362
362
* To allow fractional bits to be tracked, the entropy_count field is
363
363
* denominated in units of 1/8th bits.
364
364
*
365
- * 2*(ENTROPY_SHIFT + poolbitshift) must <= 31, or the multiply in
365
+ * 2*(POOL_ENTROPY_SHIFT + poolbitshift) must <= 31, or the multiply in
366
366
* credit_entropy_bits() needs to be 64 bits wide.
367
367
*/
368
- #define ENTROPY_SHIFT 3
369
- #define ENTROPY_BITS () (input_pool.entropy_count >> ENTROPY_SHIFT )
368
+ #define POOL_ENTROPY_SHIFT 3
369
+ #define POOL_ENTROPY_BITS () (input_pool.entropy_count >> POOL_ENTROPY_SHIFT )
370
370
371
371
/*
372
372
* If the entropy count falls under this number of bits, then we
@@ -426,7 +426,7 @@ enum poolinfo {
426
426
POOL_BYTES = POOL_WORDS * sizeof (u32 ),
427
427
POOL_BITS = POOL_BYTES * 8 ,
428
428
POOL_BITSHIFT = ilog2 (POOL_WORDS ) + 5 ,
429
- POOL_FRACBITS = POOL_WORDS << (ENTROPY_SHIFT + 5 ),
429
+ POOL_FRACBITS = POOL_WORDS << (POOL_ENTROPY_SHIFT + 5 ),
430
430
431
431
/* x^128 + x^104 + x^76 + x^51 +x^25 + x + 1 */
432
432
POOL_TAP1 = 104 ,
@@ -650,7 +650,7 @@ static void process_random_ready_list(void)
650
650
static void credit_entropy_bits (int nbits )
651
651
{
652
652
int entropy_count , entropy_bits , orig ;
653
- int nfrac = nbits << ENTROPY_SHIFT ;
653
+ int nfrac = nbits << POOL_ENTROPY_SHIFT ;
654
654
655
655
if (!nbits )
656
656
return ;
@@ -683,7 +683,7 @@ static void credit_entropy_bits(int nbits)
683
683
* turns no matter how large nbits is.
684
684
*/
685
685
int pnfrac = nfrac ;
686
- const int s = POOL_BITSHIFT + ENTROPY_SHIFT + 2 ;
686
+ const int s = POOL_BITSHIFT + POOL_ENTROPY_SHIFT + 2 ;
687
687
/* The +2 corresponds to the /4 in the denominator */
688
688
689
689
do {
@@ -704,9 +704,9 @@ static void credit_entropy_bits(int nbits)
704
704
if (cmpxchg (& input_pool .entropy_count , orig , entropy_count ) != orig )
705
705
goto retry ;
706
706
707
- trace_credit_entropy_bits (nbits , entropy_count >> ENTROPY_SHIFT , _RET_IP_ );
707
+ trace_credit_entropy_bits (nbits , entropy_count >> POOL_ENTROPY_SHIFT , _RET_IP_ );
708
708
709
- entropy_bits = entropy_count >> ENTROPY_SHIFT ;
709
+ entropy_bits = entropy_count >> POOL_ENTROPY_SHIFT ;
710
710
if (crng_init < 2 && entropy_bits >= 128 )
711
711
crng_reseed (& primary_crng , true);
712
712
}
@@ -1187,7 +1187,7 @@ void add_input_randomness(unsigned int type, unsigned int code,
1187
1187
last_value = value ;
1188
1188
add_timer_randomness (& input_timer_state ,
1189
1189
(type << 4 ) ^ code ^ (code >> 4 ) ^ value );
1190
- trace_add_input_randomness (ENTROPY_BITS ());
1190
+ trace_add_input_randomness (POOL_ENTROPY_BITS ());
1191
1191
}
1192
1192
EXPORT_SYMBOL_GPL (add_input_randomness );
1193
1193
@@ -1286,7 +1286,7 @@ void add_disk_randomness(struct gendisk *disk)
1286
1286
return ;
1287
1287
/* first major is 1, so we get >= 0x200 here */
1288
1288
add_timer_randomness (disk -> random , 0x100 + disk_devt (disk ));
1289
- trace_add_disk_randomness (disk_devt (disk ), ENTROPY_BITS ());
1289
+ trace_add_disk_randomness (disk_devt (disk ), POOL_ENTROPY_BITS ());
1290
1290
}
1291
1291
EXPORT_SYMBOL_GPL (add_disk_randomness );
1292
1292
#endif
@@ -1313,7 +1313,7 @@ static size_t account(size_t nbytes, int min)
1313
1313
entropy_count = orig = READ_ONCE (input_pool .entropy_count );
1314
1314
ibytes = nbytes ;
1315
1315
/* never pull more than available */
1316
- have_bytes = entropy_count >> (ENTROPY_SHIFT + 3 );
1316
