Apropos of nothing...
More to keep a note for myself (and for anyone googling) than anything involved even tangentially with bikes:
The 2.6 Linux kernel doesn't have the netdev_random patches included, so headless Linux boxes doing things like IPSec tunnels, SSH, and SMTP with TLS can run out of randomness from /dev/random (as displayed in /proc/sys/kernel/random/entropy_avail). This can be fixed by editing the driver for the network card and adding the SA_SAMPLE_RANDOM handler. For example, here's the 3c59x.c file after I added the handler:
This twinned with clrngd adds just enough entropy that the system doesn't block due to running out of entropy. If I could use the SA_RANDOM flag somewhere in the driver for the USB NIC that's on the external connection I could probably do without clrngd, too.
The 2.6 Linux kernel doesn't have the netdev_random patches included, so headless Linux boxes doing things like IPSec tunnels, SSH, and SMTP with TLS can run out of randomness from /dev/random (as displayed in /proc/sys/kernel/random/entropy_avail). This can be fixed by editing the driver for the network card and adding the SA_SAMPLE_RANDOM handler. For example, here's the 3c59x.c file after I added the handler:
if (request_irq(dev->irq, vp->full_bus_master_rx ?
&boomerang_interrupt : &vortex_interrupt, SA_SHIRQ | SA_SAMPLE_RANDOM, dev->name, dev)) {
printk(KERN_WARNING "%s: Could not reserve IRQ %d\n", dev->name, dev->irq);
pci_disable_device(pdev);
return -EBUSY;
}
This twinned with clrngd adds just enough entropy that the system doesn't block due to running out of entropy. If I could use the SA_RANDOM flag somewhere in the driver for the USB NIC that's on the external connection I could probably do without clrngd, too.
0 Comments:
Post a Comment
<< Home