Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp2931070iog; Mon, 20 Jun 2022 07:44:10 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vcbPuoP01qDDqx2QXJSmbXCIRvVus7YpUOBILU66yDfh/2dD5ErD/xPAtiN6s8GA3CUetL X-Received: by 2002:a17:902:b689:b0:167:8b69:d1a7 with SMTP id c9-20020a170902b68900b001678b69d1a7mr24479696pls.156.1655736250718; Mon, 20 Jun 2022 07:44:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655736250; cv=none; d=google.com; s=arc-20160816; b=lx43CKZ5ygyaCb4M4H0UGohff3LR3u5wKJrOu5wdAzK9MjYd5cflzYiQ9VkIEkA3nM LCX5pmfzxdDZuPMR9H1vZDeYSJX7P+M5uVY//oFgBujQeMDDlAL8nzXC7cQKou8qA+al KG+NK7dklYJSEFq3lXMVUHgcAqs1PRlTifcVYJO6tEkrJCqWjLEsq1ZwZlOGYYmHJ/is PMTWyjDcWdZNTsgm+qXeJDL3k5aUI5Ra4cRfHrh0aTOul7v7OWm0iIQyAwi3CVxtdklg DmoUBugxw2CIBM/J2tjPU42Ph9xRn6GBMtCCT3Jb46YPDOaJAqY8VYskLYpgLc52cdSd 57+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=815J05+vxyQR7jfCj83BDagaYO1juxLrDi66kBpLYhQ=; b=yMbfOaHFeIK7wE7qMVoFBFYdQAAacuFd9Fx96EvwDYpFjX5EHEA8lacN5f5gnAYayo brWqFH14OccpUd6zAfbaOVItR8JevdK9IJT8lCrKkz1K3JkmZGf2v3yVZ9yKebtZJTPA j92ZVSeyyiZ22rZLk+HXrWFkXG0iooIXSODVBrI5Jnjhkly19IWLPXRfo5HhyNE0EjI7 ZdnPuZFt3R+fdRKy1slPq8NZZJLknGUbdj3u9wY98UejuW92LSOM1ID+nvn3K24saULk VGZLuF2QtorB34tS7VoPvFmGPbYJNgf+kdDJBPLiJ3NtjI+zT+c0R+NnoIUuZTl9iNr0 pBUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=veMfzVbj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 188-20020a6304c5000000b003fc9b04edf6si16273090pge.423.2022.06.20.07.43.58; Mon, 20 Jun 2022 07:44:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=veMfzVbj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345392AbiFTNaM (ORCPT + 99 others); Mon, 20 Jun 2022 09:30:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44916 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345239AbiFTN0z (ORCPT ); Mon, 20 Jun 2022 09:26:55 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C3D711C90C; Mon, 20 Jun 2022 06:10:58 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A59A260C95; Mon, 20 Jun 2022 13:10:58 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6667DC3411C; Mon, 20 Jun 2022 13:10:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1655730658; bh=X7zB1pE8Sst2u4rO6adk2JOEApJkqM0WbyDU/PwXG3M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=veMfzVbjIEIaEb4KO1Fc6qrV/SAYpQ2Klk+pMuZk5nP7k1JtUsLP8VzorsUU9gyg5 pZDqct7Y5YvLbpp4IjJHU/T8SQvHU6PBKknN8RiGIhMJj4OjxJFB4tCfecKou4BQBj 8uHhiymYMfUYUtRGwVByjqJXiW93P9z3pK+E5oks= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andy Lutomirski , Theodore Tso , "Jason A. Donenfeld" Subject: [PATCH 5.4 016/240] random: remove kernel.random.read_wakeup_threshold Date: Mon, 20 Jun 2022 14:48:37 +0200 Message-Id: <20220620124738.281381269@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220620124737.799371052@linuxfoundation.org> References: <20220620124737.799371052@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andy Lutomirski commit c95ea0c69ffda19381c116db2be23c7e654dac98 upstream. It has no effect any more, so remove it. We can revert this if there is some user code that expects to be able to set this sysctl. Signed-off-by: Andy Lutomirski Link: https://lore.kernel.org/r/a74ed2cf0b5a5451428a246a9239f5bc4e29358f.1577088521.git.luto@kernel.org Signed-off-by: Theodore Ts'o Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 18 +----------------- 1 file changed, 1 insertion(+), 17 deletions(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -370,12 +370,6 @@ #define ENTROPY_BITS(r) ((r)->entropy_count >> ENTROPY_SHIFT) /* - * The minimum number of bits of entropy before we wake up a read on - * /dev/random. Should be enough to do a significant reseed. - */ -static int random_read_wakeup_bits = 64; - -/* * If the entropy count falls under this number of bits, then we * should wake up processes which are selecting or polling on write * access to /dev/random. @@ -2076,8 +2070,7 @@ SYSCALL_DEFINE3(getrandom, char __user * #include -static int min_read_thresh = 8, min_write_thresh; -static int max_read_thresh = OUTPUT_POOL_WORDS * 32; +static int min_write_thresh; static int max_write_thresh = INPUT_POOL_WORDS * 32; static int random_min_urandom_seed = 60; static char sysctl_bootid[16]; @@ -2153,15 +2146,6 @@ struct ctl_table random_table[] = { .data = &input_pool.entropy_count, }, { - .procname = "read_wakeup_threshold", - .data = &random_read_wakeup_bits, - .maxlen = sizeof(int), - .mode = 0644, - .proc_handler = proc_dointvec_minmax, - .extra1 = &min_read_thresh, - .extra2 = &max_read_thresh, - }, - { .procname = "write_wakeup_threshold", .data = &random_write_wakeup_bits, .maxlen = sizeof(int),