This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/llvm-release-arm-stable-defconfig in repository toolchain/ci/linux.
from affa1a0b4d45 Merge v5.17.10 adds 297364739e1b mptcp: Do TCP fallback on early DSS checksum failure adds e960d734930b Linux 5.17.11 adds a4f06bc86df5 Merge v5.17.11 new 0650aa520ae8 HID: amd_sfh: Add support for sensor discovery new 19a66796d1f0 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID new efba5eb2281e random: use computational hash for entropy extraction new 2d6c74b87f65 random: simplify entropy debiting new bd7d220a614a random: use linear min-entropy accumulation crediting new 740414024d59 random: always wake up entropy writers after extraction new 4fa0d8ed5c45 random: make credit_entropy_bits() always safe new a53df4495996 random: remove use_input_pool parameter from crng_reseed() new 048d57faf93c random: remove batched entropy locking new ba2005493776 random: fix locking in crng_fast_load() new bd6f26c2a375 random: use RDSEED instead of RDRAND in entropy extraction new e5af930b65d8 random: get rid of secondary crngs new 18ae4b529d3b random: inline leaves of rand_initialize() new 6057a5d6a3b7 random: ensure early RDSEED goes through mixer on init new badc140de820 random: do not xor RDRAND when writing into /dev/random new 8643bf4db178 random: absorb fast pool into input pool after fast load new 2aca3e634a52 random: use simpler fast key erasure flow on per-cpu keys new 5e2eceffd13b random: use hash function for crng_slow_load() new d1d80e9c4f16 random: make more consistent use of integer types new 3272ad78eca7 random: remove outdated INT_MAX >> 6 check in urandom_read() new 06460c438d4a random: zero buffer after reading entropy from userspace new 432b6e6e6009 random: fix locking for crng_init in crng_reseed() new d52d9b75cf94 random: tie batched entropy generation to base_crng generation new 5dde7c4d00b9 random: remove ifdef'd out interrupt bench new a66146af77c4 random: remove unused tracepoints new 5753c6533162 random: add proper SPDX header new 8a5bdefe3b2d random: deobfuscate irq u32/u64 contributions new fc8ce0999626 random: introduce drain_entropy() helper to declutter crng [...] new 26db5c080d13 random: remove useless header comment new 93f764a0fc14 random: remove whitespace and reorder includes new 799d1e8d7ae4 random: group initialization wait functions new 53418d3c5a08 random: group crng functions new 7c0cd71d0b17 random: group entropy extraction functions new b94106cb842a random: group entropy collection functions new 04c5d0c3a85f random: group userspace read/write functions new 118b78be8e4a random: group sysctl functions new 8bbe2f4be761 random: rewrite header introductory comment new a4217ab7175e random: defer fast pool mixing to worker new 89148b5c36c4 random: do not take pool spinlock at boot new 993d28d586fe random: unify early init crng load accounting new 0014e4fc9438 random: check for crng_init == 0 in add_device_randomness() new 101d38dd808b random: pull add_hwgenerator_randomness() declaration into [...] new dc64f36e88b9 random: clear fast pool, crng, and batches in cpuhp bring up new 83b4dbb8cd5c random: round-robin registers as ulong, not u32 new 14b565abce10 random: only wake up writers after zap if threshold was passed new e75a5b24f5f6 random: cleanup UUID handling new 4dec7f2f3c68 random: unify cycles_t and jiffies usage and types new a12d3e7b695d random: do crng pre-init loading in worker rather than irq new eca9204717ad random: give sysctl_random_min_urandom_seed a more sensible value new bdfa5997e9fe random: don't let 644 read-only sysctls be written to new 367c559a20d0 random: replace custom notifier chain with standard one new db9b977310bf random: use SipHash as interrupt entropy accumulator new 0d19aeee38f5 random: make consistent usage of crng_ready() new ff1ca4a832ef random: reseed more often immediately after booting new ded7b5cb5fdb random: check for signal and try earlier when generating entropy new d82e9eac3aae random: skip fast_init if hwrng provides large chunk of entropy new 9b1d7b3f0b85 random: treat bootloader trust toggle the same way as cpu [...] new a1baaeff24ff random: re-add removed comment about get_random_{u32,u64} [...] new 24abaf3f2c27 random: mix build-time latent entropy into pool at init new da31d0d02da4 random: do not split fast init input in add_hwgenerator_ra [...] new b8567f745fa6 random: do not allow user to keep crng key around on stack new 90fc9bf665b2 random: check for signal_pending() outside of need_resched [...] new 6ce4add612f4 random: check for signals every PAGE_SIZE chunk of /dev/[u]random new 96260d6235fd random: allow partial reads if later user copies fail new 284ca0bd8276 random: make random_get_entropy() return an unsigned long new dcc76aa03228 random: document crng_fast_key_erasure() destination possibility new 80f5814079f4 random: fix sysctl documentation