summaryrefslogtreecommitdiffstats
path: root/drivers/char
Commit message (Expand)AuthorAgeFilesLines
* Revert "random: use static branch for crng_ready()"Jason A. Donenfeld2022-06-091-10/+2
* hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resu...Yang Yingliang2022-06-091-1/+1
* ipmi: Fix pr_fmt to avoid compilation issuesCorey Minyard2022-06-091-2/+2
* ipmi:ssif: Check for NULL msg when handling events and messagesCorey Minyard2022-06-091-0/+23
* tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()Xiu Jianfeng2022-06-061-0/+1
* tpm: Fix buffer access in tpm2_get_tpm_pt()Stefan Mahnke-Hartmann2022-06-061-1/+10
* crypto: drbg - make reseeding from get_random_bytes() synchronousNicolai Stange2022-06-061-2/+0
* random: check for signals after page of pool writesJason A. Donenfeld2022-05-301-4/+10
* random: wire up fops->splice_{read,write}_iter()Jens Axboe2022-05-301-0/+4
* random: convert to using fops->write_iter()Jens Axboe2022-05-301-32/+35
* random: convert to using fops->read_iter()Jens Axboe2022-05-301-36/+30
* random: unify batched entropy implementationsJason A. Donenfeld2022-05-301-92/+55
* random: move randomize_page() into mm where it belongsJason A. Donenfeld2022-05-301-32/+0
* random: move initialization functions out of hot pagesJason A. Donenfeld2022-05-301-22/+18
* random: make consistent use of buf and lenJason A. Donenfeld2022-05-301-99/+94
* random: use static branch for crng_ready()Jason A. Donenfeld2022-05-301-4/+12
* random: credit architectural init the exact amountJason A. Donenfeld2022-05-301-6/+6
* random: handle latent entropy and command line from random_init()Jason A. Donenfeld2022-05-301-5/+8
* random: use proper jiffies comparison macroJason A. Donenfeld2022-05-301-1/+1
* random: remove ratelimiting for in-kernel unseeded randomnessJason A. Donenfeld2022-05-301-43/+18
* random: move initialization out of reseeding hot pathJason A. Donenfeld2022-05-301-23/+19
* random: avoid initializing twice in credit raceJason A. Donenfeld2022-05-301-5/+5
* random: use symbolic constants for crng_init statesJason A. Donenfeld2022-05-301-19/+19
* siphash: use one source of truth for siphash permutationsJason A. Donenfeld2022-05-301-23/+7
* random: help compiler out with fast_mix() by using simpler argumentsJason A. Donenfeld2022-05-301-21/+23
* random: do not use input pool from hard IRQsJason A. Donenfeld2022-05-301-15/+36
* random: order timer entropy functions below interrupt functionsJason A. Donenfeld2022-05-301-119/+119
* random: do not pretend to handle premature next security modelJason A. Donenfeld2022-05-301-112/+62
* random: use first 128 bits of input as fast initJason A. Donenfeld2022-05-301-97/+49
* random: do not use batches when !crng_ready()Jason A. Donenfeld2022-05-301-3/+11
* random: insist on random_get_entropy() existing in order to simplifyJason A. Donenfeld2022-05-301-60/+26
* random: document crng_fast_key_erasure() destination possibilityJason A. Donenfeld2022-05-301-0/+7
* random: make random_get_entropy() return an unsigned longJason A. Donenfeld2022-05-301-13/+7
* random: allow partial reads if later user copies failJason A. Donenfeld2022-05-301-10/+12
* random: check for signals every PAGE_SIZE chunk of /dev/[u]randomJason A. Donenfeld2022-05-301-10/+7
* random: check for signal_pending() outside of need_resched() checkJann Horn2022-05-301-2/+2
* random: do not allow user to keep crng key around on stackJason A. Donenfeld2022-05-301-12/+23
* random: do not split fast init input in add_hwgenerator_randomness()Jan Varho2022-05-301-17/+6
* random: mix build-time latent entropy into pool at initJason A. Donenfeld2022-05-301-0/+5
* random: re-add removed comment about get_random_{u32,u64} reseedingJason A. Donenfeld2022-05-301-3/+4
* random: treat bootloader trust toggle the same way as cpu trust toggleJason A. Donenfeld2022-05-302-2/+9
* random: skip fast_init if hwrng provides large chunk of entropyJason A. Donenfeld2022-05-301-1/+1
* random: check for signal and try earlier when generating entropyJason A. Donenfeld2022-05-301-2/+3
* random: reseed more often immediately after bootingJason A. Donenfeld2022-05-301-3/+25
* random: make consistent usage of crng_ready()Jason A. Donenfeld2022-05-301-12/+7
* random: use SipHash as interrupt entropy accumulatorJason A. Donenfeld2022-05-301-39/+55
* random: replace custom notifier chain with standard oneJason A. Donenfeld2022-05-301-48/+21
* random: don't let 644 read-only sysctls be written toJason A. Donenfeld2022-05-301-2/+9
* random: give sysctl_random_min_urandom_seed a more sensible valueJason A. Donenfeld2022-05-301-2/+2
* random: do crng pre-init loading in worker rather than irqJason A. Donenfeld2022-05-301-46/+19