lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <84D489B9-FC60-40F1-A03F-996256F790A9@holtmann.org>
Date:	Sun, 20 Jul 2014 18:18:13 +0200
From:	Marcel Holtmann <marcel@...tmann.org>
To:	LKML <linux-kernel@...r.kernel.org>
Cc:	Matt Mackall <mpm@...enic.com>,
	Herbert Xu <herbert@...dor.apana.org.au>,
	Rusty Russell <rusty@...tcorp.com.au>,
	Dan Carpenter <dan.carpenter@...cle.com>,
	Jason Cooper <jason@...edaemon.net>,
	Kees Cook <keescook@...omium.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Commit d9e7972619334656 breaks KVM's virtio-rng-pci

Hello,

the commit d9e7972619334656 ends up being responsible that using "-device virtio-rng-pci" in KVM no longer works.

	From: Kees Cook <keescook@...omium.org>
	Date: Mon, 3 Mar 2014 15:51:48 -0800
	Subject: [PATCH] hwrng: add randomness to system from rng sources

	When bringing a new RNG source online, it seems like it would make sense
	to use some of its bytes to make the system entropy pool more random,
	as done with all sorts of other devices that contain per-device or
	per-boot differences.

When providing "-device virtio-rng-pci" to a kernel with the above commit, the kernel never finishes booting. It just stops. My guess it is waiting for some magic entropy to appear.

Maybe this is something that should be fixed in virtio-rng driver instead of reverting this patch, but I leave this to the experts in this area.

Regards

Marcel

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