Updating to the latest korg -stable release that comprises
the following commits:
56c31ac1d8aa Linux 5.10.119
7c57f2134988 ALSA: ctxfi: Add SB046x PCI ID
514f58734001 random: check for signals after page of pool writes
18c261e9485a random: wire up fops->splice_{read,write}_iter()
cf8f8d37586f random: convert to using fops->write_iter()
affa1ae52219 random: convert to using fops->read_iter()
4bb374a1183b random: unify batched entropy implementations
552ae8e4841b random: move randomize_page() into mm where it belongs
5f2a040b2fb4 random: move initialization functions out of hot pages
02102b63bd96 random: make consistent use of buf and len
33783ca3556e random: use proper return types on get_random_{int,long}_wait()
1fdd7eef2100 random: remove extern from functions in header
811afd06e0f3 random: use static branch for crng_ready()
04d61b96bd8a random: credit architectural init the exact amount
5123cc61e27d random: handle latent entropy and command line from random_init()
9320e087f2b6 random: use proper jiffies comparison macro
31ac294037be random: remove ratelimiting for in-kernel unseeded randomness
b50f2830b3df random: move initialization out of reseeding hot path
4c4110c052e8 random: avoid initializing twice in credit race
cef9010b78c4 random: use symbolic constants for crng_init states
30e9f362661c siphash: use one source of truth for siphash permutations
772edeb8c76a random: help compiler out with fast_mix() by using simpler arguments
18413472339b random: do not use input pool from hard IRQs
999b0c9e8a97 random: order timer entropy functions below interrupt functions
ce3c4ff38186 random: do not pretend to handle premature next security model
24d327568578 random: use first 128 bits of input as fast init
273aebb50be6 random: do not use batches when !crng_ready()
f4c98fe1d100 random: insist on random_get_entropy() existing in order to simplify
ffcfdd5de9d0 xtensa: use fallback for random_get_entropy() instead of zero
e1ea0e26d3e4 sparc: use fallback for random_get_entropy() instead of zero
a5092be129cf um: use fallback for random_get_entropy() instead of zero
25d4fdf1f0f8 x86/tsc: Use fallback for random_get_entropy() instead of zero
0b93f40cbe97 nios2: use fallback for random_get_entropy() instead of zero
fdca77508152 arm: use fallback for random_get_entropy() instead of zero
d5531246afcf mips: use fallback for random_get_entropy() instead of just c0 random
714def449776 riscv: use fallback for random_get_entropy() instead of zero
84397906a603 m68k: use fallback for random_get_entropy() instead of zero
7690be1adf8a timekeeping: Add raw clock fallback for random_get_entropy()
07b5d0b3e2cc powerpc: define get_cycles macro for arch-override
30ee01bcdc2c alpha: define get_cycles macro for arch-override
c55a863c304e parisc: define get_cycles macro for arch-override
641d1fbd9667 s390: define get_cycles macro for arch-override
c895438b172c ia64: define get_cycles macro for arch-override
7d9eab78bed9 init: call time_init() before rand_initialize()
ec25e386d381 random: fix sysctl documentation nits
9dff512945f1 random: document crng_fast_key_erasure() destination possibility
a1b5c849d855 random: make random_get_entropy() return an unsigned long
72a9ec8d7514 random: allow partial reads if later user copies fail
1805d20dfb67 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
9641d9b4303f random: check for signal_pending() outside of need_resched() check
26ee8fa4dfda random: do not allow user to keep crng key around on stack
bb515a5beff2 random: do not split fast init input in add_hwgenerator_randomness()
be0d4e3e96ad random: mix build-time latent entropy into pool at init
bb563d06c5bc random: re-add removed comment about get_random_{u32,u64} reseeding
f3bc5eca83d3 random: treat bootloader trust toggle the same way as cpu trust toggle
7cb6782146b8 random: skip fast_init if hwrng provides large chunk of entropy
083ab33951e4 random: check for signal and try earlier when generating entropy
20da9c6079df random: reseed more often immediately after booting
9891211dfe03 random: make consistent usage of crng_ready()
95a1c94a1bd7 random: use SipHash as interrupt entropy accumulator
849e7b744cf2 random: replace custom notifier chain with standard one
66307429b5df random: don't let 644 read-only sysctls be written to
4c74ca006afe random: give sysctl_random_min_urandom_seed a more sensible value
0964a76fd58b random: do crng pre-init loading in worker rather than irq
192d4c6cb3e2 random: unify cycles_t and jiffies usage and types
47f0e89b71e2 random: cleanup UUID handling
9b0e0e27140d random: only wake up writers after zap if threshold was passed
c47f215ab36d random: round-robin registers as ulong, not u32