+ have_bytes = entropy_count >> (POOL_ENTROPY_SHIFT + 3 );
1317
1317
1318
1318
if (have_bytes < 0 )
1319
1319
have_bytes = 0 ;
@@ -1325,7 +1325,7 @@ static size_t account(size_t nbytes, int min)
1325
1325
pr_warn ("negative entropy count: count %d\n" , entropy_count );
1326
1326
entropy_count = 0 ;
1327
1327
}
1328
- nfrac = ibytes << (ENTROPY_SHIFT + 3 );
1328
+ nfrac = ibytes << (POOL_ENTROPY_SHIFT + 3 );
1329
1329
if ((size_t ) entropy_count > nfrac )
1330
1330
entropy_count -= nfrac ;
1331
1331
else
@@ -1335,7 +1335,7 @@ static size_t account(size_t nbytes, int min)
1335
1335
goto retry ;
1336
1336
1337
1337
trace_debit_entropy (8 * ibytes );
1338
- if (ibytes && ENTROPY_BITS () < random_write_wakeup_bits ) {
1338
+ if (ibytes && POOL_ENTROPY_BITS () < random_write_wakeup_bits ) {
1339
1339
wake_up_interruptible (& random_write_wait );
1340
1340
kill_fasync (& fasync , SIGIO , POLL_OUT );
1341
1341
}
@@ -1423,7 +1423,7 @@ static ssize_t _extract_entropy(void *buf, size_t nbytes)
1423
1423
*/
1424
1424
static ssize_t extract_entropy (void * buf , size_t nbytes , int min )
1425
1425
{
1426
- trace_extract_entropy (nbytes , ENTROPY_BITS (), _RET_IP_ );
1426
+ trace_extract_entropy (nbytes , POOL_ENTROPY_BITS (), _RET_IP_ );
1427
1427
nbytes = account (nbytes , min );
1428
1428
return _extract_entropy (buf , nbytes );
1429
1429
}
@@ -1749,9 +1749,9 @@ urandom_read_nowarn(struct file *file, char __user *buf, size_t nbytes,
1749
1749
{
1750
1750
int ret ;
1751
1751
1752
- nbytes = min_t (size_t , nbytes , INT_MAX >> (ENTROPY_SHIFT + 3 ));
1752
+ nbytes = min_t (size_t , nbytes , INT_MAX >> (POOL_ENTROPY_SHIFT + 3 ));
1753
1753
ret = extract_crng_user (buf , nbytes );
1754
- trace_urandom_read (8 * nbytes , 0 , ENTROPY_BITS ());
1754
+ trace_urandom_read (8 * nbytes , 0 , POOL_ENTROPY_BITS ());
1755
1755
return ret ;
1756
1756
}
1757
1757
@@ -1791,7 +1791,7 @@ random_poll(struct file *file, poll_table * wait)
1791
1791
mask = 0 ;
1792
1792
if (crng_ready ())
1793
1793
mask |= EPOLLIN | EPOLLRDNORM ;
1794
- if (ENTROPY_BITS () < random_write_wakeup_bits )
1794
+ if (POOL_ENTROPY_BITS () < random_write_wakeup_bits )
1795
1795
mask |= EPOLLOUT | EPOLLWRNORM ;
1796
1796
return mask ;
1797
1797
}
@@ -1847,7 +1847,7 @@ static long random_ioctl(struct file *f, unsigned int cmd, unsigned long arg)
1847
1847
switch (cmd ) {
1848
1848
case RNDGETENTCNT :
1849
1849
/* inherently racy, no point locking */
1850
- ent_count = ENTROPY_BITS ();
1850
+ ent_count = POOL_ENTROPY_BITS ();
1851
1851
if (put_user (ent_count , p ))
1852
1852
return - EFAULT ;
1853
1853
return 0 ;
@@ -2005,7 +2005,7 @@ static int proc_do_entropy(struct ctl_table *table, int write,
2005
2005
struct ctl_table fake_table ;
2006
2006
int entropy_count ;
2007
2007
2008
- entropy_count = * (int * )table -> data >> ENTROPY_SHIFT ;
2008
+ entropy_count = * (int * )table -> data >> POOL_ENTROPY_SHIFT ;
2009
2009
2010
2010
fake_table .data = & entropy_count ;
2011
2011
fake_table .maxlen = sizeof (entropy_count );
@@ -2224,7 +2224,7 @@ void add_hwgenerator_randomness(const char *buffer, size_t count,
2224
2224
*/
2225
2225
wait_event_interruptible (random_write_wait ,
2226
2226
!system_wq || kthread_should_stop () ||
2227
- ENTROPY_BITS () <= random_write_wakeup_bits );
2227
+ POOL_ENTROPY_BITS () <= random_write_wakeup_bits );
2228
2228
mix_pool_bytes (buffer , count );
2229
2229
credit_entropy_bits (entropy );
2230
2230
}
0 commit comments