github xanmod/linux 5.15.44-rt46-xanmod1

18 months ago

ed44fa2 Linux 5.15.44-rt46-xanmod1
a55ad6c Merge tag 'v5.15.44-rt46' into 5.15-rt
e8d7b18 drivers/char: Remove LRNG v43 patchset
dd1275d 'Linux 5.15.44-rt46'
c94aafe Merge tag 'v5.15.44' into v5.15-rt
4e67be4 Linux 5.15.44
50196b5 ALSA: ctxfi: Add SB046x PCI ID
ea5b873 random: check for signals after page of pool writes
3e16757 random: wire up fops->splice_{read,write}iter()
0789c69 random: convert to using fops->write_iter()
7f8cea1 random: convert to using fops->read_iter()
6244da2 random: unify batched entropy implementations
64cb7f0 random: move randomize_page() into mm where it belongs
55a368c random: move initialization functions out of hot pages
542a606 random: make consistent use of buf and len
29ed26a random: use proper return types on get_random
5572957 random: remove extern from functions in header
c6ae9d6 random: use static branch for crng_ready()
4e5e675 random: credit architectural init the exact amount
11cce50 random: handle latent entropy and command line from random_init()
ac01729 random: use proper jiffies comparison macro
8df752b random: remove ratelimiting for in-kernel unseeded randomness
272b794 random: move initialization out of reseeding hot path
c4e6001 random: avoid initializing twice in credit race
23a1b98 random: use symbolic constants for crng_init states
f4cb809 siphash: use one source of truth for siphash permutations
82caef8 random: help compiler out with fast_mix() by using simpler arguments
4649394 random: do not use input pool from hard IRQs
df4e319 random: order timer entropy functions below interrupt functions
baf0621 random: do not pretend to handle premature next security model
0d24003 random: use first 128 bits of input as fast init
0d79a47 random: do not use batches when !crng_ready()
1ab530c random: insist on random_get_entropy() existing in order to simplify
e6bd242 xtensa: use fallback for random_get_entropy() instead of zero
b4582cb sparc: use fallback for random_get_entropy() instead of zero
d876dca um: use fallback for random_get_entropy() instead of zero
e017497 x86/tsc: Use fallback for random_get_entropy() instead of zero
38fbfa4 nios2: use fallback for random_get_entropy() instead of zero
197d25e arm: use fallback for random_get_entropy() instead of zero
9e6db82 mips: use fallback for random_get_entropy() instead of just c0 random
2ab4160 riscv: use fallback for random_get_entropy() instead of zero
a1428cd m68k: use fallback for random_get_entropy() instead of zero
82f1828 timekeeping: Add raw clock fallback for random_get_entropy()
bc94ccb powerpc: define get_cycles macro for arch-override
8ca78fb alpha: define get_cycles macro for arch-override
9bf990c parisc: define get_cycles macro for arch-override
e05efd3 s390: define get_cycles macro for arch-override
9f17432 ia64: define get_cycles macro for arch-override
807ed9c init: call time_init() before rand_initialize()
2814a9e random: fix sysctl documentation nits
4179671 random: document crng_fast_key_erasure() destination possibility
8b373c1 random: make random_get_entropy() return an unsigned long
b807881 random: allow partial reads if later user copies fail
ccaaff5 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
02c2e2c random: check for signal_pending() outside of need_resched() check
e7e196e random: do not allow user to keep crng key around on stack
be75617 random: do not split fast init input in add_hwgenerator_randomness()
636b057 random: mix build-time latent entropy into pool at init
3967a20 random: re-add removed comment about get_random
{u32,u64} reseeding
25727cb random: treat bootloader trust toggle the same way as cpu trust toggle
a704248 random: skip fast_init if hwrng provides large chunk of entropy
3689ac0 random: check for signal and try earlier when generating entropy
94c8249 random: reseed more often immediately after booting
99290c6 random: make consistent usage of crng_ready()
0c66c87 random: use SipHash as interrupt entropy accumulator
6da877d random: replace custom notifier chain with standard one
39c9e55 random: don't let 644 read-only sysctls be written to
e4e1600 random: give sysctl_random_min_urandom_seed a more sensible value
2c60d7f random: do crng pre-init loading in worker rather than irq
1523ec5 random: unify cycles_t and jiffies usage and types
fdb1e54 random: cleanup UUID handling
c169e7a random: only wake up writers after zap if threshold was passed
e400ba1 random: round-robin registers as ulong, not u32
144c1e7 random: clear fast pool, crng, and batches in cpuhp bring up
