* Entropy poolsize
@ 2010-06-21 13:58 Weedy
2010-06-21 15:51 ` Randy Dunlap
0 siblings, 1 reply; 4+ messages in thread
From: Weedy @ 2010-06-21 13:58 UTC (permalink / raw)
To: linux-kernel
I know grsecurity has a option for this but I don't want to patch my
kernel with it at this time. I have been poking around random.c but I
can't seem to figure out where .poolsize is assigned it's value and
how to increase it.
If someone could point it out that would be nice.
Thank you for your time.
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Entropy poolsize
2010-06-21 13:58 Entropy poolsize Weedy
@ 2010-06-21 15:51 ` Randy Dunlap
[not found] ` <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com>
0 siblings, 1 reply; 4+ messages in thread
From: Randy Dunlap @ 2010-06-21 15:51 UTC (permalink / raw)
To: Weedy; +Cc: linux-kernel
On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
> I know grsecurity has a option for this but I don't want to patch my
> kernel with it at this time. I have been poking around random.c but I
> can't seem to figure out where .poolsize is assigned it's value and
> how to increase it.
>
> If someone could point it out that would be nice.
>
> Thank you for your time.
> --
Do you mean this one in drivers/char/random.c or something else?
static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
It's a sysctl, so it is tunable.
---
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Entropy poolsize
[not found] ` <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com>
@ 2010-06-22 23:21 ` Weedy
2010-07-04 19:00 ` Weedy
0 siblings, 1 reply; 4+ messages in thread
From: Weedy @ 2010-06-22 23:21 UTC (permalink / raw)
To: linux-kernel
Man I need to remember to hit reply-to-all
On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
> On 06/21/10 12:48, Weedy wrote:
>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
>>>
>>>> I know grsecurity has a option for this but I don't want to patch my
>>>> kernel with it at this time. I have been poking around random.c but I
>>>> can't seem to figure out where .poolsize is assigned it's value and
>>>> how to increase it.
>>>>
>>>> If someone could point it out that would be nice.
>>>>
>>>> Thank you for your time.
>>>> --
>>>
>>> Do you mean this one in drivers/char/random.c or something else?
>>>
>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
>>>
>>> It's a sysctl, so it is tunable.
>> It's locked, some kind of security risk many kernels ago. I'll try
>> changing that but I thought I tried it once before.
>
> Ah, it's mode is 0444 (read-only). Sorry I missed that piece.
> Sure, you could change the mode for your own use (rebuild the kernel).
# cat /proc/sys/kernel/random/poolsize
16384
cat /proc/sys/kernel/random/entropy_avail
4096
I guess there is more to it.
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Entropy poolsize
2010-06-22 23:21 ` Weedy
@ 2010-07-04 19:00 ` Weedy
0 siblings, 0 replies; 4+ messages in thread
From: Weedy @ 2010-07-04 19:00 UTC (permalink / raw)
To: linux-kernel
On Tue, Jun 22, 2010 at 7:21 PM, Weedy <weedy2887@gmail.com> wrote:
> Man I need to remember to hit reply-to-all
>
> On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
>> On 06/21/10 12:48, Weedy wrote:
>>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
>>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
>>>>
>>>>> I know grsecurity has a option for this but I don't want to patch my
>>>>> kernel with it at this time. I have been poking around random.c but I
>>>>> can't seem to figure out where .poolsize is assigned it's value and
>>>>> how to increase it.
>>>>>
>>>>> If someone could point it out that would be nice.
>>>>>
>>>>> Thank you for your time.
>>>>> --
>>>>
>>>> Do you mean this one in drivers/char/random.c or something else?
>>>>
>>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
>>>>
>>>> It's a sysctl, so it is tunable.
>>> It's locked, some kind of security risk many kernels ago. I'll try
>>> changing that but I thought I tried it once before.
>>
>> Ah, it's mode is 0444 (read-only). Sorry I missed that piece.
>> Sure, you could change the mode for your own use (rebuild the kernel).
>
> # cat /proc/sys/kernel/random/poolsize
> 16384
> cat /proc/sys/kernel/random/entropy_avail
> 4096
>
> I guess there is more to it.
>
Bump
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2010-07-04 19:00 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-06-21 13:58 Entropy poolsize Weedy
2010-06-21 15:51 ` Randy Dunlap
[not found] ` <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com>
[not found] ` <4C1FC3EE.8040003@oracle.com>
[not found] ` <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com>
2010-06-22 23:21 ` Weedy
2010-07-04 19:00 ` Weedy
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox