diff options
author | Emese Revfy <re.emese@gmail.com> | 2016-06-20 20:42:34 +0200 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2016-10-10 14:51:45 -0700 |
commit | 0766f788eb727e2e330d55d30545db65bcf2623f (patch) | |
tree | 0436ae3b005558a4fb827459fe5c602037fe764a /include/linux/random.h | |
parent | 38addce8b600ca335dc86fa3d48c890f1c6fa1f4 (diff) | |
download | linux-0766f788eb727e2e330d55d30545db65bcf2623f.tar.gz linux-0766f788eb727e2e330d55d30545db65bcf2623f.tar.bz2 linux-0766f788eb727e2e330d55d30545db65bcf2623f.zip |
latent_entropy: Mark functions with __latent_entropy
The __latent_entropy gcc attribute can be used only on functions and
variables. If it is on a function then the plugin will instrument it for
gathering control-flow entropy. If the attribute is on a variable then
the plugin will initialize it with random contents. The variable must
be an integer, an integer array type or a structure with integer fields.
These specific functions have been selected because they are init
functions (to help gather boot-time entropy), are called at unpredictable
times, or they have variable loops, each of which provide some level of
latent entropy.
Signed-off-by: Emese Revfy <re.emese@gmail.com>
[kees: expanded commit message]
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'include/linux/random.h')
-rw-r--r-- | include/linux/random.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/include/linux/random.h b/include/linux/random.h index a59c74cdb1eb..d80a4388a4fd 100644 --- a/include/linux/random.h +++ b/include/linux/random.h @@ -30,8 +30,8 @@ static inline void add_latent_entropy(void) {} #endif extern void add_input_randomness(unsigned int type, unsigned int code, - unsigned int value); -extern void add_interrupt_randomness(int irq, int irq_flags); + unsigned int value) __latent_entropy; +extern void add_interrupt_randomness(int irq, int irq_flags) __latent_entropy; extern void get_random_bytes(void *buf, int nbytes); extern int add_random_ready_callback(struct random_ready_callback *rdy); |