Linux next arm BeagleBoard x15 device boot failed due to the
following commit. The x15 did not event showed any crash log
on the serial console.
Anders bisect this and found the first bad commit is
Reported-by: Linux Kernel Functional Testing <lkft(a)linaro.org>
commit 5a46079a96451cfb15e4f5f01f73f7ba24ef851a
Author: Saravana Kannan <saravanak(a)google.com>
Date: Wed Jun 1 00:06:57 2022 -0700
PM: domains: Delete usage of driver_deferred_probe_check_state()
Now that fw_devlink=on by default and fw_devlink supports
"power-domains" property, the execution will never get to the point
where driver_deferred_probe_check_state() is called before the supplier
has probed successfully or before deferred probe timeout has expired.
So, delete the call and replace it with -ENODEV.
Tested-by: Geert Uytterhoeven <geert+renesas(a)glider.be>
Reviewed-by: Ulf Hansson <ulf.hansson(a)linaro.org>
Signed-off-by: Saravana Kannan <saravanak(a)google.com>
Link: https://lore.kernel.org/r/20220601070707.3946847-2-saravanak@google.com
Signed-off-by: Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
diff --git a/drivers/base/power/domain.c b/drivers/base/power/domain.c
index 739e52cd4aba..3e86772d5fac 100644
--- a/drivers/base/power/domain.c
+++ b/drivers/base/power/domain.c
@@ -2730,7 +2730,7 @@ static int __genpd_dev_pm_attach(struct device
*dev, struct device *base_dev,
mutex_unlock(&gpd_list_lock);
dev_dbg(dev, "%s() failed to find PM domain: %ld\n",
__func__, PTR_ERR(pd));
- return driver_deferred_probe_check_state(base_dev);
+ return -ENODEV;
}
dev_dbg(dev, "adding to PM domain %s\n", pd->name);
--
Linaro LKFT
https://lkft.linaro.org
This is the start of the stable review cycle for the 4.19.251 release.
There are 33 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Thu, 07 Jul 2022 11:55:56 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.251-r…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.19.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.19.251-rc1
Daniele Palmas <dnlplm(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1070 composition
Carlo Lobrano <c.lobrano(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1060 composition
Oleksandr Tyshchenko <oleksandr_tyshchenko(a)epam.com>
xen/arm: Fix race in RB-tree based P2M accounting
Roger Pau Monne <roger.pau(a)citrix.com>
xen/blkfront: force data bouncing when backend is untrusted
Roger Pau Monne <roger.pau(a)citrix.com>
xen/netfront: force data bouncing when backend is untrusted
Roger Pau Monne <roger.pau(a)citrix.com>
xen/netfront: fix leaking data in shared pages
Roger Pau Monne <roger.pau(a)citrix.com>
xen/blkfront: fix leaking data in shared pages
katrinzhou <katrinzhou(a)tencent.com>
ipv6/sit: fix ipip6_tunnel_get_prl return value
kernel test robot <lkp(a)intel.com>
sit: use min
Doug Berger <opendmb(a)gmail.com>
net: dsa: bcm_sf2: force pause link settings
Yang Yingliang <yangyingliang(a)huawei.com>
hwmon: (ibmaem) don't call platform_device_del() if platform_device_add() fails
Demi Marie Obenour <demi(a)invisiblethingslab.com>
xen/gntdev: Avoid blocking in unmap_grant_pages()
Jakub Kicinski <kuba(a)kernel.org>
net: tun: avoid disabling NAPI twice
Michael Walle <michael(a)walle.cc>
NFC: nxp-nci: Don't issue a zero length i2c_master_read()
Krzysztof Kozlowski <krzysztof.kozlowski(a)linaro.org>
nfc: nfcmrvl: Fix irq_of_parse_and_map() return value
Yevhen Orlov <yevhen.orlov(a)plvision.eu>
net: bonding: fix use-after-free after 802.3ad slave unbind
Eric Dumazet <edumazet(a)google.com>
net: bonding: fix possible NULL deref in rlb code
Pablo Neira Ayuso <pablo(a)netfilter.org>
netfilter: nft_dynset: restore set element counter when failing to update
Jason Wang <jasowang(a)redhat.com>
caif_virtio: fix race between virtio_device_ready() and ndo_open()
YueHaibing <yuehaibing(a)huawei.com>
net: ipv6: unexport __init-annotated seg6_hmac_net_init()
Oliver Neukum <oneukum(a)suse.com>
usbnet: fix memory allocation in helpers
Kamal Heib <kamalheib1(a)gmail.com>
RDMA/qedr: Fix reporting QP timeout attribute
Jakub Kicinski <kuba(a)kernel.org>
net: tun: stop NAPI when detaching queues
Jakub Kicinski <kuba(a)kernel.org>
net: tun: unlink NAPI from device on destruction
Dimitris Michailidis <d.michailidis(a)fungible.com>
selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test
Jason Wang <jasowang(a)redhat.com>
virtio-net: fix race between ndo_open() and virtio_device_ready()
Jose Alonso <joalonsof(a)gmail.com>
net: usb: ax88179_178a: Fix packet receiving
Duoming Zhou <duoming(a)zju.edu.cn>
net: rose: fix UAF bugs caused by timer handler
Chuck Lever <chuck.lever(a)oracle.com>
SUNRPC: Fix READ_PLUS crasher
Jason A. Donenfeld <Jason(a)zx2c4.com>
s390/archrandom: simplify back to earlier design and initialize earlier
Mikulas Patocka <mpatocka(a)redhat.com>
dm raid: fix KASAN warning in raid5_add_disks
Heinz Mauelshagen <heinzm(a)redhat.com>
dm raid: fix accesses beyond end of raid member array
Chris Ye <chris.ye(a)intel.com>
nvdimm: Fix badblocks clear off-by-one error
-------------
Diffstat:
Makefile | 4 +-
arch/arm/xen/p2m.c | 6 +-
arch/s390/crypto/arch_random.c | 111 +--------------------
arch/s390/include/asm/archrandom.h | 21 ++--
arch/s390/kernel/setup.c | 5 +
drivers/block/xen-blkfront.c | 56 +++++++----
drivers/hwmon/ibmaem.c | 12 ++-
drivers/infiniband/hw/qedr/qedr.h | 1 +
drivers/infiniband/hw/qedr/verbs.c | 4 +-
drivers/md/dm-raid.c | 34 ++++---
drivers/md/raid5.c | 1 +
drivers/net/bonding/bond_3ad.c | 3 +-
drivers/net/bonding/bond_alb.c | 2 +-
drivers/net/caif/caif_virtio.c | 10 +-
drivers/net/dsa/bcm_sf2.c | 5 +
drivers/net/tun.c | 15 ++-
drivers/net/usb/ax88179_178a.c | 101 ++++++++++++++-----
drivers/net/usb/qmi_wwan.c | 2 +
drivers/net/usb/usbnet.c | 4 +-
drivers/net/virtio_net.c | 8 +-
drivers/net/xen-netfront.c | 52 +++++++++-
drivers/nfc/nfcmrvl/i2c.c | 6 +-
drivers/nfc/nfcmrvl/spi.c | 6 +-
drivers/nfc/nxp-nci/i2c.c | 3 +
drivers/nvdimm/bus.c | 4 +-
drivers/xen/gntdev-common.h | 8 ++
drivers/xen/gntdev.c | 146 +++++++++++++++++++---------
net/ipv6/seg6_hmac.c | 1 -
net/ipv6/sit.c | 10 +-
net/netfilter/nft_set_hash.c | 2 +
net/rose/rose_timer.c | 34 ++++---
net/sunrpc/xdr.c | 2 +-
tools/testing/selftests/net/udpgso_bench.sh | 2 +-
33 files changed, 406 insertions(+), 275 deletions(-)
This is the start of the stable review cycle for the 4.9.322 release.
There are 29 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Thu, 07 Jul 2022 11:55:56 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.322-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.9.322-rc1
Daniele Palmas <dnlplm(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1070 composition
Carlo Lobrano <c.lobrano(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1060 composition
Daniele Palmas <dnlplm(a)gmail.com>
net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition
Daniele Palmas <dnlplm(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions
Jörgen Storvist <jorgen.storvist(a)gmail.com>
qmi_wwan: Added support for Telit LN940 series
Oleksandr Tyshchenko <oleksandr_tyshchenko(a)epam.com>
xen/arm: Fix race in RB-tree based P2M accounting
Roger Pau Monne <roger.pau(a)citrix.com>
xen/blkfront: force data bouncing when backend is untrusted
Roger Pau Monne <roger.pau(a)citrix.com>
xen/netfront: force data bouncing when backend is untrusted
Roger Pau Monne <roger.pau(a)citrix.com>
xen/netfront: fix leaking data in shared pages
Roger Pau Monne <roger.pau(a)citrix.com>
xen/blkfront: fix leaking data in shared pages
Ilya Lesokhin <ilyal(a)mellanox.com>
net: Rename and export copy_skb_header
katrinzhou <katrinzhou(a)tencent.com>
ipv6/sit: fix ipip6_tunnel_get_prl return value
kernel test robot <lkp(a)intel.com>
sit: use min
Doug Berger <opendmb(a)gmail.com>
net: dsa: bcm_sf2: force pause link settings
Yang Yingliang <yangyingliang(a)huawei.com>
hwmon: (ibmaem) don't call platform_device_del() if platform_device_add() fails
Demi Marie Obenour <demi(a)invisiblethingslab.com>
xen/gntdev: Avoid blocking in unmap_grant_pages()
Michael Walle <michael(a)walle.cc>
NFC: nxp-nci: Don't issue a zero length i2c_master_read()
Krzysztof Kozlowski <krzysztof.kozlowski(a)linaro.org>
nfc: nfcmrvl: Fix irq_of_parse_and_map() return value
Yevhen Orlov <yevhen.orlov(a)plvision.eu>
net: bonding: fix use-after-free after 802.3ad slave unbind
Eric Dumazet <edumazet(a)google.com>
net: bonding: fix possible NULL deref in rlb code
Pablo Neira Ayuso <pablo(a)netfilter.org>
netfilter: nft_dynset: restore set element counter when failing to update
Jason Wang <jasowang(a)redhat.com>
caif_virtio: fix race between virtio_device_ready() and ndo_open()
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc/powernv: wire up rng during setup_arch
Oliver Neukum <oneukum(a)suse.com>
usbnet: fix memory allocation in helpers
Oliver Neukum <oneukum(a)suse.com>
usbnet: make sure no NULL pointer is passed through
Jose Alonso <joalonsof(a)gmail.com>
net: usb: ax88179_178a: Fix packet receiving
Duoming Zhou <duoming(a)zju.edu.cn>
net: rose: fix UAF bugs caused by timer handler
Chuck Lever <chuck.lever(a)oracle.com>
SUNRPC: Fix READ_PLUS crasher
Mikulas Patocka <mpatocka(a)redhat.com>
dm raid: fix KASAN warning in raid5_add_disks
-------------
Diffstat:
Makefile | 4 +-
arch/arm/xen/p2m.c | 6 +-
arch/powerpc/include/asm/ppc-opcode.h | 4 +
arch/powerpc/platforms/powernv/powernv.h | 2 +
arch/powerpc/platforms/powernv/rng.c | 91 ++++++++++++++++---
arch/powerpc/platforms/powernv/setup.c | 2 +
drivers/block/xen-blkfront.c | 52 +++++++----
drivers/hwmon/ibmaem.c | 12 ++-
drivers/md/raid5.c | 1 +
drivers/net/bonding/bond_3ad.c | 3 +-
drivers/net/bonding/bond_alb.c | 2 +-
drivers/net/caif/caif_virtio.c | 10 ++-
drivers/net/dsa/bcm_sf2.c | 5 ++
drivers/net/usb/ax88179_178a.c | 101 ++++++++++++++++------
drivers/net/usb/qmi_wwan.c | 6 ++
drivers/net/usb/usbnet.c | 23 +++--
drivers/net/xen-netfront.c | 55 +++++++++++-
drivers/nfc/nfcmrvl/i2c.c | 6 +-
drivers/nfc/nfcmrvl/spi.c | 6 +-
drivers/nfc/nxp-nci/i2c.c | 3 +
drivers/xen/gntdev.c | 144 ++++++++++++++++++++++---------
include/linux/skbuff.h | 1 +
net/core/skbuff.c | 9 +-
net/ipv6/sit.c | 10 +--
net/netfilter/nft_set_hash.c | 2 +
net/rose/rose_timer.c | 34 ++++----
net/sunrpc/xdr.c | 2 +-
27 files changed, 445 insertions(+), 151 deletions(-)
This is the start of the stable review cycle for the 4.14.287 release.
There are 29 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Thu, 07 Jul 2022 11:55:56 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.287-r…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.14.287-rc1
Daniele Palmas <dnlplm(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1070 composition
Carlo Lobrano <c.lobrano(a)gmail.com>
net: usb: qmi_wwan: add Telit 0x1060 composition
Oleksandr Tyshchenko <oleksandr_tyshchenko(a)epam.com>
xen/arm: Fix race in RB-tree based P2M accounting
Roger Pau Monne <roger.pau(a)citrix.com>
xen/blkfront: force data bouncing when backend is untrusted
Roger Pau Monne <roger.pau(a)citrix.com>
xen/netfront: force data bouncing when backend is untrusted
Roger Pau Monne <roger.pau(a)citrix.com>
xen/netfront: fix leaking data in shared pages
Roger Pau Monne <roger.pau(a)citrix.com>
xen/blkfront: fix leaking data in shared pages
Ilya Lesokhin <ilyal(a)mellanox.com>
net: Rename and export copy_skb_header
katrinzhou <katrinzhou(a)tencent.com>
ipv6/sit: fix ipip6_tunnel_get_prl return value
kernel test robot <lkp(a)intel.com>
sit: use min
Doug Berger <opendmb(a)gmail.com>
net: dsa: bcm_sf2: force pause link settings
Yang Yingliang <yangyingliang(a)huawei.com>
hwmon: (ibmaem) don't call platform_device_del() if platform_device_add() fails
Demi Marie Obenour <demi(a)invisiblethingslab.com>
xen/gntdev: Avoid blocking in unmap_grant_pages()
Michael Walle <michael(a)walle.cc>
NFC: nxp-nci: Don't issue a zero length i2c_master_read()
Krzysztof Kozlowski <krzysztof.kozlowski(a)linaro.org>
nfc: nfcmrvl: Fix irq_of_parse_and_map() return value
Yevhen Orlov <yevhen.orlov(a)plvision.eu>
net: bonding: fix use-after-free after 802.3ad slave unbind
Eric Dumazet <edumazet(a)google.com>
net: bonding: fix possible NULL deref in rlb code
Pablo Neira Ayuso <pablo(a)netfilter.org>
netfilter: nft_dynset: restore set element counter when failing to update
Jason Wang <jasowang(a)redhat.com>
caif_virtio: fix race between virtio_device_ready() and ndo_open()
YueHaibing <yuehaibing(a)huawei.com>
net: ipv6: unexport __init-annotated seg6_hmac_net_init()
Oliver Neukum <oneukum(a)suse.com>
usbnet: fix memory allocation in helpers
Kamal Heib <kamalheib1(a)gmail.com>
RDMA/qedr: Fix reporting QP timeout attribute
Jose Alonso <joalonsof(a)gmail.com>
net: usb: ax88179_178a: Fix packet receiving
Duoming Zhou <duoming(a)zju.edu.cn>
net: rose: fix UAF bugs caused by timer handler
Chuck Lever <chuck.lever(a)oracle.com>
SUNRPC: Fix READ_PLUS crasher
Jason A. Donenfeld <Jason(a)zx2c4.com>
s390/archrandom: simplify back to earlier design and initialize earlier
Mikulas Patocka <mpatocka(a)redhat.com>
dm raid: fix KASAN warning in raid5_add_disks
Heinz Mauelshagen <heinzm(a)redhat.com>
dm raid: fix accesses beyond end of raid member array
Chris Ye <chris.ye(a)intel.com>
nvdimm: Fix badblocks clear off-by-one error
-------------
Diffstat:
Makefile | 4 +-
arch/arm/xen/p2m.c | 6 +-
arch/s390/crypto/arch_random.c | 20 +----
arch/s390/include/asm/archrandom.h | 32 ++++----
arch/s390/kernel/setup.c | 5 ++
drivers/block/xen-blkfront.c | 49 ++++++++-----
drivers/hwmon/ibmaem.c | 12 ++-
drivers/infiniband/hw/qedr/qedr.h | 1 +
drivers/infiniband/hw/qedr/verbs.c | 4 +-
drivers/md/dm-raid.c | 34 +++++----
drivers/md/raid5.c | 1 +
drivers/net/bonding/bond_3ad.c | 3 +-
drivers/net/bonding/bond_alb.c | 2 +-
drivers/net/caif/caif_virtio.c | 10 ++-
drivers/net/dsa/bcm_sf2.c | 5 ++
drivers/net/usb/ax88179_178a.c | 101 +++++++++++++++++++-------
drivers/net/usb/qmi_wwan.c | 2 +
drivers/net/usb/usbnet.c | 4 +-
drivers/net/xen-netfront.c | 52 ++++++++++++-
drivers/nfc/nfcmrvl/i2c.c | 6 +-
drivers/nfc/nfcmrvl/spi.c | 6 +-
drivers/nfc/nxp-nci/i2c.c | 3 +
drivers/nvdimm/bus.c | 4 +-
drivers/xen/gntdev.c | 145 ++++++++++++++++++++++++++-----------
include/linux/skbuff.h | 1 +
net/core/skbuff.c | 9 ++-
net/ipv6/seg6_hmac.c | 1 -
net/ipv6/sit.c | 10 +--
net/netfilter/nft_set_hash.c | 2 +
net/rose/rose_timer.c | 34 +++++----
net/sunrpc/xdr.c | 2 +-
31 files changed, 382 insertions(+), 188 deletions(-)
This is the start of the stable review cycle for the 5.18.9 release.
There are 6 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 02 Jul 2022 13:32:22 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.18.9-rc1…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.18.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 5.18.9-rc1
Pavel Begunkov <asml.silence(a)gmail.com>
io_uring: fix not locked access to fixed buf table
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
Kees Cook <keescook(a)chromium.org>
hinic: Replace memcpy() with direct assignment
Coly Li <colyli(a)suse.de>
bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init()
Linus Walleij <linus.walleij(a)linaro.org>
clocksource/drivers/ixp4xx: Drop boardfile probe path
Masahiro Yamada <masahiroy(a)kernel.org>
tick/nohz: unexport __init-annotated tick_nohz_full_setup()
-------------
Diffstat:
Makefile | 4 +--
arch/powerpc/include/asm/ftrace.h | 4 ++-
arch/powerpc/kernel/trace/ftrace.c | 15 ++++++++--
arch/powerpc/mm/mem.c | 2 ++
drivers/clocksource/Kconfig | 2 +-
drivers/clocksource/timer-ixp4xx.c | 25 -----------------
drivers/md/bcache/btree.c | 1 +
drivers/md/bcache/writeback.c | 1 +
drivers/net/ethernet/huawei/hinic/hinic_devlink.c | 4 +--
fs/io_uring.c | 34 ++++++++++++-----------
include/linux/platform_data/timer-ixp4xx.h | 11 --------
kernel/time/tick-sched.c | 1 -
12 files changed, 41 insertions(+), 63 deletions(-)
This is the start of the stable review cycle for the 5.10.128 release.
There are 12 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 02 Jul 2022 13:32:22 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.128-r…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 5.10.128-rc1
Vladimir Oltean <vladimir.oltean(a)nxp.com>
net: mscc: ocelot: allow unregistered IP multicast flooding
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
Dave Chinner <dchinner(a)redhat.com>
xfs: check sb_meta_uuid for dabuf buffer recovery
Darrick J. Wong <djwong(a)kernel.org>
xfs: remove all COW fork extents when remounting readonly
Yang Xu <xuyang2018.jy(a)fujitsu.com>
xfs: Fix the free logic of state in xfs_attr_node_hasname
Brian Foster <bfoster(a)redhat.com>
xfs: punch out data fork delalloc blocks on COW writeback failure
Rustam Kovhaev <rkovhaev(a)gmail.com>
xfs: use kmem_cache_free() for kmem_cache objects
Coly Li <colyli(a)suse.de>
bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init()
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
clocksource/drivers/ixp4xx: remove __init from ixp4xx_timer_setup()
Masahiro Yamada <masahiroy(a)kernel.org>
tick/nohz: unexport __init-annotated tick_nohz_full_setup()
Christoph Hellwig <hch(a)lst.de>
drm: remove drm_fb_helper_modinit
Amir Goldstein <amir73il(a)gmail.com>
MAINTAINERS: add Amir as xfs maintainer for 5.10.y
-------------
Diffstat:
MAINTAINERS | 3 ++-
Makefile | 4 ++--
arch/powerpc/include/asm/ftrace.h | 4 +++-
arch/powerpc/kernel/trace/ftrace.c | 15 ++++++++++++---
arch/powerpc/mm/mem.c | 2 ++
drivers/clocksource/mmio.c | 2 +-
drivers/clocksource/timer-ixp4xx.c | 10 ++++------
drivers/gpu/drm/drm_crtc_helper_internal.h | 10 ----------
drivers/gpu/drm/drm_fb_helper.c | 21 ---------------------
drivers/gpu/drm/drm_kms_helper_common.c | 25 ++++++++++++-------------
drivers/md/bcache/btree.c | 1 +
drivers/md/bcache/writeback.c | 1 +
drivers/net/ethernet/mscc/ocelot.c | 8 ++++++--
fs/xfs/libxfs/xfs_attr.c | 13 +++++--------
fs/xfs/xfs_aops.c | 15 ++++++++++++---
fs/xfs/xfs_buf_item_recover.c | 2 +-
fs/xfs/xfs_extfree_item.c | 6 +++---
fs/xfs/xfs_super.c | 14 +++++++++++---
include/linux/platform_data/timer-ixp4xx.h | 5 ++---
kernel/time/tick-sched.c | 1 -
20 files changed, 80 insertions(+), 82 deletions(-)
This is the start of the stable review cycle for the 4.9.321 release.
