1. 17 Jan, 2005 14 commits
  2. 16 Jan, 2005 20 commits
  3. 15 Jan, 2005 6 commits
    • Matthew Wilcox's avatar
      [PATCH] Generic IRQ support for PA-RISC · 8953e802
      Matthew Wilcox authored
      Make PA-RISC use the generic interrupt handling code.  We need one tiny
      change to the generic code -- the addition of a data pointer to irq_desc.
      This shouldn't be a problem in terms of increasing size of irq_desc for
      other architectures as the struct is cacheline aligned.  It's now 32
      bytes on 32-bit platforms and 44/48 bytes on 64-bit platforms (assuming
      spinlock_t is 4 bytes on 32-bit and 4 or 8 bytes on 64-bit).
      Signed-off-by: default avatarMatthew Wilcox <matthew@wil.cx>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      8953e802
    • Vadim Lobanov's avatar
      ad8c410c
    • Gabor Egry's avatar
      [PATCH] various Kconfig fixes · b6efa0d0
      Gabor Egry authored
      Here are some Kconfig fixes:
      
      - typo fixes
      - unused token removes (empty or duplicated  'help')
      - non ASCII characters replaces
      - e-mail address and URL format corrections
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      b6efa0d0
    • Matt Mackall's avatar
      [PATCH] random: add_input_randomness · 17d2208b
      Matt Mackall authored
      The input layer wants to send us an entropy event per input event and who are
      we to argue?  Create add_input_randomness with an input-friendly interface and
      kill the remaining two keyboard and mouse sources.
      
      This eliminates lots of duplicate entropy events while covering all the input
      bases nicely.  We now get two events per keystroke as we should, one down and
      one up.
      Signed-off-by: default avatarMatt Mackall <mpm@selenic.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      17d2208b
    • Matt Mackall's avatar
      [PATCH] random: periodicity detection fix · 257fd23f
      Matt Mackall authored
      The input layer is now sending us a bunch of events in a row for each actual
      event.  This shows up weaknesses in the periodicity detector and using the
      high clock rate from get_clock: each keystroke is getting accounted as 10
      different maximal-entropy events.
      
      A brief touch on a trackpad will generate as much as 2000 maximal entropy
      events which is more than 2k of /dev/random output.  IOW, we're WAY
      overestimating input entropy.  Here's one keystroke:
      
      random 0024 0000 0000: mouse event
      random 0035 0000 0000: added 11 entropy credits to input
      random 0035 0000 0000: mouse event
      random 0046 0000 0000: added 11 entropy credits to input
      random 0046 0000 0000: mouse event
      random 0056 0000 0000: added 10 entropy credits to input
      random 0056 0000 0000: keyboard event
      random 0067 0000 0000: added 11 entropy credits to input
      random 0067 0000 0000: mouse event
      random 0078 0000 0000: added 11 entropy credits to input
      random 0078 0000 0000: awake
      random 0078 0000 0000: reading 128 bits
      random 0078 0000 0000: going to reseed blocking with 128 bits (128 of 0 requested)
      random 0078 0000 0000: trying to extract 128 bits from input
      random 0006 0000 0000: debiting 72 entropy credits from input
      random 0006 0072 0000: added 72 entropy credits to blocking
      random 0006 0072 0000: trying to extract 128 bits from blocking
      random 0006 0000 0000: debiting 72 entropy credits from blocking
      random 0006 0000 0000: read got 72 bits (56 still needed)
      random 0006 0000 0000: reading 56 bits
      random 0006 0000 0000: going to reseed blocking with 64 bits (56 of 0 requested
      random 0006 0000 0000: trying to extract 64 bits from input
      random 0006 0000 0000: debiting 0 entropy credits from input
      random 0006 0000 0000: trying to extract 56 bits from blocking
      random 0006 0000 0000: debiting 0 entropy credits from blocking
      random 0006 0000 0000: read got 0 bits (56 still needed)
      random 0006 0000 0000: sleeping
      random 0006 0000 0000: mouse event
      random 0017 0000 0000: added 11 entropy credits to input
      random 0017 0000 0000: mouse event
      random 0028 0000 0000: added 11 entropy credits to input
      random 0028 0000 0000: mouse event
      random 0038 0000 0000: added 10 entropy credits to input
      random 0038 0000 0000: keyboard event
      random 0049 0000 0000: added 11 entropy credits to input
      random 0049 0000 0000: mouse event
      random 0060 0000 0000: added 11 entropy credits to input
      
      The first step to fixing this is to check periodicity and estimate entropy
      against a slow clock like jiffies.  We continue to mix in get_clock() rather
      than jiffies where available.
      
      This throws away most of the duplicate events and gives us more sensible
      entropy estimates, but we still duplicates from input.c and keyboard.c.
      Signed-off-by: default avatarMatt Mackall <mpm@selenic.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      257fd23f
    • Matt Mackall's avatar
      [PATCH] random: run-time configurable debugging · 354c31a7
      Matt Mackall authored
      Add run-time switchable entropy debugging.  Entire debug infrastructure
      remains compiled out by default.
      Signed-off-by: default avatarMatt Mackall <mpm@selenic.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      354c31a7