5064550d422d random: clear fast pool, crng, and batches in cpuhp bring up
6e1cb84cc6a0 random: pull add_hwgenerator_randomness() declaration into random.h
32252548b50f random: check for crng_init == 0 in add_device_randomness()
684e9fe92d44 random: unify early init crng load accounting
f656bd0011fd random: do not take pool spinlock at boot
5d73e69a5dd4 random: defer fast pool mixing to worker
7873321cd88f random: rewrite header introductory comment
6d1671b6d253 random: group sysctl functions
21ae543e3afb random: group userspace read/write functions
f04580811d26 random: group entropy collection functions
e9ff357860ab random: group entropy extraction functions
d7e5b1925a67 random: group crng functions
6b1ffb3b5a08 random: group initialization wait functions
6c9cee15555d random: remove whitespace and reorder includes
7b0f36f7c252 random: remove useless header comment
b3901816545e random: introduce drain_entropy() helper to declutter crng_reseed()
0971c1c2fdc6 random: deobfuscate irq u32/u64 contributions
ae1b8f19542f random: add proper SPDX header
9342656c013d random: remove unused tracepoints
17ad693cd214 random: remove ifdef'd out interrupt bench
28683a188537 random: tie batched entropy generation to base_crng generation
adc32acf23db random: fix locking for crng_init in crng_reseed()
bb63851c2557 random: zero buffer after reading entropy from userspace
63c1aae40ac1 random: remove outdated INT_MAX >> 6 check in urandom_read()
07280d2c3f33 random: make more consistent use of integer types
655a69cb41e0 random: use hash function for crng_slow_load()
95026060d809 random: use simpler fast key erasure flow on per-cpu keys
732872aa2c41 random: absorb fast pool into input pool after fast load
7a5b9ca583f9 random: do not xor RDRAND when writing into /dev/random
16a6e4ae71e2 random: ensure early RDSEED goes through mixer on init
c521bf08ee69 random: inline leaves of rand_initialize()
70377ee0740c random: get rid of secondary crngs
c36e71b5a52e random: use RDSEED instead of RDRAND in entropy extraction
1d1582e5fe52 random: fix locking in crng_fast_load()
0762b7d1f1ad random: remove batched entropy locking
8d07e2a22687 random: remove use_input_pool parameter from crng_reseed()
b07fcd9e53fa random: make credit_entropy_bits() always safe
32d1d7ce3aad random: always wake up entropy writers after extraction
985292206167 random: use linear min-entropy accumulation crediting
bb9c45cfb97e random: simplify entropy debiting
de0727c0c448 random: use computational hash for entropy extraction
e0cc561e4758 random: only call crng_finalize_init() for primary_crng
480fd91dcdc7 random: access primary_pool directly rather than through pointer
0b9e36e895bb random: continually use hwgenerator randomness
6d2d29f051be random: simplify arithmetic function flow in account()
a0653a9ec15e random: selectively clang-format where it makes sense
bccc8d92310d random: access input_pool_data directly rather than through pointer
a9db850c219f random: cleanup fractional entropy shift constants
edd294052e77 random: prepend remaining pool constants with POOL_
f87f50b843e4 random: de-duplicate INPUT_POOL constants
09ae6b851979 random: remove unused OUTPUT_POOL constants
8cc5260c19da random: rather than entropy_store abstraction, use global
5897e06ac15a random: remove unused extract_entropy() reserved argument
ae093ca1256e random: remove incomplete last_data logic
7abbc9809fa0 random: cleanup integer types
c9e108e36dc8 random: cleanup poolinfo abstraction
8a3b78f9177c random: fix typo in comments
0ad5d6384d25 random: don't reset crng_init_cnt on urandom_read()
17420c77f04c random: avoid superfluous call to RDRAND in CRNG extraction
c245231aecd3 random: early initialization of ChaCha constants
efaddd56bc54 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
644320410266 random: harmonize "crng init done" messages
ca57d51126e4 random: mix bootloader randomness into pool
542d8ebedb4d random: do not re-init if crng_reseed completes before primary init
2bfdf588a811 random: do not sign extend bytes for rotation when mixing
685200b076ff random: use BLAKE2s instead of SHA1 in extraction
33c30bfe4fb4 random: remove unused irq_flags argument from add_interrupt_randomness()
b57a88874088 random: document add_hwgenerator_randomness() with other input functions
ae33c501e059 lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
07918ddba3ab lib/crypto: sha1: re-roll loops to reduce code size
5fb6a3ba3af6 lib/crypto: blake2s: move hmac construction into wireguard
62531d446a98 lib/crypto: blake2s: include as built-in
aec0878b1d13 crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
030d3443aa61 crypto: blake2s - adjust include guard naming
fea91e907076 crypto: blake2s - add comment for blake2s_state fields
