Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1761312AbZDGVjW (ORCPT ); Tue, 7 Apr 2009 17:39:22 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1757205AbZDGVjJ (ORCPT ); Tue, 7 Apr 2009 17:39:09 -0400 Received: from yx-out-2324.google.com ([74.125.44.30]:54278 "EHLO yx-out-2324.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755451AbZDGVjI (ORCPT ); Tue, 7 Apr 2009 17:39:08 -0400 MIME-Version: 1.0 In-Reply-To: <1239116251.14392.133.camel@calx> References: <200904061430.26276.rgetz@blackfin.uclinux.org> <1239044483.14392.55.camel@calx> <200904070716.25846.rgetz@blackfin.uclinux.org> <1239116251.14392.133.camel@calx> Date: Tue, 7 Apr 2009 14:39:05 -0700 Message-ID: Subject: Re: IRQF_SAMPLE_RANDOM question... From: Chris Peterson To: Matt Mackall Cc: Robin Getz , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 990 Lines: 19 1. Are there any new add_*_randomness() functions that could be added? Some userspace daemons like EGD (running as root) feed random system info (e.g. vmstat) into /dev/random. But how many Linux distros actually run entropy-gathering daemons by default? Would /dev/random be more secure if entropy-gathering daemons were replaced with new kernel functions like add_vmstat_randomness() or add_ps_randomness()? 2. Are there any other functions that could be calling the existing add_*_randomness() functions? Currently: * add_input_randomness() is called from input_event(). * add_interrupt_randomess() is called from handle_IRQ_event() if IRQF_SAMPLE_RANDOM is set. * add_disk_randomness() is called from blk_end_io() and __blk_end_request(). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/