summaryrefslogtreecommitdiff
path: root/drivers/isdn
diff options
context:
space:
mode:
authorTheodore Ts'o <tytso@mit.edu>2017-06-08 11:16:59 +0300
committerTheodore Ts'o <tytso@mit.edu>2017-07-15 19:19:28 +0300
commiteecabf567422eda02bd179f2707d8fe24f52d888 (patch)
tree621859908bc9613fa913338d513785072d07ae93 /drivers/isdn
parentd06bfd1989fe97623b32d6df4ffa6e4338c99dc8 (diff)
downloadlinux-eecabf567422eda02bd179f2707d8fe24f52d888.tar.xz
random: suppress spammy warnings about unseeded randomness
Unfortunately, on some models of some architectures getting a fully seeded CRNG is extremely difficult, and so this can result in dmesg getting spammed for a surprisingly long time. This is really bad from a security perspective, and so architecture maintainers really need to do what they can to get the CRNG seeded sooner after the system is booted. However, users can't do anything actionble to address this, and spamming the kernel messages log will only just annoy people. For developers who want to work on improving this situation, CONFIG_WARN_UNSEEDED_RANDOM has been renamed to CONFIG_WARN_ALL_UNSEEDED_RANDOM. By default the kernel will always print the first use of unseeded randomness. This way, hopefully the security obsessed will be happy that there is _some_ indication when the kernel boots there may be a potential issue with that architecture or subarchitecture. To see all uses of unseeded randomness, developers can enable CONFIG_WARN_ALL_UNSEEDED_RANDOM. Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to 'drivers/isdn')
0 files changed, 0 insertions, 0 deletions