lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 11 Aug 2020 12:51:43 +0200 From: Sedat Dilek <sedat.dilek@...il.com> To: Willy Tarreau <w@....eu> Cc: George Spelvin <lkml@....org>, Amit Klein <aksecurity@...il.com>, Eric Dumazet <edumazet@...gle.com>, "Jason A. Donenfeld" <Jason@...c4.com>, Andy Lutomirski <luto@...nel.org>, Kees Cook <keescook@...omium.org>, Thomas Gleixner <tglx@...utronix.de>, Peter Zijlstra <peterz@...radead.org>, Linus Torvalds <torvalds@...ux-foundation.org>, netdev@...r.kernel.org Subject: Re: [DRAFT PATCH] random32: make prandom_u32() output unpredictable [ CC netdev ML ] Hi Willy, in [1] you say: > I've applied it on top of George's patch rebased to mainline for simplicity. > I've used a separate per_cpu noise variable to keep the net_rand_state static > with its __latent_entropy. Can you share this "rebased to mainline" version of George's patch? Maybe put your work "user-friendly-fetchable" in one of your <kernel.org> Git tree (see [2])? Yesterday random/random32/prandom mainline patches hit Linux v5.8.1-rc1 (see [3]). So, as I asked in my first email what is a suitable base? Linux v5.9-rc1 (this Sunday) or if stable Linux v5.8.1 (next 1-2 days) Thanks. Regards, - Sedat - [1] https://marc.info/?l=linux-netdev&m=159709355528675&w=2 [2] https://git.kernel.org/pub/scm/linux/kernel/git/wtarreau [3] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/log/?h=linux-5.8.y
Powered by blists - more mailing lists