stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-06-23 17:09:19 to 2022-06-23 17:35:32 UTC [more...]

[PATCH 4.14 000/237] 4.14.285-rc1 review
 2022-06-23 16:42 UTC  (137+ messages)
` [PATCH 4.14 001/237] 9p: missing chunk of "fs/9p: Dont update file type when updating file attributes"
` [PATCH 4.14 002/237] crypto: chacha20 - Fix keystream alignment for chacha20_block()
` [PATCH 4.14 003/237] random: always fill buffer in get_random_bytes_wait
` [PATCH 4.14 004/237] random: optimize add_interrupt_randomness
` [PATCH 4.14 005/237] drivers/char/random.c: remove unused dont_count_entropy
` [PATCH 4.14 006/237] random: Fix whitespace pre random-bytes work
` [PATCH 4.14 007/237] random: Return nbytes filled from hw RNG
` [PATCH 4.14 008/237] random: add a config option to trust the CPUs hwrng
` [PATCH 4.14 009/237] random: remove preempt disabled region
` [PATCH 4.14 010/237] random: Make crng state queryable
` [PATCH 4.14 011/237] random: make CPU trust a boot parameter
` [PATCH 4.14 012/237] drivers/char/random.c: constify poolinfo_table
` [PATCH 4.14 013/237] drivers/char/random.c: remove unused stuct poolinfo::poolbits
` [PATCH 4.14 014/237] drivers/char/random.c: make primary_crng static
` [PATCH 4.14 015/237] random: only read from /dev/random after its pool has received 128 bits
` [PATCH 4.14 016/237] random: move rand_initialize() earlier
` [PATCH 4.14 017/237] random: document get_random_int() family
` [PATCH 4.14 018/237] latent_entropy: avoid build error when plugin cflags are not set
` [PATCH 4.14 019/237] random: fix soft lockup when trying to read from an uninitialized blocking pool
` [PATCH 4.14 020/237] random: Support freezable kthreads in add_hwgenerator_randomness()
` [PATCH 4.14 021/237] fdt: add support for rng-seed
` [PATCH 4.14 022/237] random: Use wait_event_freezable() in add_hwgenerator_randomness()
` [PATCH 4.14 023/237] char/random: Add a newline at the end of the file
` [PATCH 4.14 024/237] Revert "hwrng: core - Freeze khwrng thread during suspend"
` [PATCH 4.14 025/237] crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
` [PATCH 4.14 026/237] crypto: blake2s - generic C library implementation and selftest
` [PATCH 4.14 027/237] lib/crypto: blake2s: move hmac construction into wireguard
` [PATCH 4.14 028/237] lib/crypto: sha1: re-roll loops to reduce code size
` [PATCH 4.14 029/237] random: Dont wake crng_init_wait when crng_init == 1
` [PATCH 4.14 030/237] random: Add a urandom_read_nowait() for random APIs that dont warn
` [PATCH 4.14 031/237] random: add GRND_INSECURE to return best-effort non-cryptographic bytes
` [PATCH 4.14 032/237] random: ignore GRND_RANDOM in getentropy(2)
` [PATCH 4.14 033/237] random: make /dev/random be almost like /dev/urandom
` [PATCH 4.14 034/237] char/random: silence a lockdep splat with printk()
` [PATCH 4.14 035/237] random: fix crash on multiple early calls to add_bootloader_randomness()
` [PATCH 4.14 036/237] random: remove the blocking pool
` [PATCH 4.14 037/237] random: delete code to pull data into pools
` [PATCH 4.14 038/237] random: remove kernel.random.read_wakeup_threshold
` [PATCH 4.14 039/237] random: remove unnecessary unlikely()
` [PATCH 4.14 040/237] random: convert to ENTROPY_BITS for better code readability
` [PATCH 4.14 041/237] random: Add and use pr_fmt()
` [PATCH 4.14 042/237] random: fix typo in add_timer_randomness()
` [PATCH 4.14 043/237] random: remove some dead code of poolinfo
` [PATCH 4.14 044/237] random: split primary/secondary crng init paths
` [PATCH 4.14 045/237] random: avoid warnings for !CONFIG_NUMA builds
` [PATCH 4.14 046/237] x86: Remove arch_has_random, arch_has_random_seed
` [PATCH 4.14 047/237] powerpc: "
` [PATCH 4.14 048/237] s390: "
` [PATCH 4.14 049/237] linux/random.h: "
` [PATCH 4.14 050/237] linux/random.h: Use false with bool
