Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756871AbZDFS2l (ORCPT ); Mon, 6 Apr 2009 14:28:41 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755882AbZDFS2O (ORCPT ); Mon, 6 Apr 2009 14:28:14 -0400 Received: from nwd2mail11.analog.com ([137.71.25.57]:61614 "EHLO nwd2mail11.analog.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756056AbZDFS2L (ORCPT ); Mon, 6 Apr 2009 14:28:11 -0400 X-IronPort-AV: E=Sophos;i="4.39,331,1235970000"; d="scan'208";a="69118078" From: Robin Getz Organization: Blackfin uClinux org To: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Chris Peterson , Matt Mackall Subject: IRQF_SAMPLE_RANDOM question... Date: Mon, 6 Apr 2009 14:30:26 -0400 User-Agent: KMail/1.9.5 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-ID: <200904061430.26276.rgetz@blackfin.uclinux.org> X-OriginalArrivalTime: 06 Apr 2009 18:28:08.0693 (UTC) FILETIME=[6F3EEA50:01C9B6E5] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2559 Lines: 60 Although there was some discussion http://thread.gmane.org/gmane.linux.kernel/680723 about removing IRQF_SAMPLE_RANDOM from the remaining network drivers in May of 2008, but they still appears to be there in 2.6.29. drivers/net/ibmlana.c drivers/net/macb.c drivers/net/3c523.c drivers/net/3c527.c drivers/net/netxen/netxen_nic_main.c drivers/net/cris/eth_v10.c drivers/net/xen-netfront.c drivers/net/atlx/atl1.c drivers/net/qla3xxx.c drivers/net/tg3.c drivers/net/niu.c So what is the plan? If I send a patch to add IRQF_SAMPLE_RANDOM to others (like the Blackfin) networking drivers - will it get rejected? We have lots of embedded headless systems (no keyboard/mouse, no soundcard, no video) systems with *no* sources of entropy - and people using SSL. I didn't really find any docs which describe what should have IRQF_SAMPLE_RANDOM on it or not. I did find Matt Mackall describing it as: > We currently assume that IRQF_SAMPLE_RANDOM means 'this is a completely > trusted unobservable entropy source' which is obviously wrong for > network devices but is right for some other classes of device. Currently - I see most things I see using IRQF_SAMPLE_RANDOM would also fail the "completely unobservable" test. Other than the TRNG that are inside the CPU - what does pass? I can put a scope/analyser on a device - and look at the touchscreens, serial devices, USB, all without cracking the case. drivers/block/xen-blkfront.c: Xen virtual block device frontend drivers/i2c/busses/i2c-pmcmsp.c: PMC MSP TWI/SMBus/I2C driver drivers/input/keyboard/bf54x-keys.c: Keypad driver for BF54x Processors drivers/input/keyboard/gpio_keys.c: Keyboard driver for CPU GPIOs drivers/input/serio/hp_sdc.c: HP i8042-based SDC Driver drivers/input/touchscreen/wm97xx-core.c: WM97xx Core - Touch Screen drivers/serial/mpc52xx_uart.c: Freescale MPC52xx PSC UART drivers/serial/uartlite.c: Xilinx uartlite serial driver drivers/usb/gadget/omadrivers/usb/gadget/omap_udc OMAP UDC driver If I want to get more intrusive (expensive) - I can look at SPI, I2C, and other things that only might be observable at the PCB level (including things that are inside the chipset). What are the guidelines for including IRQF_SAMPLE_RANDOM? Thanks -Robin -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/