#ifndef RND_H
#define RND_H
#define HIG_ENTROPY_SOURCE "/dev/random"
#define LOW_ENTROPY_SOURCE "/dev/urandom"
/* secrand is not really secure, but the name only suggests it's better to use
* than rand(3) when transferring bytes over the network in non-security
* critical structure members. secrand() is only used to fill up salts actually.
*/
extern int secrand(void);
extern void gen_key_bytes(unsigned char *area, size_t len);
#endif /* RND_H */
t.git' title='net-next.git Git repository'/>
The recent commit which prevents double activation of interrupts unearthed
interesting code in x86. The code (ab)uses irq_domain_activate_irq() to
reconfigure an already activated interrupt. That trips over the prevention
code now.
Fix it by deactivating the interrupt before activating the new configuration.
Fixes: 08d85f3ea99f1 "irqdomain: Avoid activating interrupts more than once"
Reported-and-tested-by: Mike Galbraith <efault@gmx.de>
Reported-and-tested-by: Borislav Petkov <bp@alien8.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Andrey Ryabinin <aryabinin@virtuozzo.com>
Cc: Marc Zyngier <marc.zyngier@arm.com>
Cc: stable@vger.kernel.org
Link: http://lkml.kernel.org/r/alpine.DEB.2.20.1701311901580.3457@nanos
Diffstat (limited to 'sound/soc/codecs/ssm2602.h')