` [PATCH 4.14 051/237] linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
` [PATCH 4.14 052/237] powerpc: Use bool in archrandom.h
` [PATCH 4.14 053/237] random: add arch_get_random_*long_early()
` [PATCH 4.14 054/237] random: avoid arch_get_random_seed_long() when collecting IRQ randomness
` [PATCH 4.14 055/237] random: remove dead code left over from blocking pool
` [PATCH 4.14 056/237] MAINTAINERS: co-maintain random.c
` [PATCH 4.14 057/237] crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
` [PATCH 4.14 058/237] crypto: blake2s - adjust include guard naming
` [PATCH 4.14 059/237] random: document add_hwgenerator_randomness() with other input functions
` [PATCH 4.14 060/237] random: remove unused irq_flags argument from add_interrupt_randomness()
` [PATCH 4.14 061/237] random: use BLAKE2s instead of SHA1 in extraction
` [PATCH 4.14 062/237] random: do not sign extend bytes for rotation when mixing
` [PATCH 4.14 063/237] random: do not re-init if crng_reseed completes before primary init
` [PATCH 4.14 064/237] random: mix bootloader randomness into pool
` [PATCH 4.14 065/237] random: harmonize "crng init done" messages
` [PATCH 4.14 066/237] random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
` [PATCH 4.14 067/237] random: initialize ChaCha20 constants with correct endianness
` [PATCH 4.14 068/237] random: early initialization of ChaCha constants
` [PATCH 4.14 069/237] random: avoid superfluous call to RDRAND in CRNG extraction
` [PATCH 4.14 070/237] random: dont reset crng_init_cnt on urandom_read()
` [PATCH 4.14 071/237] random: fix typo in comments
` [PATCH 4.14 072/237] random: cleanup poolinfo abstraction
` [PATCH 4.14 073/237] crypto: chacha20 - Fix chacha20_block() keystream alignment (again)
` [PATCH 4.14 074/237] random: cleanup integer types
` [PATCH 4.14 075/237] random: remove incomplete last_data logic
` [PATCH 4.14 076/237] random: remove unused extract_entropy() reserved argument
` [PATCH 4.14 077/237] random: try to actively add entropy rather than passively wait for it
` [PATCH 4.14 078/237] random: rather than entropy_store abstraction, use global
` [PATCH 4.14 079/237] random: remove unused OUTPUT_POOL constants
` [PATCH 4.14 080/237] random: de-duplicate INPUT_POOL constants
` [PATCH 4.14 081/237] random: prepend remaining pool constants with POOL_
` [PATCH 4.14 082/237] random: cleanup fractional entropy shift constants
` [PATCH 4.14 083/237] random: access input_pool_data directly rather than through pointer
` [PATCH 4.14 084/237] random: simplify arithmetic function flow in account()
` [PATCH 4.14 085/237] random: continually use hwgenerator randomness
` [PATCH 4.14 086/237] random: access primary_pool directly rather than through pointer
` [PATCH 4.14 087/237] random: only call crng_finalize_init() for primary_crng
` [PATCH 4.14 088/237] random: use computational hash for entropy extraction
` [PATCH 4.14 089/237] random: simplify entropy debiting
` [PATCH 4.14 090/237] random: use linear min-entropy accumulation crediting
` [PATCH 4.14 091/237] random: always wake up entropy writers after extraction
` [PATCH 4.14 092/237] random: make credit_entropy_bits() always safe
` [PATCH 4.14 093/237] random: remove use_input_pool parameter from crng_reseed()
` [PATCH 4.14 094/237] random: remove batched entropy locking
` [PATCH 4.14 095/237] random: fix locking in crng_fast_load()
` [PATCH 4.14 096/237] random: use RDSEED instead of RDRAND in entropy extraction
` [PATCH 4.14 097/237] random: inline leaves of rand_initialize()
` [PATCH 4.14 098/237] random: ensure early RDSEED goes through mixer on init
` [PATCH 4.14 099/237] random: do not xor RDRAND when writing into /dev/random
` [PATCH 4.14 100/237] random: absorb fast pool into input pool after fast load
