diff options
author | Amit Shah <amit.shah@redhat.com> | 2014-08-11 14:35:41 -0400 |
---|---|---|
committer | Amit Shah <amit.shah@redhat.com> | 2014-08-15 00:56:01 -0400 |
commit | 34679ec7a0c45da8161507e1f2e1f72749dfd85c (patch) | |
tree | 32d2bbfdfbf2104e2eff82086afde2fcec235cf0 /drivers/char/hw_random | |
parent | c9d26423e56ce1ab4d786f92aebecf859d419293 (diff) |
virtio: rng: add derating factor for use by hwrng core
The khwrngd thread is started when a hwrng device of sufficient
quality is registered. The virtio-rng device is backed by the
hypervisor, and we trust the hypervisor to provide real entropy.
A malicious or badly-implemented hypervisor is a scenario that's
irrelevant -- such a setup is bound to cause all sorts of badness, and a
compromised hwrng is the least of the user's worries.
Given this, we might as well assume that the quality of randomness we
receive is perfectly trustworthy. Hence, we use 100% for the factor,
indicating maximum confidence in the source.
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Reviewed-by: H. Peter Anvin <hpa@linux.intel.com>
Reviewed-by: Amos Kong <akong@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Diffstat (limited to 'drivers/char/hw_random')
-rw-r--r-- | drivers/char/hw_random/virtio-rng.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/drivers/char/hw_random/virtio-rng.c b/drivers/char/hw_random/virtio-rng.c index 0027137daa56..2e3139eda93b 100644 --- a/drivers/char/hw_random/virtio-rng.c +++ b/drivers/char/hw_random/virtio-rng.c | |||
@@ -116,6 +116,7 @@ static int probe_common(struct virtio_device *vdev) | |||
116 | .cleanup = virtio_cleanup, | 116 | .cleanup = virtio_cleanup, |
117 | .priv = (unsigned long)vi, | 117 | .priv = (unsigned long)vi, |
118 | .name = vi->name, | 118 | .name = vi->name, |
119 | .quality = 1000, | ||
119 | }; | 120 | }; |
120 | vdev->priv = vi; | 121 | vdev->priv = vi; |
121 | 122 | ||