Re: arch_random_refill

2014-05-11 Thread H. Peter Anvin
On 05/11/2014 08:36 PM, Stephan Mueller wrote: > > But in our current predicament, not everybody trusts a few potentially easily > manipulated gates that have no other purpose than produce white noise which > are developed by the biggest chip vendor in the US. Gates which have other > purposes

Re: arch_random_refill

2014-05-11 Thread H. Peter Anvin
On 05/11/2014 08:36 PM, Stephan Mueller wrote: > > Ohh, ok, thanks for fixing that. :-) > > Though what makes me wonder is the following: why are some RNGs forced to use > the hw_random framework whereas some others are not? What is the driver for > that? > > The current state of random.c vs.

Re: arch_random_refill

2014-05-11 Thread Stephan Mueller
Am Sonntag, 11. Mai 2014, 20:22:28 schrieb H. Peter Anvin: Hi Peter, > > > Note, I do not see an issue with the patch that adds RDSEED as part of > > add_interrupt_randomness outlined in [2]. The reason is that this patch > > does not monopolizes the noise sources. > > > > I do not want to imply

Re: arch_random_refill

2014-05-11 Thread H. Peter Anvin
On 05/11/2014 04:01 PM, Stephan Mueller wrote: > Hi Peter, > > some time back when the RDRAND instruction was debated, a patch was offered > for driver/char/random.c that in essence turned /dev/random into a frontend > for RDRAND in case that instruction was available. The patch kind of > monop

[PATCH] mxs-dcp: Remove mutex_lock from probe

2014-05-11 Thread Fabio Estevam
From: Fabio Estevam Remove mutex_lock from probe in order to avoid the following warning: [8.526613] Freeing unused kernel memory: 232K (c0683000 - c06bd000) starting pid 56, tty '': '/etc/rc.d/rcS' [9.110314] [9.111864] = [9.116603] [ BUG: ini

Re: [PATCH] crypto: s5p-sss: fix multiplatform build

2014-05-11 Thread Jingoo Han
On Friday, May 09, 2014 8:36 PM, Arnd Bergmann wrote: > > As we are preparing to enable multiplatform support on EXYNOS, > we can no longer include mach/*.h or plat/*.h headers from device > drivers. > > The s5p-sss driver was just enabled for EXYNOS when it used to > be used only on s5pv210, and

arch_random_refill

2014-05-11 Thread Stephan Mueller
Hi Peter, some time back when the RDRAND instruction was debated, a patch was offered for driver/char/random.c that in essence turned /dev/random into a frontend for RDRAND in case that instruction was available. The patch kind of monopolized the noise sources such that if a user space "random

[PATCH 1/2] Addition of kernel_pool

2014-05-11 Thread Stephan Mueller
The kernel pool is intended to serve kernel-internal callers only. Its purpose and usage is identical to the blocking_pool. As the kernel_pool is not available to user space, user space cannot directly interfere with the blocking behavior when obtaining data from the kernel_pool. Thus, if entropy

[PATCH 0/2] Add in-kernel /dev/random equivalent

2014-05-11 Thread Stephan Mueller
Hi, as discussed in thread [1], an in-kernel equivalent to the blocking /dev/random device behavior is suggested. This in-kernel blocking access to the RNG can be used to seed deterministic random number generators with random numbers that are directly backed by the underlying noise sources. T

[PATCH 2/2] Asynchronous and syncronous API for accessing kernel_pool

2014-05-11 Thread Stephan Mueller
The kernel_pool is intended to be the in-kernel equivalent to the blocking_pool, i.e. requests for random data may be blocked if insufficient entropy is present. The added API calls provide a synchronous function call get_blocking_random_bytes where the caller is blocked. In addition, an asynchro

Re: mxs-dcp: BUG: init/1 still has locks held!

2014-05-11 Thread Alexander Shiyan
Sun, 11 May 2014 17:09:27 -0300 от Fabio Estevam : > On Sun, May 11, 2014 at 5:08 PM, Alexander Shiyan wrote: > > Sun, 11 May 2014 16:57:57 -0300 от Fabio Estevam : > >> Hi, > >> > >> Running linux-next 20140509 on a mx28evk I observe the following warning: > >> > >> [8.526613] Freeing unused

Re: mxs-dcp: BUG: init/1 still has locks held!

2014-05-11 Thread Fabio Estevam
On Sun, May 11, 2014 at 5:08 PM, Alexander Shiyan wrote: > Sun, 11 May 2014 16:57:57 -0300 от Fabio Estevam : >> Hi, >> >> Running linux-next 20140509 on a mx28evk I observe the following warning: >> >> [8.526613] Freeing unused kernel memory: 232K (c0683000 - c06bd000) >> starting pid 56, tty

Re: mxs-dcp: BUG: init/1 still has locks held!

2014-05-11 Thread Alexander Shiyan
Sun, 11 May 2014 16:57:57 -0300 от Fabio Estevam : > Hi, > > Running linux-next 20140509 on a mx28evk I observe the following warning: > > [8.526613] Freeing unused kernel memory: 232K (c0683000 - c06bd000) > starting pid 56, tty '': '/etc/rc.d/rcS' > [9.110314] > [9.111864] =

mxs-dcp: BUG: init/1 still has locks held!

2014-05-11 Thread Fabio Estevam
Hi, Running linux-next 20140509 on a mx28evk I observe the following warning: [8.526613] Freeing unused kernel memory: 232K (c0683000 - c06bd000) starting pid 56, tty '': '/etc/rc.d/rcS' [9.110314] [9.111864] = [9.116603] [ BUG: init/1 still has