* Entropy poolsize @ 2010-06-21 13:58 Weedy 2010-06-21 15:51 ` Randy Dunlap 0 siblings, 1 reply; 4+ messages in thread From: Weedy @ 2010-06-21 13:58 UTC (permalink / raw) To: linux-kernel I know grsecurity has a option for this but I don't want to patch my kernel with it at this time. I have been poking around random.c but I can't seem to figure out where .poolsize is assigned it's value and how to increase it. If someone could point it out that would be nice. Thank you for your time. ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Entropy poolsize 2010-06-21 13:58 Entropy poolsize Weedy @ 2010-06-21 15:51 ` Randy Dunlap [not found] ` <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com> 0 siblings, 1 reply; 4+ messages in thread From: Randy Dunlap @ 2010-06-21 15:51 UTC (permalink / raw) To: Weedy; +Cc: linux-kernel On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote: > I know grsecurity has a option for this but I don't want to patch my > kernel with it at this time. I have been poking around random.c but I > can't seem to figure out where .poolsize is assigned it's value and > how to increase it. > > If someone could point it out that would be nice. > > Thank you for your time. > -- Do you mean this one in drivers/char/random.c or something else? static int sysctl_poolsize = INPUT_POOL_WORDS * 32; It's a sysctl, so it is tunable. --- ~Randy *** Remember to use Documentation/SubmitChecklist when testing your code *** ^ permalink raw reply [flat|nested] 4+ messages in thread
[parent not found: <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com>]
[parent not found: <4C1FC3EE.8040003@oracle.com>]
[parent not found: <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com>]
* Re: Entropy poolsize [not found] ` <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com> @ 2010-06-22 23:21 ` Weedy 2010-07-04 19:00 ` Weedy 0 siblings, 1 reply; 4+ messages in thread From: Weedy @ 2010-06-22 23:21 UTC (permalink / raw) To: linux-kernel Man I need to remember to hit reply-to-all On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <randy.dunlap@oracle.com> wrote: > On 06/21/10 12:48, Weedy wrote: >> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote: >>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote: >>> >>>> I know grsecurity has a option for this but I don't want to patch my >>>> kernel with it at this time. I have been poking around random.c but I >>>> can't seem to figure out where .poolsize is assigned it's value and >>>> how to increase it. >>>> >>>> If someone could point it out that would be nice. >>>> >>>> Thank you for your time. >>>> -- >>> >>> Do you mean this one in drivers/char/random.c or something else? >>> >>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32; >>> >>> It's a sysctl, so it is tunable. >> It's locked, some kind of security risk many kernels ago. I'll try >> changing that but I thought I tried it once before. > > Ah, it's mode is 0444 (read-only). Sorry I missed that piece. > Sure, you could change the mode for your own use (rebuild the kernel). # cat /proc/sys/kernel/random/poolsize 16384 cat /proc/sys/kernel/random/entropy_avail 4096 I guess there is more to it. ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Entropy poolsize 2010-06-22 23:21 ` Weedy @ 2010-07-04 19:00 ` Weedy 0 siblings, 0 replies; 4+ messages in thread From: Weedy @ 2010-07-04 19:00 UTC (permalink / raw) To: linux-kernel On Tue, Jun 22, 2010 at 7:21 PM, Weedy <weedy2887@gmail.com> wrote: > Man I need to remember to hit reply-to-all > > On Mon, Jun 21, 2010 at 3:56 PM, Randy Dunlap <randy.dunlap@oracle.com> wrote: >> On 06/21/10 12:48, Weedy wrote: >>> On Mon, Jun 21, 2010 at 11:51 AM, Randy Dunlap <randy.dunlap@oracle.com> wrote: >>>> On Mon, 21 Jun 2010 09:58:16 -0400 Weedy wrote: >>>> >>>>> I know grsecurity has a option for this but I don't want to patch my >>>>> kernel with it at this time. I have been poking around random.c but I >>>>> can't seem to figure out where .poolsize is assigned it's value and >>>>> how to increase it. >>>>> >>>>> If someone could point it out that would be nice. >>>>> >>>>> Thank you for your time. >>>>> -- >>>> >>>> Do you mean this one in drivers/char/random.c or something else? >>>> >>>> static int sysctl_poolsize = INPUT_POOL_WORDS * 32; >>>> >>>> It's a sysctl, so it is tunable. >>> It's locked, some kind of security risk many kernels ago. I'll try >>> changing that but I thought I tried it once before. >> >> Ah, it's mode is 0444 (read-only). Sorry I missed that piece. >> Sure, you could change the mode for your own use (rebuild the kernel). > > # cat /proc/sys/kernel/random/poolsize > 16384 > cat /proc/sys/kernel/random/entropy_avail > 4096 > > I guess there is more to it. > Bump ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2010-07-04 19:00 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-06-21 13:58 Entropy poolsize Weedy
2010-06-21 15:51 ` Randy Dunlap
[not found] ` <AANLkTinQclZGMIcn2VgTH6yd-hUJ_L7Ku7UpuVVBapIG@mail.gmail.com>
[not found] ` <4C1FC3EE.8040003@oracle.com>
[not found] ` <AANLkTil6E0sA-x9AtIyAU6LGzIi42iyhjITkfVZ2Kxri@mail.gmail.com>
2010-06-22 23:21 ` Weedy
2010-07-04 19:00 ` Weedy
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox