diff options
author | Clark Williams <williams@redhat.com> | 2020-04-14 09:27:25 -0500 |
---|---|---|
committer | Clark Williams <williams@redhat.com> | 2020-04-14 09:27:25 -0500 |
commit | bd78e313bbbd533dd6e320d4fe3668fc835fd3d2 (patch) | |
tree | bac74f3a8e2bcaab54b2bedb6ac607ee1bf6f4f5 /drivers/char/random.c | |
parent | ec9810c2b626cded51bb6fd0473f1e25f7ec60b8 (diff) | |
parent | 5188957a315f664d46ff58fedecbc0f7503f1b22 (diff) | |
download | linux-rt-bd78e313bbbd533dd6e320d4fe3668fc835fd3d2.tar.gz |
Merge tag 'v4.9.219' into v4.9-rt
This is the 4.9.219 stable release
* tag 'v4.9.219':
Linux 4.9.219
drm/msm: Use the correct dma_sync calls in msm_gem
drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read()
usb: dwc3: don't set gadget->is_otg flag
arm64: Fix size of __early_cpu_boot_status
drm/msm: stop abusing dma_map/unmap for cache
clk: qcom: rcg: Return failure for RCG update
RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
ceph: canonicalize server path in place
ceph: remove the extra slashes in the server path
IB/hfi1: Fix memory leaks in sysfs registration and unregistration
IB/hfi1: Call kobject_put() when kobject_init_and_add() fails
ASoC: jz4740-i2s: Fix divider written at incorrect offset in register
tools/accounting/getdelays.c: fix netlink attribute length
random: always use batched entropy for get_random_u{32,64}
net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers
slcan: Don't transmit uninitialized stack data in padding
net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting
net: dsa: bcm_sf2: Ensure correct sub-node is parsed
mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
padata: always acquire cpu_hotplug_lock before pinst->lock
net: dsa: tag_brcm: Fix skb->fwd_offload_mark location
coresight: do not use the BIT() macro in the UAPI header
blk-mq: Allow blocking queue tag iter callbacks
blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
drm/etnaviv: replace MMU flush marker with flush sequence
sctp: fix possibly using a bad saddr with a given dst
sctp: fix refcount bug in sctp_wfree
net, ip_tunnel: fix interface lookup with no key
ipv4: fix a RCU-list lock in fib_triestat_seq_show
drm/bochs: downgrade pci_request_region failure from error to warning
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()
l2tp: ensure sessions are freed after their PPPOL2TP socket
Signed-off-by: Clark Williams <williams@redhat.com>
Conflicts:
drivers/char/random.c
Diffstat (limited to 'drivers/char/random.c')
-rw-r--r-- | drivers/char/random.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c index aba13eddeab6..c033135f2a67 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -1665,7 +1665,7 @@ void get_random_bytes_arch(void *buf, int nbytes) if (!arch_get_random_long(&v)) break; - + memcpy(p, &v, chunk); p += chunk; nbytes -= chunk; @@ -2115,8 +2115,8 @@ struct batched_entropy { /* * Get a random word for internal kernel use only. The quality of the random - * number is either as good as RDRAND or as good as /dev/urandom, with the - * goal of being quite fast and not depleting entropy. + * number is good as /dev/urandom, but there is no backtrack protection, with + * the goal of being quite fast and not depleting entropy. */ static DEFINE_PER_CPU(struct batched_entropy, batched_entropy_long); static DEFINE_LOCAL_IRQ_LOCK(batched_entropy_long_lock); |