aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/char/random.c
diff options
context:
space:
mode:
Diffstat (limited to 'drivers/char/random.c')
-rw-r--r--drivers/char/random.c19
1 files changed, 14 insertions, 5 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c
index caef35a46890..d4ddeba56682 100644
--- a/drivers/char/random.c
+++ b/drivers/char/random.c
@@ -128,6 +128,7 @@
128 * void add_input_randomness(unsigned int type, unsigned int code, 128 * void add_input_randomness(unsigned int type, unsigned int code,
129 * unsigned int value); 129 * unsigned int value);
130 * void add_interrupt_randomness(int irq); 130 * void add_interrupt_randomness(int irq);
131 * void add_disk_randomness(struct gendisk *disk);
131 * 132 *
132 * add_input_randomness() uses the input layer interrupt timing, as well as 133 * add_input_randomness() uses the input layer interrupt timing, as well as
133 * the event type information from the hardware. 134 * the event type information from the hardware.
@@ -136,9 +137,15 @@
136 * inputs to the entropy pool. Note that not all interrupts are good 137 * inputs to the entropy pool. Note that not all interrupts are good
137 * sources of randomness! For example, the timer interrupts is not a 138 * sources of randomness! For example, the timer interrupts is not a
138 * good choice, because the periodicity of the interrupts is too 139 * good choice, because the periodicity of the interrupts is too
139 * regular, and hence predictable to an attacker. Disk interrupts are 140 * regular, and hence predictable to an attacker. Network Interface
140 * a better measure, since the timing of the disk interrupts are more 141 * Controller interrupts are a better measure, since the timing of the
141 * unpredictable. 142 * NIC interrupts are more unpredictable.
143 *
144 * add_disk_randomness() uses what amounts to the seek time of block
145 * layer request events, on a per-disk_devt basis, as input to the
146 * entropy pool. Note that high-speed solid state drives with very low
147 * seek times do not make for good sources of entropy, as their seek
148 * times are usually fairly consistent.
142 * 149 *
143 * All of these routines try to estimate how many bits of randomness a 150 * All of these routines try to estimate how many bits of randomness a
144 * particular randomness source. They do this by keeping track of the 151 * particular randomness source. They do this by keeping track of the
@@ -626,7 +633,7 @@ static void add_timer_randomness(struct timer_rand_state *state, unsigned num)
626 preempt_disable(); 633 preempt_disable();
627 /* if over the trickle threshold, use only 1 in 4096 samples */ 634 /* if over the trickle threshold, use only 1 in 4096 samples */
628 if (input_pool.entropy_count > trickle_thresh && 635 if (input_pool.entropy_count > trickle_thresh &&
629 (__get_cpu_var(trickle_count)++ & 0xfff)) 636 ((__this_cpu_inc_return(trickle_count) - 1) & 0xfff))
630 goto out; 637 goto out;
631 638
632 sample.jiffies = jiffies; 639 sample.jiffies = jiffies;
@@ -725,7 +732,7 @@ static ssize_t extract_entropy(struct entropy_store *r, void *buf,
725 size_t nbytes, int min, int rsvd); 732 size_t nbytes, int min, int rsvd);
726 733
727/* 734/*
728 * This utility inline function is responsible for transfering entropy 735 * This utility inline function is responsible for transferring entropy
729 * from the primary pool to the secondary extraction pool. We make 736 * from the primary pool to the secondary extraction pool. We make
730 * sure we pull enough for a 'catastrophic reseed'. 737 * sure we pull enough for a 'catastrophic reseed'.
731 */ 738 */
@@ -1165,6 +1172,7 @@ const struct file_operations random_fops = {
1165 .poll = random_poll, 1172 .poll = random_poll,
1166 .unlocked_ioctl = random_ioctl, 1173 .unlocked_ioctl = random_ioctl,
1167 .fasync = random_fasync, 1174 .fasync = random_fasync,
1175 .llseek = noop_llseek,
1168}; 1176};
1169 1177
1170const struct file_operations urandom_fops = { 1178const struct file_operations urandom_fops = {
@@ -1172,6 +1180,7 @@ const struct file_operations urandom_fops = {
1172 .write = random_write, 1180 .write = random_write,
1173 .unlocked_ioctl = random_ioctl, 1181 .unlocked_ioctl = random_ioctl,
1174 .fasync = random_fasync, 1182 .fasync = random_fasync,
1183 .llseek = noop_llseek,
1175}; 1184};
1176 1185
1177/*************************************************************** 1186/***************************************************************