There are 29 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 02 Jul 2022 13:32:22 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.321-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.9.321-rc1
Liu Shixin <liushixin2(a)huawei.com>
swiotlb: skip swiotlb_bounce when orig_addr is zero
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
Hsin-Yi Wang <hsinyi(a)chromium.org>
fdt: Update CRC check for rng-seed
Masahiro Yamada <masahiroy(a)kernel.org>
xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
Christoph Hellwig <hch(a)lst.de>
drm: remove drm_fb_helper_modinit
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc/pseries: wire up rng during setup_arch()
Masahiro Yamada <masahiroy(a)kernel.org>
modpost: fix section mismatch check for exported init/exit sections
Miaoqian Lin <linmq006(a)gmail.com>
ARM: cns3xxx: Fix refcount leak in cns3xxx_init
Miaoqian Lin <linmq006(a)gmail.com>
ARM: Fix refcount leak in axxia_boot_secondary
Miaoqian Lin <linmq006(a)gmail.com>
ARM: exynos: Fix refcount leak in exynos_map_pmu
Lucas Stach <l.stach(a)pengutronix.de>
ARM: dts: imx6qdl: correct PU regulator ramp delay
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
powerpc: Enable execve syscall exit tracepoint
Liang He <windhl(a)126.com>
xtensa: Fix refcount leak bug in time.c
Liang He <windhl(a)126.com>
xtensa: xtfpga: Fix refcount leak bug in setup
Vincent Whitchurch <vincent.whitchurch(a)axis.com>
iio: trigger: sysfs: fix use-after-free on remove
Haibo Chen <haibo.chen(a)nxp.com>
iio: accel: mma8452: ignore the return value of reset operation
Dmitry Rokosov <DDRokosov(a)sberdevices.ru>
iio:accel:bma180: rearrange iio trigger get and register
Xu Yang <xu.yang_2(a)nxp.com>
usb: chipidea: udc: check request status before setting device address
Baruch Siach <baruch(a)tkos.co.il>
iio: adc: vf610: fix conversion mode sysfs node name
Kai-Heng Feng <kai.heng.feng(a)canonical.com>
igb: Make DMA faster when CPU is active on the PCIe link
huhai <huhai(a)kylinos.cn>
MIPS: Remove repetitive increase irq_err_count
Julien Grall <jgrall(a)amazon.com>
x86/xen: Remove undefined behavior in setup_features()
Jay Vosburgh <jay.vosburgh(a)canonical.com>
bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
Carlo Lobrano <c.lobrano(a)gmail.com>
USB: serial: option: add Telit LE910Cx 0x1250 composition
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: quiet urandom warning ratelimit suppression message
Nikos Tsironis <ntsironis(a)arrikto.com>
dm era: commit metadata in postsuspend after worker stops
Edward Wu <edwardwu(a)realtek.com>
ata: libata: add qc->flags in ata_qc_complete_template tracepoint
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: schedule mix_interrupt_randomness() less often
Jiri Slaby <jslaby(a)suse.cz>
vt: drop old FONT ioctls
-------------
Diffstat:
Documentation/ABI/testing/sysfs-bus-iio-vf610 | 2 +-
Makefile | 4 +-
arch/arm/boot/dts/imx6qdl.dtsi | 2 +-
arch/arm/mach-axxia/platsmp.c | 1 +
arch/arm/mach-cns3xxx/core.c | 2 +
arch/arm/mach-exynos/exynos.c | 1 +
arch/mips/vr41xx/common/icu.c | 2 -
arch/powerpc/kernel/process.c | 2 +-
arch/powerpc/platforms/pseries/pseries.h | 2 +
arch/powerpc/platforms/pseries/rng.c | 11 +-
arch/powerpc/platforms/pseries/setup.c | 1 +
arch/x86/include/asm/kexec.h | 7 ++
arch/xtensa/kernel/time.c | 1 +
arch/xtensa/platforms/xtfpga/setup.c | 1 +
drivers/char/random.c | 4 +-
drivers/gpio/gpio-vr41xx.c | 2 -
drivers/gpu/drm/drm_crtc_helper_internal.h | 10 --
drivers/gpu/drm/drm_fb_helper.c | 21 ----
drivers/gpu/drm/drm_kms_helper_common.c | 25 +++--
drivers/iio/accel/bma180.c | 3 +-
drivers/iio/accel/mma8452.c | 10 +-
drivers/iio/trigger/iio-trig-sysfs.c | 1 +
drivers/md/dm-era-target.c | 8 +-
drivers/net/bonding/bond_main.c | 4 +-
drivers/net/ethernet/intel/igb/igb_main.c | 12 +--
drivers/of/fdt.c | 8 +-
drivers/tty/vt/vt.c | 34 +-----
drivers/tty/vt/vt_ioctl.c | 149 --------------------------
drivers/usb/chipidea/udc.c | 3 +
drivers/usb/serial/option.c | 1 +
drivers/xen/features.c | 2 +-
drivers/xen/xlate_mmu.c | 1 -
include/linux/kd.h | 7 --
include/linux/kexec.h | 26 ++++-
include/linux/ratelimit.h | 12 ++-
include/trace/events/libata.h | 1 +
kernel/kexec_file.c | 18 ----
lib/swiotlb.c | 3 +-
scripts/mod/modpost.c | 2 +-
39 files changed, 111 insertions(+), 295 deletions(-)
This is the start of the stable review cycle for the 5.15.52 release.
There are 28 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 02 Jul 2022 13:32:22 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.15.52-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.15.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 5.15.52-rc1
Pavel Begunkov <asml.silence(a)gmail.com>
io_uring: fix not locked access to fixed buf table
Vladimir Oltean <vladimir.oltean(a)nxp.com>
net: mscc: ocelot: allow unregistered IP multicast flooding to CPU
Ping-Ke Shih <pkshih(a)realtek.com>
rtw88: rtw8821c: enable rfe 6 devices
Guo-Feng Fan <vincent_fann(a)realtek.com>
rtw88: 8821c: support RFE type4 wifi NIC
Christian Brauner <brauner(a)kernel.org>
fs: account for group membership
Christian Brauner <brauner(a)kernel.org>
fs: fix acl translation
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: support mapped mounts of mapped filesystems
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: add i_user_ns() helper
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: port higher-level mapping helpers
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: remove unused low-level mapping helpers
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: use low-level mapping helpers
Christian Brauner <christian.brauner(a)ubuntu.com>
docs: update mapping documentation
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: account for filesystem mappings
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: tweak fsuidgid_has_mapping()
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: move mapping helpers
Christian Brauner <christian.brauner(a)ubuntu.com>
fs: add is_idmapped_mnt() helper
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
Darrick J. Wong <djwong(a)kernel.org>
xfs: only bother with sync_filesystem during readonly remount
Darrick J. Wong <djwong(a)kernel.org>
xfs: prevent UAF in xfs_log_item_in_current_chkpt
Dave Chinner <dchinner(a)redhat.com>
xfs: check sb_meta_uuid for dabuf buffer recovery
Darrick J. Wong <djwong(a)kernel.org>
xfs: remove all COW fork extents when remounting readonly
Yang Xu <xuyang2018.jy(a)fujitsu.com>
xfs: Fix the free logic of state in xfs_attr_node_hasname
Brian Foster <bfoster(a)redhat.com>
xfs: punch out data fork delalloc blocks on COW writeback failure
Rustam Kovhaev <rkovhaev(a)gmail.com>
xfs: use kmem_cache_free() for kmem_cache objects
Coly Li <colyli(a)suse.de>
bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init()
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
x86, kvm: use proper ASM macros for kvm_vcpu_is_preempted
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
clocksource/drivers/ixp4xx: remove __init from ixp4xx_timer_setup()
Masahiro Yamada <masahiroy(a)kernel.org>
tick/nohz: unexport __init-annotated tick_nohz_full_setup()
-------------
Diffstat:
Documentation/filesystems/idmappings.rst | 72 --------
Makefile | 4 +-
arch/powerpc/include/asm/ftrace.h | 4 +-
arch/powerpc/kernel/trace/ftrace.c | 15 +-
arch/powerpc/mm/mem.c | 2 +
arch/x86/kernel/kvm.c | 2 +-
drivers/clocksource/mmio.c | 2 +-
drivers/clocksource/timer-ixp4xx.c | 10 +-
drivers/md/bcache/btree.c | 1 +
drivers/md/bcache/writeback.c | 1 +
drivers/net/ethernet/mscc/ocelot.c | 8 +-
drivers/net/wireless/realtek/rtw88/rtw8821c.c | 14 +-
fs/attr.c | 26 ++-
fs/cachefiles/bind.c | 2 +-
fs/ecryptfs/main.c | 2 +-
fs/io_uring.c | 28 +--
fs/ksmbd/smbacl.c | 19 +--
fs/ksmbd/smbacl.h | 5 +-
fs/namespace.c | 53 ++++--
fs/nfsd/export.c | 2 +-
fs/open.c | 8 +-
fs/overlayfs/super.c | 2 +-
fs/posix_acl.c | 27 ++-
fs/proc_namespace.c | 2 +-
fs/xattr.c | 6 +-
fs/xfs/libxfs/xfs_attr.c | 17 +-
fs/xfs/xfs_aops.c | 15 +-
fs/xfs/xfs_buf_item_recover.c | 2 +-
fs/xfs/xfs_extfree_item.c | 6 +-
fs/xfs/xfs_inode.c | 8 +-
fs/xfs/xfs_linux.h | 1 +
fs/xfs/xfs_log_cil.c | 6 +-
fs/xfs/xfs_super.c | 21 ++-
fs/xfs/xfs_symlink.c | 4 +-
include/linux/fs.h | 141 +++++-----------
include/linux/mnt_idmapping.h | 234 ++++++++++++++++++++++++++
include/linux/platform_data/timer-ixp4xx.h | 5 +-
include/linux/posix_acl_xattr.h | 4 +
kernel/time/tick-sched.c | 1 -
security/commoncap.c | 15 +-
40 files changed, 498 insertions(+), 299 deletions(-)
This is the start of the stable review cycle for the 4.14.286 release.
There are 35 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 02 Jul 2022 13:32:22 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.286-r…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.14.286-rc1
Liu Shixin <liushixin2(a)huawei.com>
swiotlb: skip swiotlb_bounce when orig_addr is zero
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
Hsin-Yi Wang <hsinyi(a)chromium.org>
fdt: Update CRC check for rng-seed
Masahiro Yamada <masahiroy(a)kernel.org>
xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
Christoph Hellwig <hch(a)lst.de>
drm: remove drm_fb_helper_modinit
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc/pseries: wire up rng during setup_arch()
Masahiro Yamada <masahiroy(a)kernel.org>
modpost: fix section mismatch check for exported init/exit sections
Miaoqian Lin <linmq006(a)gmail.com>
ARM: cns3xxx: Fix refcount leak in cns3xxx_init
Miaoqian Lin <linmq006(a)gmail.com>
ARM: Fix refcount leak in axxia_boot_secondary
Miaoqian Lin <linmq006(a)gmail.com>
ARM: exynos: Fix refcount leak in exynos_map_pmu
Lucas Stach <l.stach(a)pengutronix.de>
ARM: dts: imx6qdl: correct PU regulator ramp delay
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc/powernv: wire up rng during setup_arch
Andrew Donnellan <ajd(a)linux.ibm.com>
powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
Naveen N. Rao <naveen.n.rao(a)linux.vnet.ibm.com>
powerpc: Enable execve syscall exit tracepoint
Liang He <windhl(a)126.com>
xtensa: Fix refcount leak bug in time.c
Liang He <windhl(a)126.com>
xtensa: xtfpga: Fix refcount leak bug in setup
Hans de Goede <hdegoede(a)redhat.com>
iio: adc: axp288: Override TS pin bias current for some models
Vincent Whitchurch <vincent.whitchurch(a)axis.com>
iio: trigger: sysfs: fix use-after-free on remove
Zheyu Ma <zheyuma97(a)gmail.com>
iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
Haibo Chen <haibo.chen(a)nxp.com>
iio: accel: mma8452: ignore the return value of reset operation
Dmitry Rokosov <DDRokosov(a)sberdevices.ru>
iio:accel:bma180: rearrange iio trigger get and register
Xu Yang <xu.yang_2(a)nxp.com>
usb: chipidea: udc: check request status before setting device address
Baruch Siach <baruch(a)tkos.co.il>
iio: adc: vf610: fix conversion mode sysfs node name
Kai-Heng Feng <kai.heng.feng(a)canonical.com>
igb: Make DMA faster when CPU is active on the PCIe link
huhai <huhai(a)kylinos.cn>
MIPS: Remove repetitive increase irq_err_count
Julien Grall <jgrall(a)amazon.com>
x86/xen: Remove undefined behavior in setup_features()
Jay Vosburgh <jay.vosburgh(a)canonical.com>
bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
Macpaul Lin <macpaul.lin(a)mediatek.com>
USB: serial: option: add Quectel RM500K module support
Yonglin Tan <yonglin.tan(a)outlook.com>
USB: serial: option: add Quectel EM05-G modem
Carlo Lobrano <c.lobrano(a)gmail.com>
USB: serial: option: add Telit LE910Cx 0x1250 composition
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: quiet urandom warning ratelimit suppression message
Nikos Tsironis <ntsironis(a)arrikto.com>
dm era: commit metadata in postsuspend after worker stops
Edward Wu <edwardwu(a)realtek.com>
ata: libata: add qc->flags in ata_qc_complete_template tracepoint
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: schedule mix_interrupt_randomness() less often
Jiri Slaby <jslaby(a)suse.cz>
vt: drop old FONT ioctls
-------------
Diffstat:
Documentation/ABI/testing/sysfs-bus-iio-vf610 | 2 +-
Makefile | 4 +-
arch/arm/boot/dts/imx6qdl.dtsi | 2 +-
arch/arm/mach-axxia/platsmp.c | 1 +
arch/arm/mach-cns3xxx/core.c | 2 +
arch/arm/mach-exynos/exynos.c | 1 +
arch/mips/vr41xx/common/icu.c | 2 -
arch/powerpc/kernel/process.c | 2 +-
arch/powerpc/kernel/rtas.c | 11 +-
arch/powerpc/platforms/powernv/powernv.h | 2 +
arch/powerpc/platforms/powernv/rng.c | 52 ++++++---
arch/powerpc/platforms/powernv/setup.c | 2 +
arch/powerpc/platforms/pseries/pseries.h | 2 +
arch/powerpc/platforms/pseries/rng.c | 11 +-
arch/powerpc/platforms/pseries/setup.c | 1 +
arch/x86/include/asm/kexec.h | 6 ++
arch/xtensa/kernel/time.c | 1 +
arch/xtensa/platforms/xtfpga/setup.c | 1 +
drivers/char/random.c | 4 +-
drivers/gpio/gpio-vr41xx.c | 2 -
drivers/gpu/drm/drm_crtc_helper_internal.h | 10 --
drivers/gpu/drm/drm_fb_helper.c | 21 ----
drivers/gpu/drm/drm_kms_helper_common.c | 25 +++--
drivers/iio/accel/bma180.c | 3 +-
drivers/iio/accel/mma8452.c | 10 +-
drivers/iio/adc/axp288_adc.c | 8 ++
drivers/iio/gyro/mpu3050-core.c | 1 +
drivers/iio/trigger/iio-trig-sysfs.c | 1 +
drivers/md/dm-era-target.c | 8 +-
drivers/net/bonding/bond_main.c | 4 +-
drivers/net/ethernet/intel/igb/igb_main.c | 12 +--
drivers/of/fdt.c | 8 +-
drivers/tty/vt/vt.c | 34 +-----
drivers/tty/vt/vt_ioctl.c | 149 --------------------------
drivers/usb/chipidea/udc.c | 3 +
drivers/usb/serial/option.c | 6 ++
drivers/xen/features.c | 2 +-
drivers/xen/xlate_mmu.c | 1 -
include/linux/kd.h | 8 --
include/linux/kexec.h | 26 ++++-
include/linux/ratelimit.h | 12 ++-
include/trace/events/libata.h | 1 +
kernel/kexec_file.c | 18 ----
lib/swiotlb.c | 3 +-
scripts/mod/modpost.c | 2 +-
45 files changed, 174 insertions(+), 313 deletions(-)
How is everything going with you?
This type of projector is
currently available in our warehouse.
I'll send you an email with a
more full introduction to the product.
Highlights: 8500 Lumens
HD Video Projector: The projector's brightness is two to three times that
of comparable small projectors.
You may spend quality time with your
family or friends at home or outside thanks to the highly vivid image it
provides for films and movies, which supports resolutions up to 1080P.
The viewing size of the projector may be adjusted from 40 to 200
inches, and the projection distance can be varied from 1.2 to 6.5 meters.
Despite its impressive projection effect, the design is remains
portable, with a body size similar to that of a journal.
Wifi
2.4G and Bluetooth 5.0 connectivity You can wirelessly attach your favorite
bluetooth speaker to the projector at any time because it features a
bluetooth function.
In addition, the projector has a 2.4G internet
connection. An ultra-fast 2.4G WiFi connection enables online gaming as
well as continuous movie viewing. Wireless screen sharing enables you to
stream your favorite content from your iOS or Android smartphone to another
screen.
"Multimedia Connection Support" refers to the
projector's ability to connect to a number of devices such as USB, HDMI,
AV, SD, and audio.
It is simple to connect it to your smartphone, TV
Stick or Box, video game console, personal computer, tablet, laptop, DVD
player, TF card, or USB Sticks.
Our projectors are priced as
follows:
A single projector 259.90.
Each of the two projectors:
239.90
Do you like to take one or two projectors today?
Just provide us the place details where we should ship to, and we will
arrange shipment for you.
[1_25_1.jpg] [2_22_1.jpg]
Specifications:
LCD screen size: 3.77
inches TFT LCD display technology
8500 LM is the brightness of the
light source.
100 Lumens of ANSI-certified brightness
The default
resolution in 720P is 1024 x 720 pixels.
The resolution that is
supported is 1080P.
Up to 30,000 hours of light source life
expectancy
The projection to actual ratio is 1.4:1.
Front and
back projection are the projection methods.
The electrical projection
size range for Keystone is 40'-200'.
The distance between you and the
screen is between 3.9 and 21.3 feet (Best Distance 8.2ft)
Integrated
circuit STM53MK
RAM (memory): 64 MB; ROM (read-only memory): 4 MB
USB 2.0 x 1 port, HDMI, TFT, AV, and VGA interfaces, and 3.5mm earphone
output are all included.
WiFi: Support for 2.4G WiFi
Bluetooth
5.0 is the latest version (BT5.0),
Maintain your receiving and sending
capabilities.
Infrared Remote Control Transmission
Dimensions of
the product: 214 * 160 * 81.7 mm Product Dimensions: 214 * 160 * 81.7 mm
Product Weight: 1.1 KG
Weight: 1.6KG Dimensions: 330*115*215mm
Thanks,
Jerry Dyson
Dear Sir or Madam,
We are a sanitary ware supplier from China and vanity sinks
and vessel sinks are the major models we are offering now.With
experience of more than 15 years and with our efforts on quality
control,we provide high quality pcs with affordable price.
If you are instereted,please feel free to let us know so
that we can send you our catalogue for your reference.
Look forward to hearing from you soon,thank you!
Best regards
Ivan
Chaozhou FTD Ceramic Cooperation Limited
Liya Indu.Zone,Guxiang,Chaozhou,Guangdong,China
Tel: 0086-768-2338905
Fax: 0086-768-2338905
Cell: 0086-186 8805 0197
E-mail: [1]ivan(a)ftdceramic.net
Website: [2]www.ftdceramic.com
References
1. mailto:ivan@ftdceramic.net
2. file:///C:/Users/Administrator/AppData/Roaming/Foxmail7/Temp-4296-202004031…
Hi,
Good day!
This is Hazel from FOSHAN ISUN DECORATION MATERIAL CO., LTD. We have 16
years experience in aluminum industry and we are one of the biggest
factory in FOSHAN.
Our new product of prefab house's main structure is steel and exterior
walls are aluminum. There are 2 models, how about I send the catalog to
to you to check which one you would prefer?
If you have any needs please feel free to contact me.
Best regards,
Hazel
Email: [1]Hazel(a)isunalu.com
References
1. mailto:Hazel@isunalu.com
Hello,
How are things going for you?
Have you gotten
the introduction to the little quadcopter that we sent you last week?
The quadcopter can fly continuously for 30 minutes while recording
video at a frame rate of 25 frames per second.
45x40x12cm product
dimensions (before folding) 21x11x9cm (after folding)
Dual-mode GPS
positioning is provided by the positioning system. Model number for a
brushless motor is 1806.
Remote control range: around 3000m
The
height of the remote control is approximately 120 meters.
1-3 meters
for shooting gesture recognition Aerial image resolution: 4096 x 3072
(APP)
Video resolution: 2048 x 1080 (APP)
Transmission frame
rate: 25 frames per second
With the click of a button, you may command
the aircraft to take off, land, and even return to its original
location.
When summoned, the quadcopter will return to its original
spot.
Fixed-point surround: With this professional quadcopter, you can
now create breathtaking films without doing any extra work.
The
following are the prices for various quantities:
1 unit: 235.90
2-10 units 225.90 each
11-20 units: 215.90 each
Would you
like to purchase one or two of these?
Please let us know your address,
and we will contact the logistics department on your behalf to make the
necessary arrangements.
[2021-01-24-19_13_44-Window.png]
When you walk through your front door, the electricity is
either completely switched off or you receive a notification that it has
been turned off.
This camera also includes a virtual reality mode, the
ability to swap between lenses, a video/picture panorama, and a
video/picture panorama.
There are also MV (return to home screen with
a single button), headless, photo/video gestures, and front lens adjustment
modes. Each of these modes has unique capabilities.
The GPS and air
pressure combination used in the fixed-altitude flight system is
effectively a mixture of the two technologies.
Wind resistance is
rated 8 and measured in meters per second.
Thanks,
Jason Spike
======
Is printing this email
necessary? If you care about the environment as much as we do, please avoid
printing emails. It contributes to the preservation of the environment's
forest.
Please keep the environment in mind before printing this
email. Please only print this email if absolutely required. Every email
that is not printed helps the environment.
If you received this mail
by accident, please respond to it and delete it so that such an error does
not occur again in the future.
Is it really necessary to
print this email? If you care about the environment as much as we do, we
ask that you refrain from printing any emails. It contributes to the
preservation of a forested environment.
Before printing this email,
please consider its environmental impact. Please do not print it if it is
not absolutely necessary. Every email that is not printed is good for the
environment.
If you believe you received this mail in error, please
respond to it and then delete it so that we do not repeat the same error in
the future. Thank you very much.
Hi, Sir/Madam,
Good morning!
Glad to hear that you're on the market for aluminium extrusion, we
specialize in this field for 20 years, with the strength of all over
the world extrusion profile with good quality and pretty competitive
price. Also we have our own professional designers to meet any of your
requirements. Should you have any questions, call me, let's talk
details. Enclose this photos of our products.
JiangYin East-China Aluminium Technology Co.,Ltd is a specialized
large-sized enterprise integrating research, design, production and
sales of aluminum alloy profiles for building ,industrial applications
and photovoltaic modules as well as windows, doors, curtain walls and
aluminium solar frame, owning solid comprehensive technology strength,
strong research and innovation capacity as well as high quality
products and fine service.
We have plants of melting and casting, extrusion, anodizing and
electrophoresis, powder coating, PVDF painting, thermal break profile,
metal die casting and aluminum profile fabrication. All these machines
are the production basis of us.
Sincerely wish to build up a long term business friendly business
relationship with you!
Best regards!
Billy Hu
General Manager
JiangSu HaiDa Technology Group Co.,LTD
ShangHai KangWen Import and Export trading Co., Ltd
JiangYin East-China Aluminuim Technology Co., Ltd.
JiangYin Comat Metal Products Co., Ltd
JiangYin LiTail Ornamental material Co., Ltd
No 8 Huannan Road, HuaShi Town, JiangYin
City, JiangSu Province, China 214421
Tel: 0086-510-86213931 Fax: 0086-510-86206731 Mobile:
0086-13812110419
Email address: ceo(a)cntrade.com.cn
website: http://www.jshaida.com
Important Notice:
DO NOT trust any “ bank account change information sent by e-mail”,
unless you check with the real beneficiary first by office telephone an
d fax. E-Mails might be intercepted by hackers, if you send any
payment to hacker's account without checking through the phone or fax w
ith us, we will NOT take any responsibility .
Hello there
We are a leading SEO company that is offering the best (on page & off
page), and PPC campaign management service at a
massive discount.
Hurry up taking our service for gets more ROI.
This offer is for a limited time...
Regards,
Chotu Roy
[image: beacon]
This is the start of the stable review cycle for the 4.9.320 release.
There are 264 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 25 Jun 2022 16:43:11 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.320-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.9.320-rc1
Willy Tarreau <w(a)1wt.eu>
tcp: drop the hash_32() part from the index calculation
Willy Tarreau <w(a)1wt.eu>
tcp: increase source port perturb table to 2^16
Willy Tarreau <w(a)1wt.eu>
tcp: dynamically allocate the perturb table used by source ports
Willy Tarreau <w(a)1wt.eu>
tcp: add small random increments to the source port
Willy Tarreau <w(a)1wt.eu>
tcp: use different parts of the port_offset for index and offset
Willy Tarreau <w(a)1wt.eu>
secure_seq: use the 64 bits of the siphash for port offset calculation
Eric Dumazet <edumazet(a)google.com>
tcp: add some entropy in __inet_hash_connect()
Eric Dumazet <edumazet(a)google.com>
tcp: change source port randomizarion at connect() time
Miklos Szeredi <mszeredi(a)redhat.com>
fuse: fix pipe buffer lifetime for direct_io
Linus Torvalds <torvalds(a)linux-foundation.org>
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
Halil Pasic <pasic(a)linux.ibm.com>
swiotlb: fix info leak with DMA_FROM_DEVICE
Colin Ian King <colin.king(a)canonical.com>
xprtrdma: fix incorrect header size calculations
Christian Borntraeger <borntraeger(a)linux.ibm.com>
s390/mm: use non-quiescing sske for KVM switch to keyed guest
James Chapman <jchapman(a)katalix.com>
l2tp: fix race in pppol2tp_release with session object destroy
James Chapman <jchapman(a)katalix.com>
l2tp: don't use inet_shutdown on ppp session destroy
Zhang Yi <yi.zhang(a)huawei.com>
ext4: add reserved GDT blocks check
Ding Xiang <dingxiang(a)cmss.chinamobile.com>
ext4: make variable "count" signed
Baokun Li <libaokun1(a)huawei.com>
ext4: fix bug_on ext4_mb_use_inode_pa
Ilpo Järvinen <ilpo.jarvinen(a)linux.intel.com>
serial: 8250: Store to lsr_save_flags after lsr read
Miaoqian Lin <linmq006(a)gmail.com>
usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
Robert Eckelmann <longnoserob(a)gmail.com>
USB: serial: io_ti: add Agilent E5805A support
Slark Xiao <slark_xiao(a)163.com>
USB: serial: option: add support for Cinterion MV31 with new baseline
Ian Abbott <abbotti(a)mev.co.uk>
comedi: vmk80xx: fix expression for tx buffer size
zijun_hu <zijun_hu(a)htc.com>
irqchip/gic-v3: Iterate over possible CPUs by for_each_possible_cpu()
Miaoqian Lin <linmq006(a)gmail.com>
irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
Miaoqian Lin <linmq006(a)gmail.com>
misc: atmel-ssc: Fix IRQ check in ssc_probe
Trond Myklebust <trond.myklebust(a)hammerspace.com>
pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: credit cpu and bootloader seeds by default
Chen Lin <chen45464546(a)163.com>
net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
Wang Yufen <wangyufen(a)huawei.com>
ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
Xiaohui Zhang <xiaohuizhang(a)ruc.edu.cn>
nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
chengkaitao <pilgrimtao(a)gmail.com>
virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
James Smart <jsmart2021(a)gmail.com>
scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
Wentao Wang <wwentao(a)vmware.com>
scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
Adam Ford <aford173(a)gmail.com>
ASoC: wm8962: Fix suspend while playing music
Sergey Shtylyov <s.shtylyov(a)omp.ru>
ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l56: Correct typo in minimum level for SX volume controls
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l52: Correct TLV for Bypass Volume
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs53l30: Correct number of volume levels on SX controls
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l52: Fix TLV scales for mixer controls
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: account for arch randomness in bits
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mark bootloader randomness code as __init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid checking crng_ready() twice in random_init()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - make reseeding from get_random_bytes() synchronous
Stephan Müller <smueller(a)chronox.de>
crypto: drbg - always try to free Jitter RNG instance
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - prepare for more fine-grained tracking of seeding state
Stephan Müller <smueller(a)chronox.de>
crypto: drbg - always seeded with SP800-90B compliant noise source
Stephan Mueller <smueller(a)chronox.de>
crypto: drbg - add FIPS 140-2 CTRNG for noise source
Jason A. Donenfeld <Jason(a)zx2c4.com>
Revert "random: use static branch for crng_ready()"
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signals after page of pool writes
Jens Axboe <axboe(a)kernel.dk>
random: wire up fops->splice_{read,write}_iter()
Jens Axboe <axboe(a)kernel.dk>
