All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Theodore Ts'o" <tytso@mit.edu>
To: linux-kernel@vger.kernel.org
Subject: [tytso@MIT.EDU: [GIT PULL] /dev/random changes for 3.15]
Date: Thu, 3 Apr 2014 20:43:39 -0400	[thread overview]
Message-ID: <20140404004339.GA2525@thunk.org> (raw)

[-- Attachment #1: Type: text/plain, Size: 37 bytes --]

Whoops, sorry to cc LKML.

				- Ted

[-- Attachment #2: Type: message/rfc822, Size: 6130 bytes --]

From: "Theodore Ts'o" <tytso@MIT.EDU>
To: Linus Torvalds <torvalds@linux-foundation.org>
Subject: [GIT PULL] /dev/random changes for 3.15
Date: Thu, 3 Apr 2014 14:48:15 -0400
Message-ID: <20140403184815.GA2721@thunk.org>

The following changes since commit b28a960c42fcd9cfc987441fa6d1c1a471f0f9ed:

  Linux 3.14-rc2 (2014-02-09 18:15:47 -0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random.git tags/random_for_linus

for you to fetch changes up to 7b878d4b48c4e04b936918bb83836a107ba453b3:

  random: Add arch_has_random[_seed]() (2014-03-19 22:24:08 -0400)

----------------------------------------------------------------
A number of cleanups plus support for the RDSEED instruction, which
will be showing up in Intel Broadwell CPU's.

----------------------------------------------------------------
Greg Price (11):
      random: fix typos / spelling errors in comments
      random: fix comment on proc_do_uuid
      random: fix description of get_random_bytes
      random: simplify loop in random_read
      random: fix comment on "account"
      random: simplify accounting logic
      random: forget lock in lockless accounting
      random: tighten bound on random_read_wakeup_thresh
      random: simplify accounting code
      random: entropy_bytes is actually bits
      random: clarify bits/bytes in wakeup thresholds

H. Peter Anvin (4):
      x86, random: Enable the RDSEED instruction
      random: Use arch_get_random_seed*() at init time and once a second
      random: If we have arch_get_random_seed*(), try it before blocking
      random: Add arch_has_random[_seed]()

Theodore Ts'o (1):
      random: use the architectural HWRNG for the SHA's IV in extract_buf()

 arch/powerpc/include/asm/archrandom.h |  18 ++++
 arch/x86/include/asm/archrandom.h     |  42 ++++++++-
 drivers/char/random.c                 | 244 +++++++++++++++++++++++++++---------------------
 include/linux/random.h                |  16 ++++
 4 files changed, 211 insertions(+), 109 deletions(-)

                 reply	other threads:[~2014-04-04  0:43 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140404004339.GA2525@thunk.org \
    --to=tytso@mit.edu \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.