` [PATCH 4.14 101/237] random: use hash function for crng_slow_load()
` [PATCH 4.14 102/237] random: remove outdated INT_MAX >> 6 check in urandom_read()
` [PATCH 4.14 103/237] random: zero buffer after reading entropy from userspace
` [PATCH 4.14 104/237] random: tie batched entropy generation to base_crng generation
` [PATCH 4.14 105/237] random: remove ifdefd out interrupt bench
` [PATCH 4.14 106/237] random: remove unused tracepoints
` [PATCH 4.14 107/237] random: add proper SPDX header
` [PATCH 4.14 108/237] random: deobfuscate irq u32/u64 contributions
` [PATCH 4.14 109/237] random: introduce drain_entropy() helper to declutter crng_reseed()
` [PATCH 4.14 110/237] random: remove useless header comment
` [PATCH 4.14 111/237] random: remove whitespace and reorder includes
` [PATCH 4.14 112/237] random: group initialization wait functions
` [PATCH 4.14 113/237] random: group entropy extraction functions
` [PATCH 4.14 114/237] random: group entropy collection functions
` [PATCH 4.14 115/237] random: group userspace read/write functions
` [PATCH 4.14 116/237] random: group sysctl functions
` [PATCH 4.14 117/237] random: rewrite header introductory comment
` [PATCH 4.14 118/237] random: defer fast pool mixing to worker
` [PATCH 4.14 119/237] random: do not take pool spinlock at boot
` [PATCH 4.14 120/237] random: unify early init crng load accounting
` [PATCH 4.14 121/237] random: check for crng_init == 0 in add_device_randomness()
` [PATCH 4.14 122/237] random: pull add_hwgenerator_randomness() declaration into random.h
` [PATCH 4.14 123/237] random: clear fast pool, crng, and batches in cpuhp bring up
` [PATCH 4.14 124/237] random: round-robin registers as ulong, not u32
` [PATCH 4.14 125/237] random: only wake up writers after zap if threshold was passed
` [PATCH 4.14 126/237] random: cleanup UUID handling
` [PATCH 4.14 127/237] random: unify cycles_t and jiffies usage and types
` [PATCH 4.14 128/237] random: do crng pre-init loading in worker rather than irq
` [PATCH 4.14 129/237] random: give sysctl_random_min_urandom_seed a more sensible value
` [PATCH 4.14 130/237] random: dont let 644 read-only sysctls be written to
` [PATCH 4.14 131/237] random: replace custom notifier chain with standard one
` [PATCH 4.14 132/237] random: use SipHash as interrupt entropy accumulator
` [PATCH 4.14 133/237] random: make consistent usage of crng_ready()
` [PATCH 4.14 135/237] random: check for signal and try earlier when generating entropy
` [PATCH 4.14 144/237] random: make random_get_entropy() return an unsigned long
` [PATCH 4.14 145/237] random: document crng_fast_key_erasure() destination possibility

[PATCH 4.9 000/264] 4.9.320-rc1 review
 2022-06-23 16:44 UTC  (64+ messages)
` [PATCH 4.9 085/264] random: do not re-init if crng_reseed completes before primary init
` [PATCH 4.9 089/264] random: initialize ChaCha20 constants with correct endianness
` [PATCH 4.9 105/264] random: access input_pool_data directly rather than through pointer
` [PATCH 4.9 107/264] random: continually use hwgenerator randomness
` [PATCH 4.9 110/264] random: use computational hash for entropy extraction
` [PATCH 4.9 114/264] random: make credit_entropy_bits() always safe
` [PATCH 4.9 119/264] random: inline leaves of rand_initialize()
` [PATCH 4.9 121/264] random: do not xor RDRAND when writing into /dev/random
` [PATCH 4.9 124/264] random: remove outdated INT_MAX >> 6 check in urandom_read()
` [PATCH 4.9 137/264] random: group userspace read/write functions
` [PATCH 4.9 138/264] random: group sysctl functions
` [PATCH 4.9 139/264] random: rewrite header introductory comment
` [PATCH 4.9 140/264] workqueue: make workqueue available early during boot
` [PATCH 4.9 141/264] random: defer fast pool mixing to worker