nits new 12ea85416610 init: call time_init() before rand_initialize() new 01f814b110ec ia64: define get_cycles macro for arch-override new 312903826870 s390: define get_cycles macro for arch-override new 4b40eda72a4b parisc: define get_cycles macro for arch-override new af739f071963 alpha: define get_cycles macro for arch-override new d2e082dc5209 powerpc: define get_cycles macro for arch-override new 9aaae713da1f timekeeping: Add raw clock fallback for random_get_entropy() new ff52f69a4d2d m68k: use fallback for random_get_entropy() instead of zero new 715066a79ea9 riscv: use fallback for random_get_entropy() instead of zero new 131a92aa0b7b mips: use fallback for random_get_entropy() instead of jus [...] new 357f8b293e4b arm: use fallback for random_get_entropy() instead of zero new 71cc2c05cc1c nios2: use fallback for random_get_entropy() instead of zero new 9771084ea544 x86/tsc: Use fallback for random_get_entropy() instead of zero new 36b6fc9afe25 um: use fallback for random_get_entropy() instead of zero new 1cdbac296ee5 sparc: use fallback for random_get_entropy() instead of zero new 227221a9c9de xtensa: use fallback for random_get_entropy() instead of zero new c7a9336169b3 random: insist on random_get_entropy() existing in order t [...] new 6521446a5f21 random: do not use batches when !crng_ready() new 427346f4bc8c random: use first 128 bits of input as fast init new c3b0492820e1 random: do not pretend to handle premature next security model new 1705dc1fc202 random: order timer entropy functions below interrupt functions new de2ba59544b6 random: do not use input pool from hard IRQs new c5ff607d9498 random: help compiler out with fast_mix() by using simpler [...] new 9ebf07a79140 siphash: use one source of truth for siphash permutations new 4f8ab1ca8aac random: use symbolic constants for crng_init states new 8fe9ac5ed215 random: avoid initializing twice in credit race new e6b205dcc981 random: move initialization out of reseeding hot path new b4b11eb04905 random: remove ratelimiting for in-kernel unseeded randomness new e78d195f30b4 random: use proper jiffies comparison macro new e136fbd60e54 random: handle latent entropy and command line from random_init() new d3fc4f466111 random: credit architectural init the exact amount new 80ec4c649102 random: use static branch for crng_ready() new 245b1ae3969b random: remove extern from functions in header new 65d3f67f00be random: use proper return types on get_random_{int,long}_wait() new e35c23cb1257 random: make consistent use of buf and len new 41f07747e845 random: move initialization functions out of hot pages new 817191b4c37a random: move randomize_page() into mm where it belongs new fb7d06d39e99 random: unify batched entropy implementations new afc002fdd1e5 random: convert to using fops->read_iter() new 27bf1c93bfe2 random: convert to using fops->write_iter() new de63c5e7f40f random: wire up fops->splice_{read,write}_iter() new 3879d3f918ef random: check for signals after page of pool writes new 567ae03f0caa ACPI: sysfs: Fix BERT error region memory mapping new d3bbcba97b5b ALSA: ctxfi: Add SB046x PCI ID new 39555c443b4f Linux 5.17.12 new b3dbdcb8f836 Merge v5.17.12
The 113 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/kernel-parameters.txt | 6 + Documentation/admin-guide/sysctl/kernel.rst | 22 +- Makefile | 2 +- arch/alpha/include/asm/timex.h | 1 + arch/arm/include/asm/timex.h | 1 + arch/ia64/include/asm/timex.h | 1 + arch/m68k/include/asm/timex.h | 2 +- arch/mips/include/asm/timex.h | 17 +- arch/nios2/include/asm/timex.h | 3 + arch/parisc/include/asm/timex.h | 3 +- arch/powerpc/include/asm/timex.h | 1 + arch/riscv/include/asm/timex.h | 2 +- arch/s390/include/asm/timex.h | 1 + arch/sparc/include/asm/timex_32.h | 4 +- arch/um/include/asm/timex.h | 9 +- arch/x86/include/asm/timex.h | 9 + arch/x86/include/asm/tsc.h | 7 +- arch/x86/kvm/mmu/mmu.c | 6 +- arch/xtensa/include/asm/timex.h | 6 +- drivers/acpi/sysfs.c | 25 +- drivers/char/Kconfig | 3 +- drivers/char/hw_random/core.c | 1 + drivers/char/random.c | 2868 +++++++++-------------- drivers/hid/amd-sfh-hid/amd_sfh_client.c | 11 + drivers/hid/amd-sfh-hid/amd_sfh_pcie.c | 7 + drivers/hid/amd-sfh-hid/amd_sfh_pcie.h | 4 + include/linux/cpuhotplug.h | 2 + include/linux/hw_random.h | 2 - include/linux/mm.h | 1 + include/linux/prandom.h | 23 +- include/linux/random.h | 100 +- include/linux/siphash.h | 28 + include/linux/timex.h | 10 +- include/trace/events/random.h | 233 -- init/main.c | 13 +- kernel/cpu.c | 11 + kernel/time/timekeeping.c | 15 + lib/Kconfig.debug | 3 +- lib/random32.c | 14 +- lib/siphash.c | 32 +- lib/vsprintf.c | 10 +- mm/util.c | 32 + net/mptcp/protocol.h | 3 +- net/mptcp/subflow.c | 21 +- sound/pci/ctxfi/ctatc.c | 2 + sound/pci/ctxfi/cthardware.h | 3 +- 46 files changed, 1384 insertions(+), 2196 deletions(-) delete mode 100644 include/trace/events/random.h