author | Linus Torvalds <torvalds@linux-foundation.org> | |
Sun, 22 Apr 2018 04:20:48 +0000 (21:20 -0700) | ||
committer | Linus Torvalds <torvalds@linux-foundation.org> | |
Sun, 22 Apr 2018 04:20:48 +0000 (21:20 -0700) | ||
commit | 285848b0f4074f04ab606f1e5dca296482033d54 | |
tree | d807840875deed64561550304e8e1907b7d0b215 | tree | snapshot (tar.xz tar.gz zip) |
parent | 4c50ceae8f3b56e7c13b327f01e973b4127142a2 | commit | diff |
parent | d848e5f8e1ebdb227d045db55fe4f825e82965fa | commit | diff |
Merge tag 'random_for_linus_stable' of git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random
Pull /dev/random fixes from Ted Ts'o:
"Fix some bugs in the /dev/random driver which causes getrandom(2) to
unblock earlier than designed.
Thanks to Jann Horn from Google's Project Zero for pointing this out
to me"
* tag 'random_for_linus_stable' of git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random:
random: add new ioctl RNDRESEEDCRNG
random: crng_reseed() should lock the crng instance that it is modifying
random: set up the NUMA crng instances after the CRNG is fully initialized
random: use a different mixing algorithm for add_device_randomness()
random: fix crng_ready() test
Pull /dev/random fixes from Ted Ts'o:
"Fix some bugs in the /dev/random driver which causes getrandom(2) to
unblock earlier than designed.
Thanks to Jann Horn from Google's Project Zero for pointing this out
to me"
* tag 'random_for_linus_stable' of git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random:
random: add new ioctl RNDRESEEDCRNG
random: crng_reseed() should lock the crng instance that it is modifying
random: set up the NUMA crng instances after the CRNG is fully initialized
random: use a different mixing algorithm for add_device_randomness()
random: fix crng_ready() test