public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: "Theodore Ts'o" <tytso@mit.edu>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: linux-kernel@vger.kernel.org
Subject: [GIT PULL] random changes for 3.17
Date: Tue, 5 Aug 2014 18:56:40 -0400	[thread overview]
Message-ID: <20140805225640.GA19511@thunk.org> (raw)

The following changes since commit 1795cd9b3a91d4b5473c97f491d63892442212ab:

  Linux 3.16-rc5 (2014-07-13 14:04:33 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random.git tags/random_for_linus

for you to fetch changes up to e02b876597777ab26288dd2611a97b597d14d661:

  hwrng: Pass entropy to add_hwgenerator_randomness() in bits, not bytes (2014-08-05 16:50:10 -0400)

----------------------------------------------------------------
Cleanups and bug fixes to /dev/random, add a new getrandom(2) system
call, which is a superset of OpenBSD's getentropy(2) call, for use
with userspace crypto libraries such as LibreSSL.  Also add the
ability to have a kernel thread to pull entropy from hardware rng
devices into /dev/random.

----------------------------------------------------------------
Stephen Boyd (1):
      hwrng: Pass entropy to add_hwgenerator_randomness() in bits, not bytes

Theodore Ts'o (8):
      random: always update the entropy pool under the spinlock
      random: remove unneeded hash of a portion of the entropy pool
      random: only update the last_pulled time if we actually transferred entropy
      random: clean up interrupt entropy accounting for archs w/o cycle counters
      random: use an improved fast_mix() function
      random: use registers from interrupted code for CPU's w/o a cycle counter
      random: introduce getrandom(2) system call
      random: limit the contribution of the hw rng to at most half

Torsten Duwe (4):
      random: add_hwgenerator_randomness() for feeding entropy from devices
      hwrng: create filler thread
      hwrng: add per-device entropy derating
      hw_random: fix sparse warning (NULL vs 0 for pointer)

 arch/x86/syscalls/syscall_32.tbl  |   1 +
 arch/x86/syscalls/syscall_64.tbl  |   1 +
 drivers/char/hw_random/core.c     |  78 ++++++++++++++++--
 drivers/char/random.c             | 315 +++++++++++++++++++++++++++++++++++++++++++-----------------------------
 include/linux/hw_random.h         |   5 ++
 include/linux/syscalls.h          |   3 +
 include/uapi/asm-generic/unistd.h |   4 +-
 include/uapi/linux/random.h       |   9 +++
 8 files changed, 282 insertions(+), 134 deletions(-)

                 reply	other threads:[~2014-08-05 22:56 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140805225640.GA19511@thunk.org \
    --to=tytso@mit.edu \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox