cc1e127bfa95 ("random: remove ratelimiting for in-kernel unseeded randomness") 68c9c8b192c6 ("random: move initialization out of reseeding hot path") fed7ef061686 ("random: avoid initializing twice in credit race") e3d2c5e79a99 ("random: use symbolic constants for crng_init states") e85c0fc1d94c ("random: do not pretend to handle premature next security model") 5c3b747ef54f ("random: use first 128 bits of input as fast init") cbe89e5a375a ("random: do not use batches when !crng_ready()") b7b67d1391a8 ("random: mix in timestamps and reseed on system restore") 78c768e619fb ("random: vary jitter iterations based on cycle counter speed") 4b758eda851e ("random: insist on random_get_entropy() existing in order to simplify") b0c3e796f24b ("random: make random_get_entropy() return an unsigned long") 48bff1053c17 ("random: opportunistically initialize on /dev/urandom reads") 527a9867af29 ("random: do not split fast init input in add_hwgenerator_randomness()") d97c68d178fb ("random: treat bootloader trust toggle the same way as cpu trust toggle") af704c856e88 ("random: skip fast_init if hwrng provides large chunk of entropy") 0313bc278dac ("Revert "random: block in /dev/urandom"") 7a7ff644aeaf ("random: reseed more often immediately after booting") a96cfe2d4270 ("random: make consistent usage of crng_ready()") f5eab0e2db4f ("random: use SipHash as interrupt entropy accumulator") ae099e8e98fb ("random: add mechanism for VM forks to reinitialize crng")