On Thu, Jul 17, 2014 at 05:18:15AM -0400, Theodore Ts'o wrote:
> +SYSCALL_DEFINE3(getrandom, char __user *, buf, size_t, count,
> +             unsigned int, flags)
> +{
> +     int r;
> +
> +     if (count > 256)
> +             return -EINVAL;
> +
> +     if (flags & GRND_RANDOM) {
> +             return _random_read(!(flags & GRND_BLOCK), buf, count);
> +     }
> +     if (flags & GRND_BLOCK) {
> +             r = wait_for_completion_interruptible(&urandom_initialized);
> +             if (r)
> +                     return r;
> +     } else if (!completion_done(&urandom_initialized))
> +             return -EAGAIN;
> +     return urandom_read(NULL, buf, count, NULL);
> +}

You should fail if any other bits are set that you don't understand in
the flags value, to make it easier for newer kernels with more flags to
fail properly on old kernel releases.

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to