diff options
Diffstat (limited to 'drivers/char/random.c')
-rw-r--r-- | drivers/char/random.c | 19 |
1 files changed, 14 insertions, 5 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c index caef35a46890..d4ddeba56682 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c | |||
@@ -128,6 +128,7 @@ | |||
128 | * void add_input_randomness(unsigned int type, unsigned int code, | 128 | * void add_input_randomness(unsigned int type, unsigned int code, |
129 | * unsigned int value); | 129 | * unsigned int value); |
130 | * void add_interrupt_randomness(int irq); | 130 | * void add_interrupt_randomness(int irq); |
131 | * void add_disk_randomness(struct gendisk *disk); | ||
131 | * | 132 | * |
132 | * add_input_randomness() uses the input layer interrupt timing, as well as | 133 | * add_input_randomness() uses the input layer interrupt timing, as well as |
133 | * the event type information from the hardware. | 134 | * the event type information from the hardware. |
@@ -136,9 +137,15 @@ | |||
136 | * inputs to the entropy pool. Note that not all interrupts are good | 137 | * inputs to the entropy pool. Note that not all interrupts are good |
137 | * sources of randomness! For example, the timer interrupts is not a | 138 | * sources of randomness! For example, the timer interrupts is not a |
138 | * good choice, because the periodicity of the interrupts is too | 139 | * good choice, because the periodicity of the interrupts is too |
139 | * regular, and hence predictable to an attacker. Disk interrupts are | 140 | * regular, and hence predictable to an attacker. Network Interface |
140 | * a better measure, since the timing of the disk interrupts are more | 141 | * Controller interrupts are a better measure, since the timing of the |
141 | * unpredictable. | 142 | * NIC interrupts are more unpredictable. |
143 | * | ||
144 | * add_disk_randomness() uses what amounts to the seek time of block | ||
145 | * layer request events, on a per-disk_devt basis, as input to the | ||
146 | * entropy pool. Note that high-speed solid state drives with very low | ||
147 | * seek times do not make for good sources of entropy, as their seek | ||
148 | * times are usually fairly consistent. | ||
142 | * | 149 | * |
143 | * All of these routines try to estimate how many bits of randomness a | 150 | * All of these routines try to estimate how many bits of randomness a |
144 | * particular randomness source. They do this by keeping track of the | 151 | * particular randomness source. They do this by keeping track of the |
@@ -626,7 +633,7 @@ static void add_timer_randomness(struct timer_rand_state *state, unsigned num) | |||
626 | preempt_disable(); | 633 | preempt_disable(); |
627 | /* if over the trickle threshold, use only 1 in 4096 samples */ | 634 | /* if over the trickle threshold, use only 1 in 4096 samples */ |
628 | if (input_pool.entropy_count > trickle_thresh && | 635 | if (input_pool.entropy_count > trickle_thresh && |
629 | (__get_cpu_var(trickle_count)++ & 0xfff)) | 636 | ((__this_cpu_inc_return(trickle_count) - 1) & 0xfff)) |
630 | goto out; | 637 | goto out; |
631 | 638 | ||
632 | sample.jiffies = jiffies; | 639 | sample.jiffies = jiffies; |
@@ -725,7 +732,7 @@ static ssize_t extract_entropy(struct entropy_store *r, void *buf, | |||
725 | size_t nbytes, int min, int rsvd); | 732 | size_t nbytes, int min, int rsvd); |
726 | 733 | ||
727 | /* | 734 | /* |
728 | * This utility inline function is responsible for transfering entropy | 735 | * This utility inline function is responsible for transferring entropy |
729 | * from the primary pool to the secondary extraction pool. We make | 736 | * from the primary pool to the secondary extraction pool. We make |
730 | * sure we pull enough for a 'catastrophic reseed'. | 737 | * sure we pull enough for a 'catastrophic reseed'. |
731 | */ | 738 | */ |
@@ -1165,6 +1172,7 @@ const struct file_operations random_fops = { | |||
1165 | .poll = random_poll, | 1172 | .poll = random_poll, |
1166 | .unlocked_ioctl = random_ioctl, | 1173 | .unlocked_ioctl = random_ioctl, |
1167 | .fasync = random_fasync, | 1174 | .fasync = random_fasync, |
1175 | .llseek = noop_llseek, | ||
1168 | }; | 1176 | }; |
1169 | 1177 | ||
1170 | const struct file_operations urandom_fops = { | 1178 | const struct file_operations urandom_fops = { |
@@ -1172,6 +1180,7 @@ const struct file_operations urandom_fops = { | |||
1172 | .write = random_write, | 1180 | .write = random_write, |
1173 | .unlocked_ioctl = random_ioctl, | 1181 | .unlocked_ioctl = random_ioctl, |
1174 | .fasync = random_fasync, | 1182 | .fasync = random_fasync, |
1183 | .llseek = noop_llseek, | ||
1175 | }; | 1184 | }; |
1176 | 1185 | ||
1177 | /*************************************************************** | 1186 | /*************************************************************** |