* [Bug 216656] New: random: poolsize
@ 2022-11-03 15:05 bugzilla-daemon
0 siblings, 0 replies; only message in thread
From: bugzilla-daemon @ 2022-11-03 15:05 UTC (permalink / raw)
To: linux-man
https://bugzilla.kernel.org/show_bug.cgi?id=216656
Bug ID: 216656
Summary: random: poolsize
Product: Documentation
Version: unspecified
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P1
Component: man-pages
Assignee: documentation_man-pages@kernel-bugs.osdl.org
Reporter: christophe.leroy@csgroup.eu
Regression: No
In https://man7.org/linux/man-pages/man4/random.4.html
In "/proc interfaces" section, item "poolsize", part "Linux 2.6 and later", it
is said the file contains value 4096.
That is not correct anymore since commit 6e8ec2552c7d ("random: use
computational hash for entropy extraction")
Also mentionned in https://bugzilla.kernel.org/show_bug.cgi?id=216061
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2022-11-03 15:08 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-11-03 15:05 [Bug 216656] New: random: poolsize bugzilla-daemon
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox