summaryrefslogtreecommitdiff
path: root/drivers/char/random.c
diff options
context:
space:
mode:
authorClark Williams <williams@redhat.com>2020-04-14 09:27:25 -0500
committerClark Williams <williams@redhat.com>2020-04-14 09:27:25 -0500
commitbd78e313bbbd533dd6e320d4fe3668fc835fd3d2 (patch)
treebac74f3a8e2bcaab54b2bedb6ac607ee1bf6f4f5 /drivers/char/random.c
parentec9810c2b626cded51bb6fd0473f1e25f7ec60b8 (diff)
parent5188957a315f664d46ff58fedecbc0f7503f1b22 (diff)
downloadlinux-rt-bd78e313bbbd533dd6e320d4fe3668fc835fd3d2.tar.gz
Merge tag 'v4.9.219' into v4.9-rt
This is the 4.9.219 stable release * tag 'v4.9.219': Linux 4.9.219 drm/msm: Use the correct dma_sync calls in msm_gem drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() usb: dwc3: don't set gadget->is_otg flag arm64: Fix size of __early_cpu_boot_status drm/msm: stop abusing dma_map/unmap for cache clk: qcom: rcg: Return failure for RCG update RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl ceph: canonicalize server path in place ceph: remove the extra slashes in the server path IB/hfi1: Fix memory leaks in sysfs registration and unregistration IB/hfi1: Call kobject_put() when kobject_init_and_add() fails ASoC: jz4740-i2s: Fix divider written at incorrect offset in register tools/accounting/getdelays.c: fix netlink attribute length random: always use batched entropy for get_random_u{32,64} net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers slcan: Don't transmit uninitialized stack data in padding net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting net: dsa: bcm_sf2: Ensure correct sub-node is parsed mm: mempolicy: require at least one nodeid for MPOL_PREFERRED padata: always acquire cpu_hotplug_lock before pinst->lock net: dsa: tag_brcm: Fix skb->fwd_offload_mark location coresight: do not use the BIT() macro in the UAPI header blk-mq: Allow blocking queue tag iter callbacks blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter drm/etnaviv: replace MMU flush marker with flush sequence sctp: fix possibly using a bad saddr with a given dst sctp: fix refcount bug in sctp_wfree net, ip_tunnel: fix interface lookup with no key ipv4: fix a RCU-list lock in fib_triestat_seq_show drm/bochs: downgrade pci_request_region failure from error to warning l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall() l2tp: ensure sessions are freed after their PPPOL2TP socket Signed-off-by: Clark Williams <williams@redhat.com> Conflicts: drivers/char/random.c
Diffstat (limited to 'drivers/char/random.c')
-rw-r--r--drivers/char/random.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c
index aba13eddeab6..c033135f2a67 100644
--- a/drivers/char/random.c
+++ b/drivers/char/random.c
@@ -1665,7 +1665,7 @@ void get_random_bytes_arch(void *buf, int nbytes)
if (!arch_get_random_long(&v))
break;
-
+
memcpy(p, &v, chunk);
p += chunk;
nbytes -= chunk;
@@ -2115,8 +2115,8 @@ struct batched_entropy {
/*
* Get a random word for internal kernel use only. The quality of the random
- * number is either as good as RDRAND or as good as /dev/urandom, with the
- * goal of being quite fast and not depleting entropy.
+ * number is good as /dev/urandom, but there is no backtrack protection, with
+ * the goal of being quite fast and not depleting entropy.
*/
static DEFINE_PER_CPU(struct batched_entropy, batched_entropy_long);
static DEFINE_LOCAL_IRQ_LOCK(batched_entropy_long_lock);