` [PATCH 4.9 213/264] random: check for signals after page of pool writes
` [PATCH 4.9 215/264] crypto: drbg - add FIPS 140-2 CTRNG for noise source
` [PATCH 4.9 216/264] crypto: drbg - always seeded with SP800-90B compliant "
` [PATCH 4.9 217/264] crypto: drbg - prepare for more fine-grained tracking of seeding state
` [PATCH 4.9 218/264] crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
` [PATCH 4.9 219/264] crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
` [PATCH 4.9 220/264] crypto: drbg - always try to free Jitter RNG instance
` [PATCH 4.9 221/264] crypto: drbg - make reseeding from get_random_bytes() synchronous
` [PATCH 4.9 222/264] random: avoid checking crng_ready() twice in random_init()
` [PATCH 4.9 225/264] ASoC: cs42l52: Fix TLV scales for mixer controls
` [PATCH 4.9 226/264] ASoC: cs53l30: Correct number of volume levels on SX controls
` [PATCH 4.9 227/264] ASoC: cs42l52: Correct TLV for Bypass Volume
` [PATCH 4.9 228/264] ASoC: cs42l56: Correct typo in minimum level for SX volume controls
` [PATCH 4.9 229/264] ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
` [PATCH 4.9 230/264] ASoC: wm8962: Fix suspend while playing music
` [PATCH 4.9 231/264] scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
` [PATCH 4.9 232/264] scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
` [PATCH 4.9 233/264] virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
` [PATCH 4.9 234/264] nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
` [PATCH 4.9 235/264] ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
` [PATCH 4.9 236/264] net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
` [PATCH 4.9 237/264] random: credit cpu and bootloader seeds by default
` [PATCH 4.9 238/264] pNFS: Dont keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
` [PATCH 4.9 239/264] misc: atmel-ssc: Fix IRQ check in ssc_probe
` [PATCH 4.9 240/264] irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
` [PATCH 4.9 241/264] irqchip/gic-v3: Iterate over possible CPUs by for_each_possible_cpu()
` [PATCH 4.9 242/264] comedi: vmk80xx: fix expression for tx buffer size
` [PATCH 4.9 243/264] USB: serial: option: add support for Cinterion MV31 with new baseline
` [PATCH 4.9 244/264] USB: serial: io_ti: add Agilent E5805A support
` [PATCH 4.9 245/264] usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
` [PATCH 4.9 246/264] serial: 8250: Store to lsr_save_flags after lsr read
` [PATCH 4.9 247/264] ext4: fix bug_on ext4_mb_use_inode_pa
` [PATCH 4.9 248/264] ext4: make variable "count" signed
` [PATCH 4.9 249/264] ext4: add reserved GDT blocks check
` [PATCH 4.9 250/264] l2tp: dont use inet_shutdown on ppp session destroy
` [PATCH 4.9 251/264] l2tp: fix race in pppol2tp_release with session object destroy
` [PATCH 4.9 252/264] s390/mm: use non-quiescing sske for KVM switch to keyed guest
` [PATCH 4.9 253/264] xprtrdma: fix incorrect header size calculations
` [PATCH 4.9 254/264] swiotlb: fix info leak with DMA_FROM_DEVICE
` [PATCH 4.9 255/264] Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
` [PATCH 4.9 256/264] fuse: fix pipe buffer lifetime for direct_io
` [PATCH 4.9 257/264] tcp: change source port randomizarion at connect() time
` [PATCH 4.9 258/264] tcp: add some entropy in __inet_hash_connect()
` [PATCH 4.9 259/264] secure_seq: use the 64 bits of the siphash for port offset calculation
` [PATCH 4.9 260/264] tcp: use different parts of the port_offset for index and offset
` [PATCH 4.9 261/264] tcp: add small random increments to the source port
` [PATCH 4.9 262/264] tcp: dynamically allocate the perturb table used by source ports
` [PATCH 4.9 263/264] tcp: increase source port perturb table to 2^16
` [PATCH 4.9 264/264] tcp: drop the hash_32() part from the index calculation


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).