Skip to content
Commit e03685b0 authored by Bruce Ashfield's avatar Bruce Ashfield Committed by Richard Purdie
Browse files

linux-yocto/5.10: update to v5.10.119



Updating  to the latest korg -stable release that comprises
the following commits:

    56c31ac1d8aa Linux 5.10.119
    7c57f2134988 ALSA: ctxfi: Add SB046x PCI ID
    514f58734001 random: check for signals after page of pool writes
    18c261e9485a random: wire up fops->splice_{read,write}_iter()
    cf8f8d37586f random: convert to using fops->write_iter()
    affa1ae52219 random: convert to using fops->read_iter()
    4bb374a1183b random: unify batched entropy implementations
    552ae8e4841b random: move randomize_page() into mm where it belongs
    5f2a040b2fb4 random: move initialization functions out of hot pages
    02102b63bd96 random: make consistent use of buf and len
    33783ca3556e random: use proper return types on get_random_{int,long}_wait()
    1fdd7eef2100 random: remove extern from functions in header
    811afd06e0f3 random: use static branch for crng_ready()
    04d61b96bd8a random: credit architectural init the exact amount
    5123cc61e27d random: handle latent entropy and command line from random_init()
    9320e087f2b6 random: use proper jiffies comparison macro
    31ac294037be random: remove ratelimiting for in-kernel unseeded randomness
    b50f2830b3df random: move initialization out of reseeding hot path
    4c4110c052e8 random: avoid initializing twice in credit race
    cef9010b78c4 random: use symbolic constants for crng_init states
    30e9f362661c siphash: use one source of truth for siphash permutations
    772edeb8c76a random: help compiler out with fast_mix() by using simpler arguments
    18413472339b random: do not use input pool from hard IRQs
    999b0c9e8a97 random: order timer entropy functions below interrupt functions
    ce3c4ff38186 random: do not pretend to handle premature next security model
    24d327568578 random: use first 128 bits of input as fast init
    273aebb50be6 random: do not use batches when !crng_ready()
    f4c98fe1d100 random: insist on random_get_entropy() existing in order to simplify
    ffcfdd5de9d0 xtensa: use fallback for random_get_entropy() instead of zero
    e1ea0e26d3e4 sparc: use fallback for random_get_entropy() instead of zero
    a5092be129cf um: use fallback for random_get_entropy() instead of zero
    25d4fdf1f0f8 x86/tsc: Use fallback for random_get_entropy() instead of zero
    0b93f40cbe97 nios2: use fallback for random_get_entropy() instead of zero
    fdca77508152 arm: use fallback for random_get_entropy() instead of zero
    d5531246afcf mips: use fallback for random_get_entropy() instead of just c0 random
    714def449776 riscv: use fallback for random_get_entropy() instead of zero
    84397906a603 m68k: use fallback for random_get_entropy() instead of zero
    7690be1adf8a timekeeping: Add raw clock fallback for random_get_entropy()
    07b5d0b3e2cc powerpc: define get_cycles macro for arch-override
    30ee01bcdc2c alpha: define get_cycles macro for arch-override
    c55a863c304e parisc: define get_cycles macro for arch-override
    641d1fbd9667 s390: define get_cycles macro for arch-override
    c895438b172c ia64: define get_cycles macro for arch-override
    7d9eab78bed9 init: call time_init() before rand_initialize()
    ec25e386d381 random: fix sysctl documentation nits
    9dff512945f1 random: document crng_fast_key_erasure() destination possibility
    a1b5c849d855 random: make random_get_entropy() return an unsigned long
    72a9ec8d7514 random: allow partial reads if later user copies fail
    1805d20dfb67 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
    9641d9b4303f random: check for signal_pending() outside of need_resched() check
    26ee8fa4dfda random: do not allow user to keep crng key around on stack
    bb515a5beff2 random: do not split fast init input in add_hwgenerator_randomness()
