From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751982AbcGYGof (ORCPT ); Mon, 25 Jul 2016 02:44:35 -0400 Received: from imap.thunk.org ([74.207.234.97]:32874 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750844AbcGYGo2 (ORCPT ); Mon, 25 Jul 2016 02:44:28 -0400 Date: Mon, 25 Jul 2016 02:44:24 -0400 From: "Theodore Ts'o" To: Linus Torvalds Cc: linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org Subject: [GIT PULL] /dev/random driver changes for 4.8 Message-ID: <20160725064424.GA29098@thunk.org> Mail-Followup-To: Theodore Ts'o , Linus Torvalds , linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.6.0 (2016-04-01) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following changes since commit 1a695a905c18548062509178b98bc91e67510864: Linux 4.7-rc1 (2016-05-29 09:29:24 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random.git tags/random_for_linus for you to fetch changes up to 86a574de4590ffe6fd3f3ca34cdcf655a78e36ec: random: strengthen input validation for RNDADDTOENTCNT (2016-07-03 17:09:33 -0400) ---------------------------------------------------------------- A number of improvements for the /dev/random driver; the most important is the use of a ChaCha20-based CRNG for /dev/urandom, which is faster, more efficient, and easier to make scalable for silly/abusive userspace programs that want to read from /dev/urandom in a tight loop on NUMA systems. This set of patches also improves entropy gathering on VM's running on Microsoft Azure, and will take advantage of a hw random number generator (if present) to initialize the /dev/urandom pool. ---------------------------------------------------------------- Eric Biggers (1): random: properly align get_random_int_hash Stephan Mueller (1): random: add interrupt callback to VMBus IRQ handler Theodore Ts'o (6): random: initialize the non-blocking pool via add_hwgenerator_randomness() random: print a warning for the first ten uninitialized random users random: replace non-blocking pool with a Chacha20-based CRNG random: make /dev/urandom scalable for silly userspace programs random: add backtracking protection to the CRNG random: strengthen input validation for RNDADDTOENTCNT crypto/chacha20_generic.c | 61 ---------- drivers/char/random.c | 482 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++--------------- drivers/hv/vmbus_drv.c | 3 + include/crypto/chacha20.h | 1 + lib/Makefile | 2 +- lib/chacha20.c | 79 ++++++++++++ 6 files changed, 468 insertions(+), 160 deletions(-) create mode 100644 lib/chacha20.c