Matt Mackall wrote:
> [network adapters are] a great source of potential entropy, a bad
> source of guaranteed entropy. The current RNG tries to do
> accounting on the latter. Accounting on the former is extremely
> suspect.

So we need a patch that:

- Deletes the IRQF_SAMPLE_RANDOM mention in feature-removal-schedule.txt,

- Restores instances of IRQF_SAMPLE_RANDOM in drivers, and

- Changes the credit_entropy_bits() to credit less entropy*.

* The code seems to only handle integer values of entropy. Maybe when crediting, choose between 1 and 0 credits. Then once that kernel makes it into the field, a bunch of entropy starved machines will no longer be entropy starved. A few machines that are run by people who worship an entropy estimate will still have to install mice and users, explicit RNGs, etc., but entropy will flow.

Make sense?


-kb



--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to