    be0d4e3e96ad random: mix build-time latent entropy into pool at init
    bb563d06c5bc random: re-add removed comment about get_random_{u32,u64} reseeding
    f3bc5eca83d3 random: treat bootloader trust toggle the same way as cpu trust toggle
    7cb6782146b8 random: skip fast_init if hwrng provides large chunk of entropy
    083ab33951e4 random: check for signal and try earlier when generating entropy
    20da9c6079df random: reseed more often immediately after booting
    9891211dfe03 random: make consistent usage of crng_ready()
    95a1c94a1bd7 random: use SipHash as interrupt entropy accumulator
    849e7b744cf2 random: replace custom notifier chain with standard one
    66307429b5df random: don't let 644 read-only sysctls be written to
    4c74ca006afe random: give sysctl_random_min_urandom_seed a more sensible value
    0964a76fd58b random: do crng pre-init loading in worker rather than irq
    192d4c6cb3e2 random: unify cycles_t and jiffies usage and types
    47f0e89b71e2 random: cleanup UUID handling
    9b0e0e27140d random: only wake up writers after zap if threshold was passed
    c47f215ab36d random: round-robin registers as ulong, not u32
    5064550d422d random: clear fast pool, crng, and batches in cpuhp bring up
    6e1cb84cc6a0 random: pull add_hwgenerator_randomness() declaration into random.h
    32252548b50f random: check for crng_init == 0 in add_device_randomness()
    684e9fe92d44 random: unify early init crng load accounting
    f656bd0011fd random: do not take pool spinlock at boot
    5d73e69a5dd4 random: defer fast pool mixing to worker
    7873321cd88f random: rewrite header introductory comment
    6d1671b6d253 random: group sysctl functions
    21ae543e3afb random: group userspace read/write functions
    f04580811d26 random: group entropy collection functions
    e9ff357860ab random: group entropy extraction functions
    d7e5b1925a67 random: group crng functions
    6b1ffb3b5a08 random: group initialization wait functions
    6c9cee15555d random: remove whitespace and reorder includes
    7b0f36f7c252 random: remove useless header comment
    b3901816545e random: introduce drain_entropy() helper to declutter crng_reseed()
    0971c1c2fdc6 random: deobfuscate irq u32/u64 contributions
    ae1b8f19542f random: add proper SPDX header
    9342656c013d random: remove unused tracepoints
    17ad693cd214 random: remove ifdef'd out interrupt bench
    28683a188537 random: tie batched entropy generation to base_crng generation
    adc32acf23db random: fix locking for crng_init in crng_reseed()
    bb63851c2557 random: zero buffer after reading entropy from userspace
    63c1aae40ac1 random: remove outdated INT_MAX >> 6 check in urandom_read()
    07280d2c3f33 random: make more consistent use of integer types
    655a69cb41e0 random: use hash function for crng_slow_load()
    95026060d809 random: use simpler fast key erasure flow on per-cpu keys
    732872aa2c41 random: absorb fast pool into input pool after fast load
    7a5b9ca583f9 random: do not xor RDRAND when writing into /dev/random
    16a6e4ae71e2 random: ensure early RDSEED goes through mixer on init
    c521bf08ee69 random: inline leaves of rand_initialize()
    70377ee0740c random: get rid of secondary crngs
    c36e71b5a52e random: use RDSEED instead of RDRAND in entropy extraction
    1d1582e5fe52 random: fix locking in crng_fast_load()
    0762b7d1f1ad random: remove batched entropy locking
    8d07e2a22687 random: remove use_input_pool parameter from crng_reseed()
    b07fcd9e53fa random: make credit_entropy_bits() always safe
    32d1d7ce3aad random: always wake up entropy writers after extraction
    985292206167 random: use linear min-entropy accumulation crediting
    bb9c45cfb97e random: simplify entropy debiting
    de0727c0c448 random: use computational hash for entropy extraction
    e0cc561e4758 random: only call crng_finalize_init() for primary_crng
    480fd91dcdc7 random: access primary_pool directly rather than through pointer
