From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Message-ID: <51794141.3070205@zytor.com> Date: Thu, 25 Apr 2013 07:44:17 -0700 From: "H. Peter Anvin" MIME-Version: 1.0 To: Linus Torvalds CC: "Ted Ts'o" , DJ Johnston , Linux Kernel Mailing List , "H. Peter Anvin" , stable Subject: Re: [PATCH 2/2] random: Account for entropy loss due to overwrites References: <1366777569-23192-1-git-send-email-hpa@zytor.com> <1366777569-23192-3-git-send-email-hpa@zytor.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: On 04/25/2013 07:38 AM, Linus Torvalds wrote: > This doesn't work AT ALL. You even hint at the reason why in your message. > > On Tue, Apr 23, 2013 at 9:26 PM, H. Peter Anvin wrote: >> >> As such, this conservatism seems more than justified. Note, however, >> that attempting to add one bit of entropy will never succeed; nor will >> two bits unless the pool is completely empty. These roundoff >> artifacts could be improved by using fixed-point arithmetic and adding >> some number of fractional entropy bits. > > Take a look at "add_interrupt_randomness()". Hmm.. > Right. Before July of last year add_interrupt_randomness() called add_timer_randomness() which credits up to 11 bits, but not anymore. -ESTALEBRAIN. OK, so we need to track fractional bits. -hpa