Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752505AbcDUJVm (ORCPT ); Thu, 21 Apr 2016 05:21:42 -0400 Received: from mail.eperm.de ([89.247.134.16]:52830 "EHLO mail.eperm.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751986AbcDUJVc (ORCPT ); Thu, 21 Apr 2016 05:21:32 -0400 From: Stephan Mueller To: Ted Tso Cc: herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, sandyinchina@gmail.com Subject: [PATCH 5/6] crypto: LRNG - hook LRNG into interrupt handler Date: Thu, 21 Apr 2016 11:14:30 +0200 Message-ID: <1784617.TvuOaYV7QZ@positron.chronox.de> User-Agent: KMail/4.14.10 (Linux/4.4.6-301.fc23.x86_64; KDE/4.14.18; x86_64; ; ) In-Reply-To: <9192755.iDgo3Omyqe@positron.chronox.de> References: <9192755.iDgo3Omyqe@positron.chronox.de> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 599 Lines: 23 The LRNG places a callback into the interrupt handler to be triggered for each interrupt. With this callback, entropy is collected. Signed-off-by: Stephan Mueller --- kernel/irq/handle.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/irq/handle.c b/kernel/irq/handle.c index a15b548..8d64e37 100644 --- a/kernel/irq/handle.c +++ b/kernel/irq/handle.c @@ -175,6 +175,7 @@ irqreturn_t handle_irq_event_percpu(struct irq_desc *desc) } add_interrupt_randomness(irq, flags); + lrng_irq_process(); if (!noirqdebug) note_interrupt(desc, retval); -- 2.5.5