    0b9e36e895bb random: continually use hwgenerator randomness
    6d2d29f051be random: simplify arithmetic function flow in account()
    a0653a9ec15e random: selectively clang-format where it makes sense
    bccc8d92310d random: access input_pool_data directly rather than through pointer
    a9db850c219f random: cleanup fractional entropy shift constants
    edd294052e77 random: prepend remaining pool constants with POOL_
    f87f50b843e4 random: de-duplicate INPUT_POOL constants
    09ae6b851979 random: remove unused OUTPUT_POOL constants
    8cc5260c19da random: rather than entropy_store abstraction, use global
    5897e06ac15a random: remove unused extract_entropy() reserved argument
    ae093ca1256e random: remove incomplete last_data logic
    7abbc9809fa0 random: cleanup integer types
    c9e108e36dc8 random: cleanup poolinfo abstraction
    8a3b78f9177c random: fix typo in comments
    0ad5d6384d25 random: don't reset crng_init_cnt on urandom_read()
    17420c77f04c random: avoid superfluous call to RDRAND in CRNG extraction
    c245231aecd3 random: early initialization of ChaCha constants
    efaddd56bc54 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
    644320410266 random: harmonize "crng init done" messages
    ca57d51126e4 random: mix bootloader randomness into pool
    542d8ebedb4d random: do not re-init if crng_reseed completes before primary init
    2bfdf588a811 random: do not sign extend bytes for rotation when mixing
    685200b076ff random: use BLAKE2s instead of SHA1 in extraction
    33c30bfe4fb4 random: remove unused irq_flags argument from add_interrupt_randomness()
    b57a88874088 random: document add_hwgenerator_randomness() with other input functions
    ae33c501e059 lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
    07918ddba3ab lib/crypto: sha1: re-roll loops to reduce code size
    5fb6a3ba3af6 lib/crypto: blake2s: move hmac construction into wireguard
    62531d446a98 lib/crypto: blake2s: include as built-in
    aec0878b1d13 crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
    030d3443aa61 crypto: blake2s - adjust include guard naming
    fea91e907076 crypto: blake2s - add comment for blake2s_state fields
    d45ae768b71b crypto: blake2s - optimize blake2s initialization
    6c362b7c7764 crypto: blake2s - share the "shash" API boilerplate code
    72e5b68f33a1 crypto: blake2s - move update and final logic to internal/blake2s.h
    e467a55bd006 crypto: blake2s - remove unneeded includes
    198a19d7ee95 crypto: x86/blake2s - define shash_alg structs using macros
    89f9ee998e36 crypto: blake2s - define shash_alg structs using macros
    0f8fcf5b6ed7 crypto: lib/blake2s - Move selftest prototype into header file
    c3a4645d803e MAINTAINERS: add git tree for random.c
    c4882c6e1ec9 MAINTAINERS: co-maintain random.c
    acb198c4d11f random: remove dead code left over from blocking pool
    6227458fef95 random: avoid arch_get_random_seed_long() when collecting IRQ randomness
    257fbea15ab1 ACPI: sysfs: Fix BERT error region memory mapping
    14fa2769ea6c ACPI: sysfs: Make sparse happy about address space in use
    0debc69f003b media: vim2m: initialize the media device earlier
    ed0e71cc3f1e media: vim2m: Register video device after setting up internals
    a5c68f457fbf secure_seq: use the 64 bits of the siphash for port offset calculation
    33f1b4a27abc tcp: change source port randomizarion at connect() time
    9b4aa0d80b18 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID
    74c6e5d58435 KVM: x86: Properly handle APF vs disabled LAPIC situation
    c06e5f751a08 staging: rtl8723bs: prevent ->Ssid overflow in rtw_wx_set_scan()
    a8f4d63142f9 lockdown: also lock down previous kgdb use

Signed-off-by: default avatarBruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: default avatarRichard Purdie <richard.purdie@linuxfoundation.org>
parent 20bd3132
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment