diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2022-04-16 16:42:53 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2022-04-16 16:42:53 -0700 |
commit | 92edbe32e3822f7b66e471c7e0bd5ee5d63bf4b8 (patch) | |
tree | 6e86bb46c91c6437f3938a12aab0842c6e4b79e0 /arch/arm64/kernel/smp.c | |
parent | 90ea17a9e27b5778ec517efb1ce0b81d36905654 (diff) | |
parent | 35a33ff3807d3adb9daaf937f5bca002ffa9f84e (diff) | |
download | linux-92edbe32e3822f7b66e471c7e0bd5ee5d63bf4b8.tar.bz2 |
Merge tag 'random-5.18-rc3-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/crng/random
Pull random number generator fixes from Jason Donenfeld:
- Per your suggestion, random reads now won't fail if there's a page
fault after some non-zero amount of data has been read, which makes
the behavior consistent with all other reads in the kernel.
- Rather than an inconsistent mix of random_get_entropy() returning an
unsigned long or a cycles_t, now it just returns an unsigned long.
- A memcpy() was replaced with an memmove(), because the addresses are
sometimes overlapping. In practice the destination is always before
the source, so not really an issue, but better to be correct than
not.
* tag 'random-5.18-rc3-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/crng/random:
random: use memmove instead of memcpy for remaining 32 bytes
random: make random_get_entropy() return an unsigned long
random: allow partial reads if later user copies fail
Diffstat (limited to 'arch/arm64/kernel/smp.c')
0 files changed, 0 insertions, 0 deletions