public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Entropy poolsize
@ 2010-06-21 13:58 Weedy
  2010-06-21 15:51 ` Randy Dunlap
  0 siblings, 1 reply; 4+ messages in thread
From: Weedy @ 2010-06-21 13:58 UTC (permalink / raw)
  To: linux-kernel

I know grsecurity has a option for this but I don't want to patch my
kernel with it at this time. I have been poking around random.c but I
can't seem to figure out where .poolsize is assigned it's value and
how to increase it.

If someone could point it out that would be nice.

Thank you for your time.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Entropy poolsize
  2010-06-21 13:58 Entropy poolsize Weedy
@ 2010-06-21 15:51 ` Randy Dunlap
       [not found]   ` <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com>
  0 siblings, 1 reply; 4+ messages in thread
From: Randy Dunlap @ 2010-06-21 15:51 UTC (permalink / raw)
  To: Weedy; +Cc: linux-kernel

On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:

> I know grsecurity has a option for this but I don't want to patch my
> kernel with it at this time. I have been poking around random.c but I
> can't seem to figure out where .poolsize is assigned it's value and
> how to increase it.
> 
> If someone could point it out that would be nice.
> 
> Thank you for your time.
> --

Do you mean this one in drivers/char/random.c or something else?

static int sysctl_poolsize = INPUT_POOL_WORDS * 32;

It's a sysctl, so it is tunable.

---
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Entropy poolsize
       [not found]       ` <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com>
@ 2010-06-22 23:21         ` Weedy
  2010-07-04 19:00           ` Weedy
  0 siblings, 1 reply; 4+ messages in thread
From: Weedy @ 2010-06-22 23:21 UTC (permalink / raw)
  To: linux-kernel

Man I need to remember to hit reply-to-all

On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
> On 06/21/10 12:48, Weedy wrote:
>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
>>>
>>>> I know grsecurity has a option for this but I don't want to patch my
>>>> kernel with it at this time. I have been poking around random.c but I
>>>> can't seem to figure out where .poolsize is assigned it's value and
>>>> how to increase it.
>>>>
>>>> If someone could point it out that would be nice.
>>>>
>>>> Thank you for your time.
>>>> --
>>>
>>> Do you mean this one in drivers/char/random.c or something else?
>>>
>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
>>>
>>> It's a sysctl, so it is tunable.
>> It's locked, some kind of security risk many kernels ago. I'll try
>> changing that but I thought I tried it once before.
>
> Ah, it's mode is 0444 (read-only).  Sorry I missed that piece.
> Sure, you could change the mode for your own use (rebuild the kernel).

 # cat /proc/sys/kernel/random/poolsize
16384
cat /proc/sys/kernel/random/entropy_avail
4096

I guess there is more to it.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Entropy poolsize
  2010-06-22 23:21         ` Weedy
@ 2010-07-04 19:00           ` Weedy
  0 siblings, 0 replies; 4+ messages in thread
From: Weedy @ 2010-07-04 19:00 UTC (permalink / raw)
  To: linux-kernel

On Tue, Jun 22, 2010 at 7:21 PM, Weedy <weedy2887@gmail.com> wrote:
> Man I need to remember to hit reply-to-all
>
> On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
>> On 06/21/10 12:48, Weedy wrote:
>>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote:
>>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote:
>>>>
>>>>> I know grsecurity has a option for this but I don't want to patch my
>>>>> kernel with it at this time. I have been poking around random.c but I
>>>>> can't seem to figure out where .poolsize is assigned it's value and
>>>>> how to increase it.
>>>>>
>>>>> If someone could point it out that would be nice.
>>>>>
>>>>> Thank you for your time.
>>>>> --
>>>>
>>>> Do you mean this one in drivers/char/random.c or something else?
>>>>
>>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32;
>>>>
>>>> It's a sysctl, so it is tunable.
>>> It's locked, some kind of security risk many kernels ago. I'll try
>>> changing that but I thought I tried it once before.
>>
>> Ah, it's mode is 0444 (read-only).  Sorry I missed that piece.
>> Sure, you could change the mode for your own use (rebuild the kernel).
>
>  # cat /proc/sys/kernel/random/poolsize
> 16384
> cat /proc/sys/kernel/random/entropy_avail
> 4096
>
> I guess there is more to it.
>

Bump

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2010-07-04 19:00 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-06-21 13:58 Entropy poolsize Weedy
2010-06-21 15:51 ` Randy Dunlap
     [not found]   ` <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com>
     [not found]     ` <4C1FC3EE.8040003@oracle.com>
     [not found]       ` <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com>
2010-06-22 23:21         ` Weedy
2010-07-04 19:00           ` Weedy

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox