[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1597982.NXJbFZcdAH@positron.chronox.de>
Date: Sun, 24 Apr 2016 12:42:57 +0200
From: Stephan Mueller <smueller@...onox.de>
To: herbert@...dor.apana.org.au, Theodore Tso <tytso@....edu>
Cc: sandyinchina@...il.com, Jason Cooper <jason@...edaemon.net>,
John Denker <jsd@...n.com>, "H. Peter Anvin" <hpa@...or.com>,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH v2 5/6] crypto: LRNG - hook LRNG into interrupt handler
The LRNG places a callback into the interrupt handler to be triggered
for each interrupt. With this callback, entropy is collected.
Signed-off-by: Stephan Mueller <smueller@...onox.de>
---
kernel/irq/handle.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/kernel/irq/handle.c b/kernel/irq/handle.c
index a15b548..8d64e37 100644
--- a/kernel/irq/handle.c
+++ b/kernel/irq/handle.c
@@ -175,6 +175,7 @@ irqreturn_t handle_irq_event_percpu(struct irq_desc *desc)
}
add_interrupt_randomness(irq, flags);
+ lrng_irq_process();
if (!noirqdebug)
note_interrupt(desc, retval);
--
2.5.5
Powered by blists - more mailing lists