On Mon, Oct 14, 2013 at 01:16:41PM -0700, [email protected] wrote:
> The patch below was submitted to be applied to the 3.11-stable tree.
> 
> I fail to see how this patch meets the stable kernel rules as found at
> Documentation/stable_kernel_rules.txt.

This patch adds a new interface which allows architecture-specific
code to address a security issue with the random driver for those
platforms which define get_cycles() to return zero all the time.  The
most important p[latform for this is MIPS, since there are a lot of
home routers which use MIPS, but the full list is:

- MIPS
- User mode Linux
- Sparc 32 bit
- M68K
- M32R
- Hexagon
- H8/300
- FR-V 
- CRIS
- AVR32                                                                         
                                                                                
                
- ARC
- METAG
- Microblaze
- SCORE
- SH
- Unicore32

On these platforms, when we try to sample entropy, the get_cycles() is
a no-op, so the only thing that they can use is the jiffies counter,
which is very coarse-grained and thus is highly unlikely to lead much
in the way of unpredictability.  The new interface allows
architectures which don't have a CPU cycle counter, but might have
something which is good enough for /dev/random, but not for the other
users of get_cycles() to export that functionality via
random_get_entropy().

An example of this is the MIPS platform, which where they have a DRAM
refresh register which effectively is the low 5 bits of a CPU cycle
counter register.  They can't use this for get_cycles(), but it could
be useful for random_get_entropy().

On other platforms, this commit will result in no change, so there is
no risk to this patch.

Cheers,

                                                - Ted
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to