d45ae768b71b crypto: blake2s - optimize blake2s initialization
6c362b7c7764 crypto: blake2s - share the "shash" API boilerplate code
72e5b68f33a1 crypto: blake2s - move update and final logic to internal/blake2s.h
e467a55bd006 crypto: blake2s - remove unneeded includes
198a19d7ee95 crypto: x86/blake2s - define shash_alg structs using macros
89f9ee998e36 crypto: blake2s - define shash_alg structs using macros
0f8fcf5b6ed7 crypto: lib/blake2s - Move selftest prototype into header file
c3a4645d803e MAINTAINERS: add git tree for random.c
c4882c6e1ec9 MAINTAINERS: co-maintain random.c
acb198c4d11f random: remove dead code left over from blocking pool
6227458fef95 random: avoid arch_get_random_seed_long() when collecting IRQ randomness
257fbea15ab1 ACPI: sysfs: Fix BERT error region memory mapping
14fa2769ea6c ACPI: sysfs: Make sparse happy about address space in use
0debc69f003b media: vim2m: initialize the media device earlier
ed0e71cc3f1e media: vim2m: Register video device after setting up internals
a5c68f457fbf secure_seq: use the 64 bits of the siphash for port offset calculation
33f1b4a27abc tcp: change source port randomizarion at connect() time
9b4aa0d80b18 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID
74c6e5d58435 KVM: x86: Properly handle APF vs disabled LAPIC situation
c06e5f751a08 staging: rtl8723bs: prevent ->Ssid overflow in rtw_wx_set_scan()
a8f4d63142f9 lockdown: also lock down previous kgdb use
(From OE-Core rev: e03685b0263e127777baa3440c15db0de9fff523)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Poky
Poky is an integration of various components to form a pre-packaged build system and development environment which is used as a development and validation tool by the Yocto Project. It features support for building customised embedded style device images and custom containers. There are reference demo images ranging from X11/GTK+ to Weston, commandline and more. The system supports cross-architecture application development using QEMU emulation and a standalone toolchain and SDK suitable for IDE integration.
Additional information on the specifics of hardware that Poky supports is available in README.hardware. Further hardware support can easily be added in the form of BSP layers which extend the systems capabilities in a modular way. Many layers are available and can be found through the layer index.
As an integration layer Poky consists of several upstream projects such as BitBake, OpenEmbedded-Core, Yocto documentation, the 'meta-yocto' layer which has configuration and hardware support components. These components are all part of the Yocto Project and OpenEmbedded ecosystems.
The Yocto Project has extensive documentation about the system including a reference manual which can be found at https://docs.yoctoproject.org/
OpenEmbedded is the build architecture used by Poky and the Yocto project. For information about OpenEmbedded, see the OpenEmbedded website.
Contribution Guidelines
The project works using a mailing list patch submission process. Patches should be sent to the mailing list for the repository the components originate from (see below). Throughout the Yocto Project, the README files in the component in question should detail where to send patches, who the maintainers are and where bugs should be reported.
A guide to submitting patches to OpenEmbedded is available at:
https://www.openembedded.org/wiki/How_to_submit_a_patch_to_OpenEmbedded
There is good documentation on how to write/format patches at:
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Where to Send Patches
As Poky is an integration repository (built using a tool called combo-layer), patches against the various components should be sent to their respective upstreams:
OpenEmbedded-Core (files in meta/, meta-selftest/, meta-skeleton/, scripts/):
- Git repository: https://git.openembedded.org/openembedded-core/
- Mailing list: openembedded-core@lists.openembedded.org
BitBake (files in bitbake/):
- Git repository: https://git.openembedded.org/bitbake/
- Mailing list: bitbake-devel@lists.openembedded.org
Documentation (files in documentation/):
- Git repository: https://git.yoctoproject.org/cgit/cgit.cgi/yocto-docs/
- Mailing list: docs@lists.yoctoproject.org
meta-yocto (files in meta-poky/, meta-yocto-bsp/):
- Git repository: https://git.yoctoproject.org/cgit/cgit.cgi/meta-yocto
- Mailing list: poky@lists.yoctoproject.org
If in doubt, check the openembedded-core git repository for the content you intend to modify as most files are from there unless clearly one of the above categories. Before sending, be sure the patches apply cleanly to the current git repository branch in question.