULE extern const struct file_operations random_fops, urandom_fops; |