On Thu, Jun 23, 2022 at 08:05:55PM +0200, Jason A. Donenfeld wrote: > The rng's random_init() function contributes the real time to the rng at > boot time, so that events can at least start in relation to something > particular in the real world. But this clock might not yet be set that > point in boot, so nothing is contributed. In addition, the relation > between minor clock changes from, say, NTP, and the cycle counter is > potentially useful entropic data. > > This commit addresses this by mixing in a time stamp on calls to > settimeofday and adjtimex. No entropy is credited in doing so, so it > doesn't make initialization faster, but it is still useful input to > have. > > Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") > Cc: stable@xxxxxxxxxxxxxxx > Signed-off-by: Jason A. Donenfeld <Jason@xxxxxxxxx> > --- > kernel/time/timekeeping.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/kernel/time/timekeeping.c b/kernel/time/timekeeping.c > index 8e4b3c32fcf9..89b894b3ede8 100644 > --- a/kernel/time/timekeeping.c > +++ b/kernel/time/timekeeping.c > @@ -23,6 +23,7 @@ > #include <linux/pvclock_gtod.h> > #include <linux/compiler.h> > #include <linux/audit.h> > +#include <linux/random.h> > > #include "tick-internal.h" > #include "ntp_internal.h" > @@ -1331,6 +1332,8 @@ int do_settimeofday64(const struct timespec64 *ts) > goto out; > } > > + add_device_randomness(&ts, sizeof(ts)); > + > tk_set_wall_to_mono(tk, timespec64_sub(tk->wall_to_monotonic, ts_delta)); This is now nested inside: raw_spin_lock_irqsave(&timekeeper_lock, flags); write_seqcount_begin(&tk_core.seq); Could there be a deadlock if random_get_entropy() in add_device_randomness() falls back to reading the monotonic clock? - Eric