summaryrefslogtreecommitdiffstats
path: root/drivers/char/hw_random/virtio-rng.c
diff options
context:
space:
mode:
authorAmit Shah <amit.shah@redhat.com>2014-08-12 00:05:41 +0530
committerAmit Shah <amit.shah@redhat.com>2014-08-15 10:26:01 +0530
commit34679ec7a0c45da8161507e1f2e1f72749dfd85c (patch)
tree32d2bbfdfbf2104e2eff82086afde2fcec235cf0 /drivers/char/hw_random/virtio-rng.c
parentc9d26423e56ce1ab4d786f92aebecf859d419293 (diff)
downloadtalos-op-linux-34679ec7a0c45da8161507e1f2e1f72749dfd85c.tar.gz
talos-op-linux-34679ec7a0c45da8161507e1f2e1f72749dfd85c.zip
virtio: rng: add derating factor for use by hwrng core
The khwrngd thread is started when a hwrng device of sufficient quality is registered. The virtio-rng device is backed by the hypervisor, and we trust the hypervisor to provide real entropy. A malicious or badly-implemented hypervisor is a scenario that's irrelevant -- such a setup is bound to cause all sorts of badness, and a compromised hwrng is the least of the user's worries. Given this, we might as well assume that the quality of randomness we receive is perfectly trustworthy. Hence, we use 100% for the factor, indicating maximum confidence in the source. Signed-off-by: Amit Shah <amit.shah@redhat.com> Reviewed-by: H. Peter Anvin <hpa@linux.intel.com> Reviewed-by: Amos Kong <akong@redhat.com> Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
Diffstat (limited to 'drivers/char/hw_random/virtio-rng.c')
-rw-r--r--drivers/char/hw_random/virtio-rng.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/drivers/char/hw_random/virtio-rng.c b/drivers/char/hw_random/virtio-rng.c
index 0027137daa56..2e3139eda93b 100644
--- a/drivers/char/hw_random/virtio-rng.c
+++ b/drivers/char/hw_random/virtio-rng.c
@@ -116,6 +116,7 @@ static int probe_common(struct virtio_device *vdev)
.cleanup = virtio_cleanup,
.priv = (unsigned long)vi,
.name = vi->name,
+ .quality = 1000,
};
vdev->priv = vi;
OpenPOWER on IntegriCloud