summaryrefslogtreecommitdiffstats
path: root/scripts/gen-as-const.py (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-07-29Prepare for glibc 2.36 release.Carlos O'Donell2-3/+3
Update version.h, and include/features.h.
2022-07-29Update install.texi, and regenerate INSTALL.Carlos O'Donell2-13/+13
2022-07-29Update NEWS bug list.Carlos O'Donell1-11/+99
2022-07-29Update libc.pot for 2.36 release.Carlos O'Donell1-197/+201
2022-07-29tst-pidfd.c: UNSUPPORTED if we get EPERM on valid pidfd_getfd callMark Wielaard1-0/+7
pidfd_getfd can fail for a valid pidfd with errno EPERM for various reasons in a restricted environment. Use FAIL_UNSUPPORTED in that case. Reviewed-by: Adhemerval Zanella <adhemerval.zanella@linaro.org> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2022-07-29stdlib: Tuned down tst-arc4random-thread internal parametersAdhemerval Zanella1-6/+18
With new arc4random implementation, the internal parameters might require a lot of runtime and/or trigger some contention on older kernels (which might trigger spurious timeout failures). Also, since we are now testing getrandom entropy instead of an userspace RNG, there is no much need to extensive testing. With this change the tst-arc4random-thread goes from about 1m to 5s on a Ryzen 9 with 5.15.0-41-generic. Checked on x86_64-linux-gnu. Reviewed-by: Szabolcs Nagy <szabolcs.nagy@arm.com>
2022-07-29LoongArch: Add greg_t and gregset_t.caiyinyu1-0/+3
2022-07-29LoongArch: Fix VDSO_HASH and VDSO_NAME.caiyinyu1-2/+2
2022-07-27riscv: Update rv64 libm test ulpsDarius Rad1-1/+1
Generated on a Microsemi Polarfire Icicle Kit running Linux version 5.15.32. Same ULPs were also produced on QEMU 5.2.0 running Linux 5.18.0.
2022-07-27riscv: Update nofpu libm test ulpsDarius Rad1-31/+39
2022-07-27arc4random: simplify design for better safetyJason A. Donenfeld35-2676/+64
Rather than buffering 16 MiB of entropy in userspace (by way of chacha20), simply call getrandom() every time. This approach is doubtlessly slower, for now, but trying to prematurely optimize arc4random appears to be leading toward all sorts of nasty properties and gotchas. Instead, this patch takes a much more conservative approach. The interface is added as a basic loop wrapper around getrandom(), and then later, the kernel and libc together can work together on optimizing that. This prevents numerous issues in which userspace is unaware of when it really must throw away its buffer, since we avoid buffering all together. Future improvements may include userspace learning more from the kernel about when to do that, which might make these sorts of chacha20-based optimizations more possible. The current heuristic of 16 MiB is meaningless garbage that doesn't correspond to anything the kernel might know about. So for now, let's just do something conservative that we know is correct and won't lead to cryptographic issues for users of this function. This patch might be considered along the lines of, "optimization is the root of all evil," in that the much more complex implementation it replaces moves too fast without considering security implications, whereas the incremental approach done here is a much safer way of going about things. Once this lands, we can take our time in optimizing this properly using new interplay between the kernel and userspace. getrandom(0) is used, since that's the one that ensures the bytes returned are cryptographically secure. But on systems without it, we fallback to using /dev/urandom. This is unfortunate because it means opening a file descriptor, but there's not much of a choice. Secondly, as part of the fallback, in order to get more or less the same properties of getrandom(0), we poll on /dev/random, and if the poll succeeds at least once, then we assume the RNG is initialized. This is a rough approximation, as the ancient "non-blocking pool" initialized after the "blocking pool", not before, and it may not port back to all ancient kernels, though it does to all kernels supported by glibc (≥3.2), so generally it's the best approximation we can do. The motivation for including arc4random, in the first place, is to have source-level compatibility with existing code. That means this patch doesn't attempt to litigate the interface itself. It does, however, choose a conservative approach for implementing it. Cc: Adhemerval Zanella Netto <adhemerval.zanella@linaro.org> Cc: Florian Weimer <fweimer@redhat.com> Cc: Cristian Rodríguez <crrodriguez@opensuse.org> Cc: Paul Eggert <eggert@cs.ucla.edu> Cc: Mark Harris <mark.hsj@gmail.com> Cc: Eric Biggers <ebiggers@kernel.org> Cc: linux-crypto@vger.kernel.org Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Reviewed-by: Adhemerval Zanella <adhemerval.zanella@linaro.org>
2022-07-26LoongArch: Update NEWS and README for the LoongArch port.caiyinyu3-1/+10
2022-07-26LoongArch: Update build-many-glibcs.py for the LoongArch Port.caiyinyu1-0/+5
2022-07-26LoongArch: Hard Float Supportcaiyinyu22-0/+2372
2022-07-26LoongArch: Build Infrastructurecaiyinyu15-0/+434
2022-07-26LoongArch: Add ABI Listscaiyinyu11-0/+3385
2022-07-26LoongArch: Linux ABIcaiyinyu17-0/+826
2022-07-26LoongArch: Linux Syscall Interfacecaiyinyu8-0/+947