2010-06-21 13:58:38

by Weedy

[permalink] [raw]
Subject: Entropy poolsize

I know grsecurity has a option for this but I don't want to patch my
kernel with it at this time. I have been poking around random.c but I
can't seem to figure out where .poolsize is assigned it's value and
how to increase it.

If someone could point it out that would be nice.

Thank you for your time.


2010-06-21 15:52:01

by Randy Dunlap

[permalink] [raw]
Subject: Re: Entropy poolsize

On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:

> I know grsecurity has a option for this but I don't want to patch my
> kernel with it at this time. I have been poking around random.c but I
> can't seem to figure out where .poolsize is assigned it's value and
> how to increase it.
>
> If someone could point it out that would be nice.
>
> Thank you for your time.
> --

Do you mean this one in drivers/char/random.c or something else?

static int sysctl_poolsize = INPUT_POOL_WORDS * 32;

It's a sysctl, so it is tunable.

---
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***

2010-06-22 23:22:12

by Weedy

[permalink] [raw]
Subject: Re: Entropy poolsize

Man I need to remember to hit reply-to-all

On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <[email protected]> wrote:
> On 06/21/10 12:48, Weedy wrote:
>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <[email protected]> wrote:
>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
>>>
>>>> I know grsecurity has a option for this but I don't want to patch my
>>>> kernel with it at this time. I have been poking around random.c but I
>>>> can't seem to figure out where .poolsize is assigned it's value and
>>>> how to increase it.
>>>>
>>>> If someone could point it out that would be nice.
>>>>
>>>> Thank you for your time.
>>>> --
>>>
>>> Do you mean this one in drivers/char/random.c or something else?
>>>
>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
>>>
>>> It's a sysctl, so it is tunable.
>> It's locked, some kind of security risk many kernels ago. I'll try
>> changing that but I thought I tried it once before.
>
> Ah, it's mode is 0444 (read-only).  Sorry I missed that piece.
> Sure, you could change the mode for your own use (rebuild the kernel).

 # cat /proc/sys/kernel/random/poolsize
16384
cat /proc/sys/kernel/random/entropy_avail
4096

I guess there is more to it.

2010-07-04 19:00:43

by Weedy

[permalink] [raw]
Subject: Re: Entropy poolsize

On Tue, Jun 22, 2010 at 7:21 PM, Weedy <[email protected]> wrote:
> Man I need to remember to hit reply-to-all
>
> On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <[email protected]> wrote:
>> On 06/21/10 12:48, Weedy wrote:
>>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <[email protected]> wrote:
>>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
>>>>
>>>>> I know grsecurity has a option for this but I don't want to patch my
>>>>> kernel with it at this time. I have been poking around random.c but I
>>>>> can't seem to figure out where .poolsize is assigned it's value and
>>>>> how to increase it.
>>>>>
>>>>> If someone could point it out that would be nice.
>>>>>
>>>>> Thank you for your time.
>>>>> --
>>>>
>>>> Do you mean this one in drivers/char/random.c or something else?
>>>>
>>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
>>>>
>>>> It's a sysctl, so it is tunable.
>>> It's locked, some kind of security risk many kernels ago. I'll try
>>> changing that but I thought I tried it once before.
>>
>> Ah, it's mode is 0444 (read-only).  Sorry I missed that piece.
>> Sure, you could change the mode for your own use (rebuild the kernel).
>
>  # cat /proc/sys/kernel/random/poolsize
> 16384
> cat /proc/sys/kernel/random/entropy_avail
> 4096
>
> I guess there is more to it.
>

Bump