lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20120731164534.GA26140@thunk.org>
Date:	Tue, 31 Jul 2012 12:45:34 -0400
From:	Theodore Ts'o <tytso@....edu>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	linux-kernel@...r.kernel.org
Subject: [GIT PULL] random subsystem for 3.6

Sorry for the delay, but Peter felt very strongly about the last
patch, and I wanted to give it at least a day's baking time in
linux-next before I submitted a pull request to you.

Also note that that are some minor merge conflicts.  See my proposed resolution here:

http://git.kernel.org/?p=linux/kernel/git/tytso/random.git;a=commitdiff;h=refs/heads/trial_merge

						- Ted

The following changes since commit 6887a4131da3adaab011613776d865f4bcfb5678:

  Linux 3.5-rc5 (2012-06-30 16:08:57 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random.git tags/random_for_linus

for you to fetch changes up to d2e7c96af1e54b507ae2a6a7dd2baf588417a7e5:

  random: mix in architectural randomness in extract_buf() (2012-07-27 22:37:20 -0400)

----------------------------------------------------------------
This patch series contains a major revamp of how we collect entropy
from interrupts for /dev/random and /dev/urandom.  The goal is to
addresses weaknesses discussed in the paper "Mining your Ps and Qs:
Detection of Widespread Weak Keys in Network Devices", by Nadia
Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman, which will
be published in the Proceedings of the 21st Usenix Security Symposium,
August 2012.  (See https://factorable.net for more information and an
extended version of the paper.)

----------------------------------------------------------------
H. Peter Anvin (1):
      random: mix in architectural randomness in extract_buf()

Linus Torvalds (1):
      random: create add_device_randomness() interface

Mark Brown (2):
      rtc: wm831x: Feed the write counter into device_add_randomness()
      mfd: wm831x: Feed the device UUID into device_add_randomness()

Theodore Ts'o (27):
      random: fix up sparse warnings
      random: make 'add_interrupt_randomness()' do something sane
      random: use lockless techniques in the interrupt path
      usb: feed USB device information to the /dev/random driver
      net: feed /dev/random with the MAC address when registering a device
      random: use the arch-specific rng in xfer_secondary_pool
      random: add new get_random_bytes_arch() function
      random: add tracepoints for easier debugging and verification
      MAINTAINERS: Theodore Ts'o is taking over the random driver
      random: remove rand_initialize_irq()
      mfd: remove IRQF_SAMPLE_RANDOM which is now a no-op
      input/serio/hp_sdc.c: remove IRQF_SAMPLE_RANDOM which is now a no-op
      i2c-pmcmsp: remove IRQF_SAMPLE_RANDOM which is now a no-op
      pda_power: remove IRQF_SAMPLE_RANDOM which is now a no-op
      n2_crypto: remove IRQF_SAMPLE_RANDOM which is now a no-op
      xen-blkfront: remove IRQF_SAMPLE_RANDOM which is now a no-op
      drivers: hv: remove IRQF_SAMPLE_RANDOM which is now a no-op
      uartlite: remove IRQF_SAMPLE_RANDOM which is now a no-op
      goku_udc: remove IRQF_SAMPLE_RANDOM which was commented out
      omap_udc: remove IRQF_SAMPLE_RANDOM which is now a no-op
      pxa25x_udc: remove IRQF_SAMPLE_RANDOM which is now a no-op
      isp1301_omap: remove IRQF_SAMPLE_RANDOM which is now a no-op
      board-palmz71: remove IRQF_SAMPLE_RANDOM which is now a no-op
      [ARM] pxa: remove IRQF_SAMPLE_RANDOM which is now a no-op
      sparc/ldc: remove IRQF_SAMPLE_RANDOM which is now a no-op
      um: remove IRQF_SAMPLE_RANDOM which is now a no-op
      random: final removal of IRQF_SAMPLE_RANDOM

Tony Luck (2):
      random: Add comment to random_initialize()
      dmi: Feed DMI table to /dev/random driver

 Documentation/feature-removal-schedule.txt |  14 ----
 MAINTAINERS                                |   2 +-
 arch/arm/mach-omap1/board-palmz71.c        |   3 +-
 arch/arm/mach-pxa/lubbock.c                |   2 +-
 arch/arm/mach-pxa/magician.c               |   5 +-
 arch/arm/mach-pxa/trizeps4.c               |   4 +-
 arch/ia64/kernel/irq_ia64.c                |   1 -
 arch/sparc/kernel/ldc.c                    |   6 +-
 arch/um/drivers/line.c                     |  13 ++--
 arch/um/drivers/mconsole_kern.c            |   3 +-
 arch/um/drivers/port_kern.c                |   6 +-
 arch/um/drivers/random.c                   |   3 +-
 arch/um/drivers/xterm_kern.c               |   3 +-
 arch/um/kernel/sigio.c                     |   3 +-
 drivers/block/xen-blkfront.c               |   5 +-
 drivers/char/random.c                      | 355 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------------------
 drivers/crypto/n2_core.c                   |   3 +-
 drivers/firmware/dmi_scan.c                |   3 +
 drivers/hv/vmbus_drv.c                     |   3 +-
 drivers/i2c/busses/i2c-pmcmsp.c            |   3 +-
 drivers/input/serio/hp_sdc.c               |   2 +-
 drivers/mfd/ab3100-core.c                  |   5 --
 drivers/mfd/tps65010.c                     |   3 +-
 drivers/mfd/wm831x-otp.c                   |   8 ++
 drivers/power/pda_power.c                  |   6 +-
 drivers/rtc/rtc-wm831x.c                   |  24 +++++-
 drivers/tty/serial/uartlite.c              |   3 +-
 drivers/usb/core/hub.c                     |   9 +++
 drivers/usb/gadget/goku_udc.c              |   2 +-
 drivers/usb/gadget/omap_udc.c              |   4 +-
 drivers/usb/gadget/pxa25x_udc.c            |  12 +--
 drivers/usb/otg/isp1301_omap.c             |   1 -
 include/linux/interrupt.h                  |   2 -
 include/linux/irqdesc.h                    |   1 -
 include/linux/random.h                     |   6 +-
 include/trace/events/random.h              | 134 ++++++++++++++++++++++++++++++++++
 kernel/irq/handle.c                        |   7 +-
 kernel/irq/manage.c                        |  17 -----
 net/core/dev.c                             |   3 +
 net/core/rtnetlink.c                       |   1 +
 40 files changed, 454 insertions(+), 236 deletions(-)
 create mode 100644 include/trace/events/random.h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