lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220331212352.182168-1-Jason@zx2c4.com>
Date:   Thu, 31 Mar 2022 17:23:52 -0400
From:   "Jason A. Donenfeld" <Jason@...c4.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org
Subject: [GIT PULL] random number generator fixes for 5.18-rc1

Hi Linus,

Please pull 5 small patches for 5.18-rc1:

- If a hardware random number generator passes a sufficiently large chunk of
  entropy to random.c during early boot, we now skip the "fast_init" business
  and let it initialize the RNG. This makes CONFIG_RANDOM_TRUST_BOOTLOADER=y
  actually useful.

- We already have the command line `random.trust_cpu=0/1` option for RDRAND,
  which let distros enable CONFIG_RANDOM_TRUST_CPU=y while placating concerns
  of more paranoid users. Now we add `random.trust_bootloader=0/1` so that
  distros can similarly enable CONFIG_RANDOM_TRUST_BOOTLOADER=y.

- Re-add a comment that got removed by accident in the recent revert.

- Add the spec-compliant ACPI CID for vmgenid, which Microsoft added to the
  vmgenid spec at Ard's request during earlier review.

- Restore build-time randomness via the latent entropy plugin, which was lost
  when we transitioned to using a hash function.

Thanks,
Jason

PS: I noticed that for my previous pull request, in your merge commit, you
replaced my numbered list with a bulleted list, and even went through the
trouble of adjusting the irregular spacing caused by numbers >9. Impressed by
this wild attention to detail, and imagining you clickity-clacking away in
uemacs, I'll stick to hyphen-bullets now.


The following changes since commit 34af78c4e616c359ed428d79fe4758a35d2c5473:

  Merge tag 'iommu-updates-v5.18' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu (2022-03-24 19:48:57 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/crng/random.git tags/random-5.18-rc1-for-linus

for you to fetch changes up to 1754abb3e7583c570666fa1e1ee5b317e88c89a0:

  random: mix build-time latent entropy into pool at init (2022-03-31 16:43:27 -0400)

----------------------------------------------------------------
Random number generator fixes for Linux 5.18-rc1.

----------------------------------------------------------------
Jason A. Donenfeld (4):
      random: skip fast_init if hwrng provides large chunk of entropy
      random: treat bootloader trust toggle the same way as cpu trust toggle
      random: re-add removed comment about get_random_{u32,u64} reseeding
      random: mix build-time latent entropy into pool at init

Michael Kelley (1):
      virt: vmgenid: recognize new CID added by Hyper-V

 Documentation/admin-guide/kernel-parameters.txt |  6 ++++++
 drivers/char/Kconfig                            |  3 ++-
 drivers/char/random.c                           | 22 +++++++++++++++++-----
 drivers/virt/vmgenid.c                          |  1 +
 4 files changed, 26 insertions(+), 6 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