Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp6046844iog; Thu, 23 Jun 2022 10:12:28 -0700 (PDT) X-Google-Smtp-Source: AGRyM1u4ljRVOfBTR7OH4Pa3htE6WYqqrMICZrCxo7aff0G9uG0GHWMu/jN8omSAaa3JJZZC9WVr X-Received: by 2002:a17:907:d05:b0:6f4:3729:8e36 with SMTP id gn5-20020a1709070d0500b006f437298e36mr8868609ejc.475.1656004347976; Thu, 23 Jun 2022 10:12:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656004347; cv=none; d=google.com; s=arc-20160816; b=SsujvkMjVmO1G2Gs64RzNBKcv7Vkl1iAnix30Fje5n/VJTbVzkb/q4zNYSAZz//5cZ V8NKl669FuBZuKpAkvu4MD93/gaV0JuWddiTVLzeS87XaA1BR+HE0e9bcWV7j6vVSXGU fRMn3BS43mFaQQ72jmpLX+WlqeuJLDBnPrS2J3h0XLIkGkWI4I68BzahkofaiOlwVKq2 WVWKhKYSUl5xucU6RNJQN5tonF1GNlypfNCtykZyFDNeFPlfjgL+FSbGchI8sxPhN/7a +MvNC0a3ecH0y5mHs9fxtEBxyqzH6GemHZH6oaPxLi6Ues7qfbVdXvTmS8Z6Efq8jozT k0VA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wV9JIaQ1wBtGrKatKMSlm9x1+wmCPPD38VPTmVEeaog=; b=uHGPSxhIOcUDij+gy2ZFSHyoBvhGGPepTxwOX6vUNu5NM49OIlZgqtEi/5fV5xG7Rr pi8tNE/M+lKC7bFh9b4yyQx5Sa9eMJQhUd4W24CyuYWHsn8EV/fcWnDiAvKpEOdqwe8u 976nKLcTRbvakEIYaoGGisAxoclxjm6/cW2pjKPTu64jMJgNcDBnVA+VgLKeOyd+WdQx woreURoDi7e4pkc49pIm1S2bOLg01vSh0FV/H/iYf/JOLvNzElBr3oJqxc8XYWwCcaWa fRUnkpqqACysM7c7AiaS9bEkpV+G3l+mjfwyimiNVfZIumCFk8I194LkXPuszSlP1kOl SxwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pK7KKahx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id he9-20020a1709073d8900b00710a459160bsi26198936ejc.219.2022.06.23.10.12.01; Thu, 23 Jun 2022 10:12:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pK7KKahx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231348AbiFWQ7r (ORCPT + 99 others); Thu, 23 Jun 2022 12:59:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48972 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233118AbiFWQuN (ORCPT ); Thu, 23 Jun 2022 12:50:13 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE4284EA18; Thu, 23 Jun 2022 09:48:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id DA3BAB8248E; Thu, 23 Jun 2022 16:48:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3E747C3411B; Thu, 23 Jun 2022 16:48:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1656002894; bh=gJIh6DziEVd+6iAQZZ06VpGFjivFBs5JM1Ure0kb+uc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pK7KKahxEXtfdoZxfUfbZ200oCBz7Qsi2X7lE+OKxgiU3LWDcBQP6qHoNczQl68ey HVz4ezqEGPv5aMZE5EfzUST5OVMaUOwTUYvXQgL5HPeulN5eth/b75bMgZntzDgSwU GEiB/GcaYHPCEv8etqR8RcsCpD56vrE6ivhHgzrQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andy Lutomirski , Theodore Tso , "Jason A. Donenfeld" Subject: [PATCH 4.9 061/264] random: remove kernel.random.read_wakeup_threshold Date: Thu, 23 Jun 2022 18:40:54 +0200 Message-Id: <20220623164345.799251671@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220623164344.053938039@linuxfoundation.org> References: <20220623164344.053938039@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andy Lutomirski commit c95ea0c69ffda19381c116db2be23c7e654dac98 upstream. It has no effect any more, so remove it. We can revert this if there is some user code that expects to be able to set this sysctl. Signed-off-by: Andy Lutomirski Link: https://lore.kernel.org/r/a74ed2cf0b5a5451428a246a9239f5bc4e29358f.1577088521.git.luto@kernel.org Signed-off-by: Theodore Ts'o Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 18 +----------------- 1 file changed, 1 insertion(+), 17 deletions(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -371,12 +371,6 @@ #define ENTROPY_BITS(r) ((r)->entropy_count >> ENTROPY_SHIFT) /* - * The minimum number of bits of entropy before we wake up a read on - * /dev/random. Should be enough to do a significant reseed. - */ -static int random_read_wakeup_bits = 64; - -/* * If the entropy count falls under this number of bits, then we * should wake up processes which are selecting or polling on write * access to /dev/random. @@ -2061,8 +2055,7 @@ SYSCALL_DEFINE3(getrandom, char __user * #include -static int min_read_thresh = 8, min_write_thresh; -static int max_read_thresh = OUTPUT_POOL_WORDS * 32; +static int min_write_thresh; static int max_write_thresh = INPUT_POOL_WORDS * 32; static int random_min_urandom_seed = 60; static char sysctl_bootid[16]; @@ -2138,15 +2131,6 @@ struct ctl_table random_table[] = { .data = &input_pool.entropy_count, }, { - .procname = "read_wakeup_threshold", - .data = &random_read_wakeup_bits, - .maxlen = sizeof(int), - .mode = 0644, - .proc_handler = proc_dointvec_minmax, - .extra1 = &min_read_thresh, - .extra2 = &max_read_thresh, - }, - { .procname = "write_wakeup_threshold", .data = &random_write_wakeup_bits, .maxlen = sizeof(int),