80c1f7f random: pull add_hwgenerator_randomness() declaration into random.h
98d6def random: check for crng_init == 0 in add_device_randomness()
9df4a56 random: unify early init crng load accounting
d386b08 random: do not take pool spinlock at boot
3c48a2d random: defer fast pool mixing to worker
9489e36 random: rewrite header introductory comment
9385681 random: group sysctl functions
96340f0 random: group userspace read/write functions
74b7042 random: group entropy collection functions
43e87e6 random: group entropy extraction functions
019e057 random: group crng functions
81e62ff random: group initialization wait functions
d3a2510 random: remove whitespace and reorder includes
30c52e9 random: remove useless header comment
95f85a0 random: introduce drain_entropy() helper to declutter crng_reseed()
c807eca random: deobfuscate irq u32/u64 contributions
f641f94 random: add proper SPDX header
ce951e9 random: remove unused tracepoints
4509941 random: remove ifdef'd out interrupt bench
ad5d17d random: tie batched entropy generation to base_crng generation
86ab606 random: fix locking for crng_init in crng_reseed()
d2d1ad9 random: zero buffer after reading entropy from userspace
eda5553 random: remove outdated INT_MAX >> 6 check in urandom_read()
5dd066a random: make more consistent use of integer types
ba789ca random: use hash function for crng_slow_load()
b27bd09 random: use simpler fast key erasure flow on per-cpu keys
1aab83f random: absorb fast pool into input pool after fast load
4a18db1 random: do not xor RDRAND when writing into /dev/random
b51caad random: ensure early RDSEED goes through mixer on init
fd6eb28 random: inline leaves of rand_initialize()
5e4fab6 random: get rid of secondary crngs
ded4cc8 random: use RDSEED instead of RDRAND in entropy extraction
704c76e random: fix locking in crng_fast_load()
67fdda9 random: remove batched entropy locking
ad86aa8 random: remove use_input_pool parameter from crng_reseed()
1bc9db5 random: make credit_entropy_bits() always safe
3730490 random: always wake up entropy writers after extraction
cb65ac3 random: use linear min-entropy accumulation crediting
a6beb81 random: simplify entropy debiting
a5e2c8a random: use computational hash for entropy extraction
add92df random: only call crng_finalize_init() for primary_crng
07e0152 random: access primary_pool directly rather than through pointer
b53c966 random: continually use hwgenerator randomness
c1dc53d random: simplify arithmetic function flow in account()
2f0e83e random: selectively clang-format where it makes sense
db7a0a9 random: access input_pool_data directly rather than through pointer
c25c7e2 random: cleanup fractional entropy shift constants
6851294 random: prepend remaining pool constants with POOL_
2772ba4 random: de-duplicate INPUT_POOL constants
da80b44 random: remove unused OUTPUT_POOL constants
f9efa1a random: rather than entropy_store abstraction, use global
b6d849d random: remove unused extract_entropy() reserved argument
578fbb7 random: remove incomplete last_data logic
8aa9ddc random: cleanup integer types
4330c48 random: cleanup poolinfo abstraction
250bda5 random: fix typo in comments
15a1a3b random: don't reset crng_init_cnt on urandom_read()
d47579f random: avoid superfluous call to RDRAND in CRNG extraction
0c39104 random: early initialization of ChaCha constants
5822fad random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
69bb5f0 random: harmonize "crng init done" messages
c4c9081 random: mix bootloader randomness into pool
1b1258b random: do not re-init if crng_reseed completes before primary init
0804036 random: do not sign extend bytes for rotation when mixing
2e827d5 random: use BLAKE2s instead of SHA1 in extraction
c5a7694 random: remove unused irq_flags argument from add_interrupt_randomness()
40af1df random: document add_hwgenerator_randomness() with other input functions
4562644 lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
b0cdd9e lib/crypto: sha1: re-roll loops to reduce code size
cba2195 lib/crypto: blake2s: move hmac construction into wireguard
caba66e lib/crypto: blake2s: include as built-in
830ecba MAINTAINERS: add git tree for random.c
12d7163 MAINTAINERS: co-maintain random.c
0da5349 ACPI: sysfs: Fix BERT error region memory mapping
bf5a3c5 ice: fix crash at allocation failure
acd12d1 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID
f82ccfa HID: amd_sfh: Add support for sensor discovery

Don't miss a new linux release

NewReleases is sending notifications on new releases.