Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Feb 2016 18:30:40 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-bugs@FreeBSD.org
Subject:   [Bug 205800] random device not loaded; using insecure entropy
Message-ID:  <bug-205800-8-nCd0GKkvV0@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-205800-8@https.bugs.freebsd.org/bugzilla/>
References:  <bug-205800-8@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D205800

--- Comment #6 from commit-hook@freebsd.org ---
A commit references this bug:

Author: jhb
Date: Wed Feb 10 18:29:38 UTC 2016
New revision: 295480
URL: https://svnweb.freebsd.org/changeset/base/295480

Log:
  Adjust initialization of random(9) so it is usable earlier.

  A few existing SYSINITs expect the in-kernel PRNG (random(9)) to be
  useable at SI_SUB_RANDOM / SI_ORDER_ANY.  However, the random(4) overhaul
  merged for 10.0 performs all of its initialization at SI_SUB_DRIVERS
  (since it is tied in with creating the /dev/random character device).

  This has changed in HEAD where the random initialization is split such
  that the in-kernel random(9) is initialized at SI_SUB_RANDOM and the
  supporting bits for userland random(4) (such as /dev/random) are initiali=
zed
  later.

  However, the changes in HEAD are large and invasive.  Instead, this change
  is being directly committed to stable/10.

  This change moves most of the random(9)/random(4) initialization to
  SI_SUB_RANDOM with the exception that the creation of the harvesting kern=
el
  process and the /dev/random character device are deferred to new
  SYSINITs that run at SI_SUB_DRIVERS.

  This fixes the "random device not loaded; using insecure entropy" message
  output during boot on some systems.

  PR:           205800
  Reviewed by:  markm, so@
  Approved by:  so
  Approved by:  re (gjb)
  Tested by:    Mark Saad <nonesuch@longcount.org>

Changes:
  stable/10/sys/dev/random/live_entropy_sources.c
  stable/10/sys/dev/random/live_entropy_sources.h
  stable/10/sys/dev/random/random_adaptors.c
  stable/10/sys/dev/random/random_adaptors.h
  stable/10/sys/dev/random/random_harvestq.c
  stable/10/sys/dev/random/randomdev.c
  stable/10/sys/dev/random/randomdev_soft.c

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-205800-8-nCd0GKkvV0>