random: convert to using fops->write_iter()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: move randomize_page() into mm where it belongs
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: move initialization functions out of hot pages
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use proper return types on get_random_{int,long}_wait()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove extern from functions in header
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use static branch for crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: credit architectural init the exact amount
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: handle latent entropy and command line from random_init()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use proper jiffies comparison macro
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove ratelimiting for in-kernel unseeded randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid initializing twice in credit race
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use symbolic constants for crng_init states
Jason A. Donenfeld <Jason(a)zx2c4.com>
siphash: use one source of truth for siphash permutations
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: help compiler out with fast_mix() by using simpler arguments
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not use input pool from hard IRQs
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: order timer entropy functions below interrupt functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not pretend to handle premature next security model
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not use batches when !crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: insist on random_get_entropy() existing in order to simplify
Yury Norov <yury.norov(a)gmail.com>
uapi: rename ext2_swab() to swab() and share globally in swab.h
Jason A. Donenfeld <Jason(a)zx2c4.com>
xtensa: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
sparc: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
um: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
x86/tsc: Use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
nios2: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
arm: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
mips: use fallback for random_get_entropy() instead of just c0 random
Jason A. Donenfeld <Jason(a)zx2c4.com>
m68k: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
timekeeping: Add raw clock fallback for random_get_entropy()
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
alpha: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
parisc: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
s390: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
ia64: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
init: call time_init() before rand_initialize()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: fix sysctl documentation nits
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: document crng_fast_key_erasure() destination possibility
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make random_get_entropy() return an unsigned long
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signals every PAGE_SIZE chunk of /dev/[u]random
Jann Horn <jannh(a)google.com>
random: check for signal_pending() outside of need_resched() check
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not allow user to keep crng key around on stack
Jan Varho <jan.varho(a)gmail.com>
random: do not split fast init input in add_hwgenerator_randomness()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mix build-time latent entropy into pool at init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: re-add removed comment about get_random_{u32,u64} reseeding
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: treat bootloader trust toggle the same way as cpu trust toggle
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: skip fast_init if hwrng provides large chunk of entropy
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signal and try earlier when generating entropy
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: reseed more often immediately after booting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make consistent usage of crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use SipHash as interrupt entropy accumulator
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: replace custom notifier chain with standard one
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: don't let 644 read-only sysctls be written to
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: give sysctl_random_min_urandom_seed a more sensible value
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do crng pre-init loading in worker rather than irq
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: unify cycles_t and jiffies usage and types
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup UUID handling
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: only wake up writers after zap if threshold was passed
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: round-robin registers as ulong, not u32
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: clear fast pool, crng, and batches in cpuhp bring up
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: pull add_hwgenerator_randomness() declaration into random.h
Harald Freudenberger <freude(a)linux.vnet.ibm.com>
hwrng: remember rng chosen by user
Harald Freudenberger <freude(a)linux.vnet.ibm.com>
hwrng: use rng source with best quality
Corentin LABBE <clabbe.montjoie(a)gmail.com>
hwrng: core - remove unused PFX macro
Corentin LABBE <clabbe.montjoie(a)gmail.com>
hwrng: core - Move hwrng miscdev minor number to include/linux/miscdevice.h
Corentin LABBE <clabbe.montjoie(a)gmail.com>
hwrng: core - Rewrite the header
Corentin LABBE <clabbe.montjoie(a)gmail.com>
hwrng: core - rewrite better comparison to NULL
Corentin LABBE <clabbe.montjoie(a)gmail.com>
hwrng: core - do not use multiple blank lines
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for crng_init == 0 in add_device_randomness()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: unify early init crng load accounting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not take pool spinlock at boot
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: defer fast pool mixing to worker
Tejun Heo <tj(a)kernel.org>
workqueue: make workqueue available early during boot
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: rewrite header introductory comment
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group sysctl functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group userspace read/write functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group entropy collection functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group entropy extraction functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group initialization wait functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove whitespace and reorder includes
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove useless header comment
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: introduce drain_entropy() helper to declutter crng_reseed()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: deobfuscate irq u32/u64 contributions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: add proper SPDX header
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused tracepoints
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove ifdef'd out interrupt bench
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: tie batched entropy generation to base_crng generation
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: zero buffer after reading entropy from userspace
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove outdated INT_MAX >> 6 check in urandom_read()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use hash function for crng_slow_load()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: absorb fast pool into input pool after fast load
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not xor RDRAND when writing into /dev/random
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: ensure early RDSEED goes through mixer on init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: inline leaves of rand_initialize()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use RDSEED instead of RDRAND in entropy extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: fix locking in crng_fast_load()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove batched entropy locking
Eric Biggers <ebiggers(a)google.com>
random: remove use_input_pool parameter from crng_reseed()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make credit_entropy_bits() always safe
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: always wake up entropy writers after extraction
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use linear min-entropy accumulation crediting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: simplify entropy debiting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use computational hash for entropy extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: only call crng_finalize_init() for primary_crng
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: access primary_pool directly rather than through pointer
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: continually use hwgenerator randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: simplify arithmetic function flow in account()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: access input_pool_data directly rather than through pointer
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup fractional entropy shift constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: prepend remaining pool constants with POOL_
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: de-duplicate INPUT_POOL constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused OUTPUT_POOL constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: rather than entropy_store abstraction, use global
Linus Torvalds <torvalds(a)linux-foundation.org>
random: try to actively add entropy rather than passively wait for it
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused extract_entropy() reserved argument
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove incomplete last_data logic
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup integer types
Eric Biggers <ebiggers(a)google.com>
crypto: chacha20 - Fix chacha20_block() keystream alignment (again)
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup poolinfo abstraction
Schspa Shi <schspa(a)gmail.com>
random: fix typo in comments
Jann Horn <jannh(a)google.com>
random: don't reset crng_init_cnt on urandom_read()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid superfluous call to RDRAND in CRNG extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: early initialization of ChaCha constants
Eric Biggers <ebiggers(a)google.com>
random: initialize ChaCha20 constants with correct endianness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: harmonize "crng init done" messages
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mix bootloader randomness into pool
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not re-init if crng_reseed completes before primary init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not sign extend bytes for rotation when mixing
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use BLAKE2s instead of SHA1 in extraction
Sebastian Andrzej Siewior <bigeasy(a)linutronix.de>
random: remove unused irq_flags argument from add_interrupt_randomness()
Mark Brown <broonie(a)kernel.org>
random: document add_hwgenerator_randomness() with other input functions
Eric Biggers <ebiggers(a)google.com>
crypto: blake2s - adjust include guard naming
Eric Biggers <ebiggers(a)google.com>
crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
Jason A. Donenfeld <Jason(a)zx2c4.com>
MAINTAINERS: co-maintain random.c
Eric Biggers <ebiggers(a)google.com>
random: remove dead code left over from blocking pool
Ard Biesheuvel <ardb(a)kernel.org>
random: avoid arch_get_random_seed_long() when collecting IRQ randomness
Mark Rutland <mark.rutland(a)arm.com>
random: add arch_get_random_*long_early()
Richard Henderson <richard.henderson(a)linaro.org>
powerpc: Use bool in archrandom.h
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Use false with bool
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
powerpc: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
x86: Remove arch_has_random, arch_has_random_seed
Mark Rutland <mark.rutland(a)arm.com>
random: avoid warnings for !CONFIG_NUMA builds
Mark Rutland <mark.rutland(a)arm.com>
random: split primary/secondary crng init paths
Yangtao Li <tiny.windzz(a)gmail.com>
random: remove some dead code of poolinfo
Yangtao Li <tiny.windzz(a)gmail.com>
random: fix typo in add_timer_randomness()
Yangtao Li <tiny.windzz(a)gmail.com>
random: Add and use pr_fmt()
Yangtao Li <tiny.windzz(a)gmail.com>
random: convert to ENTROPY_BITS for better code readability
Yangtao Li <tiny.windzz(a)gmail.com>
random: remove unnecessary unlikely()
Andy Lutomirski <luto(a)kernel.org>
random: remove kernel.random.read_wakeup_threshold
Andy Lutomirski <luto(a)kernel.org>
random: delete code to pull data into pools
Andy Lutomirski <luto(a)kernel.org>
random: remove the blocking pool
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: fix crash on multiple early calls to add_bootloader_randomness()
Andy Lutomirski <luto(a)kernel.org>
random: make /dev/random be almost like /dev/urandom
Andy Lutomirski <luto(a)kernel.org>
random: ignore GRND_RANDOM in getentropy(2)
Andy Lutomirski <luto(a)kernel.org>
random: add GRND_INSECURE to return best-effort non-cryptographic bytes
Andy Lutomirski <luto(a)kernel.org>
random: Add a urandom_read_nowait() for random APIs that don't warn
Andy Lutomirski <luto(a)kernel.org>
random: Don't wake crng_init_wait when crng_init == 1
Jason A. Donenfeld <Jason(a)zx2c4.com>
lib/crypto: sha1: re-roll loops to reduce code size
Jason A. Donenfeld <Jason(a)zx2c4.com>
lib/crypto: blake2s: move hmac construction into wireguard
Jason A. Donenfeld <Jason(a)zx2c4.com>
crypto: blake2s - generic C library implementation and selftest
Andy Shevchenko <andriy.shevchenko(a)linux.intel.com>
crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
Herbert Xu <herbert(a)gondor.apana.org.au>
Revert "hwrng: core - Freeze khwrng thread during suspend"
Borislav Petkov <bp(a)alien8.de>
char/random: Add a newline at the end of the file
Stephen Boyd <swboyd(a)chromium.org>
random: Use wait_event_freezable() in add_hwgenerator_randomness()
Hsin-Yi Wang <hsinyi(a)chromium.org>
fdt: add support for rng-seed
Stephen Boyd <swboyd(a)chromium.org>
random: Support freezable kthreads in add_hwgenerator_randomness()
Theodore Ts'o <tytso(a)mit.edu>
random: fix soft lockup when trying to read from an uninitialized blocking pool
Vasily Gorbik <gor(a)linux.ibm.com>
latent_entropy: avoid build error when plugin cflags are not set
George Spelvin <lkml(a)sdf.org>
random: document get_random_int() family
Kees Cook <keescook(a)chromium.org>
random: move rand_initialize() earlier
Theodore Ts'o <tytso(a)mit.edu>
random: only read from /dev/random after its pool has received 128 bits
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: make primary_crng static
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: remove unused stuct poolinfo::poolbits
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: constify poolinfo_table
Kees Cook <keescook(a)chromium.org>
random: make CPU trust a boot parameter
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: Make crng state queryable
Ingo Molnar <mingo(a)elte.hu>
random: remove preempt disabled region
Theodore Ts'o <tytso(a)mit.edu>
random: add a config option to trust the CPU's hwrng
Tobin C. Harding <me(a)tobin.cc>
random: Return nbytes filled from hw RNG
Tobin C. Harding <me(a)tobin.cc>
random: Fix whitespace pre random-bytes work
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: remove unused dont_count_entropy
Andi Kleen <ak(a)linux.intel.com>
random: optimize add_interrupt_randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: always fill buffer in get_random_bytes_wait
Eric Biggers <ebiggers(a)google.com>
crypto: chacha20 - Fix keystream alignment for chacha20_block()
Eric Biggers <ebiggers(a)google.com>
random: fix data race on crng_node_pool
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: always use batched entropy for get_random_u{32,64}
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Revert "char/random: silence a lockdep splat with printk()"
Sergey Senozhatsky <sergey.senozhatsky.work(a)gmail.com>
char/random: silence a lockdep splat with printk()
Sebastian Andrzej Siewior <bigeasy(a)linutronix.de>
random: add a spinlock_t to struct batched_entropy
Theodore Ts'o <tytso(a)mit.edu>
random: rate limit unseeded randomness warnings
Theodore Ts'o <tytso(a)mit.edu>
random: fix possible sleeping allocation from irq context
Theodore Ts'o <tytso(a)mit.edu>
random: set up the NUMA crng instances after the CRNG is fully initialized
Theodore Ts'o <tytso(a)mit.edu>
random: use a different mixing algorithm for add_device_randomness()
Helge Deller <deller(a)gmx.de>
random: fix warning message on ia64 and parisc
Sebastian Andrzej Siewior <bigeasy(a)linutronix.de>
random: reorder READ_ONCE() in get_random_uXX
Theodore Ts'o <tytso(a)mit.edu>
random: suppress spammy warnings about unseeded randomness
Kees Cook <keescook(a)chromium.org>
random: do not ignore early device randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: warn when kernel uses unseeded randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: add get_random_{bytes,u32,u64,int,long,once}_wait family
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: add wait_for_random_bytes() API
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: silence compiler warnings and fix race
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: invalidate batched entropy after crng init
Fabio Estevam <fabio.estevam(a)nxp.com>
random: move random_min_urandom_seed into CONFIG_SYSCTL ifdef block
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: convert get_random_int/long into get_random_u32/u64
Stephan Müller <smueller(a)chronox.de>
random: fix comment for unused random_min_urandom_seed
Stephan Müller <smueller(a)chronox.de>
random: remove variable limit
Stephan Müller <smueller(a)chronox.de>
random: remove stale urandom_init_wait
Stephan Mueller <stephan.mueller(a)atsec.com>
random: remove stale maybe_reseed_primary_crng
Al Viro <viro(a)zeniv.linux.org.uk>
9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
-------------
Diffstat:
Documentation/kernel-parameters.txt | 12 +
Documentation/sysctl/kernel.txt | 35 +-
MAINTAINERS | 1 +
Makefile | 4 +-
arch/alpha/include/asm/timex.h | 1 +
arch/arm/include/asm/timex.h | 1 +
arch/ia64/include/asm/timex.h | 1 +
arch/m68k/include/asm/timex.h | 2 +-
arch/mips/include/asm/timex.h | 17 +-
arch/nios2/include/asm/timex.h | 3 +
arch/parisc/include/asm/timex.h | 3 +-
arch/powerpc/include/asm/archrandom.h | 27 +-
arch/powerpc/include/asm/timex.h | 1 +
arch/s390/include/asm/timex.h | 1 +
arch/s390/mm/pgtable.c | 2 +-
arch/sparc/include/asm/timex_32.h | 4 +-
arch/um/include/asm/timex.h | 9 +-
arch/x86/include/asm/archrandom.h | 12 +-
arch/x86/include/asm/timex.h | 9 +
arch/x86/include/asm/tsc.h | 7 +-
arch/xtensa/include/asm/timex.h | 6 +-
crypto/chacha20_generic.c | 3 +-
crypto/drbg.c | 220 +-
crypto/md4.c | 17 -
crypto/md5.c | 17 -
drivers/ata/libata-core.c | 4 +-
drivers/char/Kconfig | 38 +-
drivers/char/hw_random/core.c | 93 +-
drivers/char/random.c | 2891 ++++++++++-----------------
drivers/hv/vmbus_drv.c | 2 +-
drivers/irqchip/irq-gic-realview.c | 1 +
drivers/irqchip/irq-gic-v3.c | 8 +-
drivers/misc/atmel-ssc.c | 4 +-
drivers/net/ethernet/mediatek/mtk_eth_soc.c | 21 +-
drivers/nfc/nfcmrvl/usb.c | 16 +-
drivers/of/fdt.c | 14 +-
drivers/scsi/lpfc/lpfc_nportdisc.c | 3 +-
drivers/scsi/vmw_pvscsi.h | 4 +-
drivers/staging/comedi/drivers/vmk80xx.c | 2 +-
drivers/tty/serial/8250/8250_port.c | 2 +
drivers/usb/gadget/udc/lpc32xx_udc.c | 1 +
drivers/usb/serial/io_ti.c | 2 +
drivers/usb/serial/io_usbvend.h | 1 +
drivers/usb/serial/option.c | 6 +
drivers/virtio/virtio_mmio.c | 1 +
fs/9p/vfs_inode_dotl.c | 10 +-
fs/ext4/mballoc.c | 9 +
fs/ext4/namei.c | 3 +-
fs/ext4/resize.c | 10 +
fs/fuse/dev.c | 12 +-
fs/fuse/file.c | 1 +
fs/fuse/fuse_i.h | 2 +
fs/nfs/pnfs.c | 6 +
include/crypto/blake2s.h | 102 +
include/crypto/chacha20.h | 17 +-
include/crypto/drbg.h | 18 +-
include/crypto/internal/blake2s.h | 19 +
include/linux/byteorder/generic.h | 17 +
include/linux/cpuhotplug.h | 2 +
include/linux/hw_random.h | 2 -
include/linux/miscdevice.h | 1 +
include/linux/mm.h | 2 +
include/linux/net.h | 2 +
include/linux/once.h | 2 +
include/linux/prandom.h | 23 +-
include/linux/random.h | 133 +-
include/linux/siphash.h | 28 +
include/linux/swab.h | 1 +
include/linux/timex.h | 10 +-
include/linux/uuid.h | 1 +
include/linux/workqueue.h | 7 +-
include/net/inet_hashtables.h | 2 +-
include/net/secure_seq.h | 4 +-
include/trace/events/random.h | 315 ---
include/uapi/linux/random.h | 4 +-
include/uapi/linux/swab.h | 10 +
init/main.c | 22 +
kernel/cpu.c | 11 +
kernel/irq/handle.c | 2 +-
kernel/time/timekeeping.c | 16 +
kernel/workqueue.c | 76 +-
lib/Kconfig.debug | 27 +
lib/Makefile | 2 +
lib/chacha20.c | 6 +-
lib/crypto/Makefile | 7 +
lib/crypto/blake2s-generic.c | 111 +
lib/crypto/blake2s-selftest.c | 591 ++++++
lib/crypto/blake2s.c | 78 +
lib/find_bit.c | 16 +-
lib/random32.c | 15 +-
lib/sha1.c | 95 +-
lib/siphash.c | 32 +-
lib/swiotlb.c | 11 +-
mm/util.c | 33 +
net/core/secure_seq.c | 4 +-
net/ipv4/inet_hashtables.c | 46 +-
net/ipv6/inet6_hashtables.c | 4 +-
net/l2tp/l2tp_ip6.c | 5 +-
net/l2tp/l2tp_ppp.c | 60 +-
net/sunrpc/xprtrdma/rpc_rdma.c | 4 +-
sound/soc/codecs/cs42l52.c | 8 +-
sound/soc/codecs/cs42l56.c | 4 +-
sound/soc/codecs/cs53l30.c | 16 +-
sound/soc/codecs/wm8962.c | 1 +
104 files changed, 2966 insertions(+), 2641 deletions(-)
This is the start of the stable review cycle for the 4.14.285 release.
There are 237 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 25 Jun 2022 16:43:11 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.285-r…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.14.285-rc1
Willy Tarreau <w(a)1wt.eu>
tcp: drop the hash_32() part from the index calculation
Willy Tarreau <w(a)1wt.eu>
tcp: increase source port perturb table to 2^16
Willy Tarreau <w(a)1wt.eu>
tcp: dynamically allocate the perturb table used by source ports
Willy Tarreau <w(a)1wt.eu>
tcp: add small random increments to the source port
Willy Tarreau <w(a)1wt.eu>
tcp: use different parts of the port_offset for index and offset
Eric Dumazet <edumazet(a)google.com>
tcp: add some entropy in __inet_hash_connect()
Colin Ian King <colin.king(a)canonical.com>
xprtrdma: fix incorrect header size calculations
Marian Postevca <posteuca(a)mutex.one>
usb: gadget: u_ether: fix regression in setting fixed MAC address
Christian Borntraeger <borntraeger(a)linux.ibm.com>
s390/mm: use non-quiescing sske for KVM switch to keyed guest
James Chapman <jchapman(a)katalix.com>
l2tp: fix race in pppol2tp_release with session object destroy
James Chapman <jchapman(a)katalix.com>
l2tp: don't use inet_shutdown on ppp session destroy
Murilo Opsfelder Araujo <muriloo(a)linux.ibm.com>
virtio-pci: Remove wrong address verification in vp_del_vqs()
Zhang Yi <yi.zhang(a)huawei.com>
ext4: add reserved GDT blocks check
Ding Xiang <dingxiang(a)cmss.chinamobile.com>
ext4: make variable "count" signed
Baokun Li <libaokun1(a)huawei.com>
ext4: fix bug_on ext4_mb_use_inode_pa
Ilpo Järvinen <ilpo.jarvinen(a)linux.intel.com>
serial: 8250: Store to lsr_save_flags after lsr read
Miaoqian Lin <linmq006(a)gmail.com>
usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
Miaoqian Lin <linmq006(a)gmail.com>
usb: dwc2: Fix memory leak in dwc2_hcd_init
Robert Eckelmann <longnoserob(a)gmail.com>
USB: serial: io_ti: add Agilent E5805A support
Slark Xiao <slark_xiao(a)163.com>
USB: serial: option: add support for Cinterion MV31 with new baseline
Ian Abbott <abbotti(a)mev.co.uk>
comedi: vmk80xx: fix expression for tx buffer size
Miaoqian Lin <linmq006(a)gmail.com>
irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
Masahiro Yamada <masahiroy(a)kernel.org>
certs/blacklist_hashes.c: fix const confusion in certs blacklist
Mark Rutland <mark.rutland(a)arm.com>
arm64: ftrace: fix branch range checks
Christophe JAILLET <christophe.jaillet(a)wanadoo.fr>
net: bgmac: Fix an erroneous kfree() in bgmac_remove()
Miaoqian Lin <linmq006(a)gmail.com>
misc: atmel-ssc: Fix IRQ check in ssc_probe
Vincent Whitchurch <vincent.whitchurch(a)axis.com>
tty: goldfish: Fix free_irq() on remove
Aleksandr Loktionov <aleksandr.loktionov(a)intel.com>
i40e: Fix call trace in setup_tx_descriptors
Trond Myklebust <trond.myklebust(a)hammerspace.com>
pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: credit cpu and bootloader seeds by default
Chen Lin <chen45464546(a)163.com>
net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
Wang Yufen <wangyufen(a)huawei.com>
ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
Xiaohui Zhang <xiaohuizhang(a)ruc.edu.cn>
nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
chengkaitao <pilgrimtao(a)gmail.com>
virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
Chengguang Xu <cgxu519(a)mykernel.net>
scsi: pmcraid: Fix missing resource cleanup in error case
Chengguang Xu <cgxu519(a)mykernel.net>
scsi: ipr: Fix missing/incorrect resource cleanup in error case
James Smart <jsmart2021(a)gmail.com>
scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
Wentao Wang <wwentao(a)vmware.com>
scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
Adam Ford <aford173(a)gmail.com>
ASoC: wm8962: Fix suspend while playing music
Sergey Shtylyov <s.shtylyov(a)omp.ru>
ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l56: Correct typo in minimum level for SX volume controls
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l52: Correct TLV for Bypass Volume
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs53l30: Correct number of volume levels on SX controls
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l52: Fix TLV scales for mixer controls
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: account for arch randomness in bits
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mark bootloader randomness code as __init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid checking crng_ready() twice in random_init()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - make reseeding from get_random_bytes() synchronous
Stephan Müller <smueller(a)chronox.de>
crypto: drbg - always try to free Jitter RNG instance
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - prepare for more fine-grained tracking of seeding state
Stephan Müller <smueller(a)chronox.de>
crypto: drbg - always seeded with SP800-90B compliant noise source
Stephan Mueller <smueller(a)chronox.de>
crypto: drbg - add FIPS 140-2 CTRNG for noise source
Jason A. Donenfeld <Jason(a)zx2c4.com>
Revert "random: use static branch for crng_ready()"
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signals after page of pool writes
Jens Axboe <axboe(a)kernel.dk>
random: wire up fops->splice_{read,write}_iter()
Jens Axboe <axboe(a)kernel.dk>
random: convert to using fops->write_iter()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: move randomize_page() into mm where it belongs
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: move initialization functions out of hot pages
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use proper return types on get_random_{int,long}_wait()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove extern from functions in header
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use static branch for crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: credit architectural init the exact amount
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: handle latent entropy and command line from random_init()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use proper jiffies comparison macro
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove ratelimiting for in-kernel unseeded randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid initializing twice in credit race
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use symbolic constants for crng_init states
Jason A. Donenfeld <Jason(a)zx2c4.com>
siphash: use one source of truth for siphash permutations
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: help compiler out with fast_mix() by using simpler arguments
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not use input pool from hard IRQs
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: order timer entropy functions below interrupt functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not pretend to handle premature next security model
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not use batches when !crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: insist on random_get_entropy() existing in order to simplify
Jason A. Donenfeld <Jason(a)zx2c4.com>
xtensa: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
sparc: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
um: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
x86/tsc: Use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
nios2: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
arm: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
mips: use fallback for random_get_entropy() instead of just c0 random
Jason A. Donenfeld <Jason(a)zx2c4.com>
m68k: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
timekeeping: Add raw clock fallback for random_get_entropy()
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
alpha: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
parisc: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
s390: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
ia64: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
init: call time_init() before rand_initialize()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: fix sysctl documentation nits
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: document crng_fast_key_erasure() destination possibility
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make random_get_entropy() return an unsigned long
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signals every PAGE_SIZE chunk of /dev/[u]random
Jann Horn <jannh(a)google.com>
random: check for signal_pending() outside of need_resched() check
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not allow user to keep crng key around on stack
Jan Varho <jan.varho(a)gmail.com>
random: do not split fast init input in add_hwgenerator_randomness()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mix build-time latent entropy into pool at init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: re-add removed comment about get_random_{u32,u64} reseeding
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: treat bootloader trust toggle the same way as cpu trust toggle
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: skip fast_init if hwrng provides large chunk of entropy
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signal and try earlier when generating entropy
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: reseed more often immediately after booting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make consistent usage of crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use SipHash as interrupt entropy accumulator
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: replace custom notifier chain with standard one
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: don't let 644 read-only sysctls be written to
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: give sysctl_random_min_urandom_seed a more sensible value
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do crng pre-init loading in worker rather than irq
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: unify cycles_t and jiffies usage and types
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup UUID handling
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: only wake up writers after zap if threshold was passed
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: round-robin registers as ulong, not u32
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: clear fast pool, crng, and batches in cpuhp bring up
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: pull add_hwgenerator_randomness() declaration into random.h
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for crng_init == 0 in add_device_randomness()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: unify early init crng load accounting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not take pool spinlock at boot
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: defer fast pool mixing to worker
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: rewrite header introductory comment
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group sysctl functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group userspace read/write functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group entropy collection functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group entropy extraction functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group initialization wait functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove whitespace and reorder includes
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove useless header comment
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: introduce drain_entropy() helper to declutter crng_reseed()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: deobfuscate irq u32/u64 contributions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: add proper SPDX header
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused tracepoints
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove ifdef'd out interrupt bench
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: tie batched entropy generation to base_crng generation
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: zero buffer after reading entropy from userspace
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove outdated INT_MAX >> 6 check in urandom_read()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use hash function for crng_slow_load()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: absorb fast pool into input pool after fast load
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not xor RDRAND when writing into /dev/random
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: ensure early RDSEED goes through mixer on init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: inline leaves of rand_initialize()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use RDSEED instead of RDRAND in entropy extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: fix locking in crng_fast_load()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove batched entropy locking
Eric Biggers <ebiggers(a)google.com>
random: remove use_input_pool parameter from crng_reseed()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make credit_entropy_bits() always safe
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: always wake up entropy writers after extraction
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use linear min-entropy accumulation crediting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: simplify entropy debiting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use computational hash for entropy extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: only call crng_finalize_init() for primary_crng
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: access primary_pool directly rather than through pointer
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: continually use hwgenerator randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: simplify arithmetic function flow in account()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: access input_pool_data directly rather than through pointer
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup fractional entropy shift constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: prepend remaining pool constants with POOL_
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: de-duplicate INPUT_POOL constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused OUTPUT_POOL constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: rather than entropy_store abstraction, use global
Linus Torvalds <torvalds(a)linux-foundation.org>
random: try to actively add entropy rather than passively wait for it
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused extract_entropy() reserved argument
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove incomplete last_data logic
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup integer types
Eric Biggers <ebiggers(a)google.com>
crypto: chacha20 - Fix chacha20_block() keystream alignment (again)
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup poolinfo abstraction
Schspa Shi <schspa(a)gmail.com>
random: fix typo in comments
Jann Horn <jannh(a)google.com>
random: don't reset crng_init_cnt on urandom_read()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid superfluous call to RDRAND in CRNG extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: early initialization of ChaCha constants
Eric Biggers <ebiggers(a)google.com>
random: initialize ChaCha20 constants with correct endianness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: harmonize "crng init done" messages
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mix bootloader randomness into pool
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not re-init if crng_reseed completes before primary init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not sign extend bytes for rotation when mixing
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use BLAKE2s instead of SHA1 in extraction
Sebastian Andrzej Siewior <bigeasy(a)linutronix.de>
random: remove unused irq_flags argument from add_interrupt_randomness()
Mark Brown <broonie(a)kernel.org>
random: document add_hwgenerator_randomness() with other input functions
Eric Biggers <ebiggers(a)google.com>
crypto: blake2s - adjust include guard naming
Eric Biggers <ebiggers(a)google.com>
crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
Jason A. Donenfeld <Jason(a)zx2c4.com>
MAINTAINERS: co-maintain random.c
Eric Biggers <ebiggers(a)google.com>
random: remove dead code left over from blocking pool
Ard Biesheuvel <ardb(a)kernel.org>
random: avoid arch_get_random_seed_long() when collecting IRQ randomness
Mark Rutland <mark.rutland(a)arm.com>
random: add arch_get_random_*long_early()
Richard Henderson <richard.henderson(a)linaro.org>
powerpc: Use bool in archrandom.h
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Use false with bool
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
s390: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
powerpc: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
x86: Remove arch_has_random, arch_has_random_seed
Mark Rutland <mark.rutland(a)arm.com>
random: avoid warnings for !CONFIG_NUMA builds
Mark Rutland <mark.rutland(a)arm.com>
random: split primary/secondary crng init paths
Yangtao Li <tiny.windzz(a)gmail.com>
random: remove some dead code of poolinfo
Yangtao Li <tiny.windzz(a)gmail.com>
random: fix typo in add_timer_randomness()
Yangtao Li <tiny.windzz(a)gmail.com>
random: Add and use pr_fmt()
Yangtao Li <tiny.windzz(a)gmail.com>
random: convert to ENTROPY_BITS for better code readability
Yangtao Li <tiny.windzz(a)gmail.com>
random: remove unnecessary unlikely()
Andy Lutomirski <luto(a)kernel.org>
random: remove kernel.random.read_wakeup_threshold
Andy Lutomirski <luto(a)kernel.org>
random: delete code to pull data into pools
Andy Lutomirski <luto(a)kernel.org>
random: remove the blocking pool
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: fix crash on multiple early calls to add_bootloader_randomness()
Sergey Senozhatsky <sergey.senozhatsky.work(a)gmail.com>
char/random: silence a lockdep splat with printk()
Andy Lutomirski <luto(a)kernel.org>
random: make /dev/random be almost like /dev/urandom
Andy Lutomirski <luto(a)kernel.org>
random: ignore GRND_RANDOM in getentropy(2)
Andy Lutomirski <luto(a)kernel.org>
random: add GRND_INSECURE to return best-effort non-cryptographic bytes
Andy Lutomirski <luto(a)kernel.org>
random: Add a urandom_read_nowait() for random APIs that don't warn
Andy Lutomirski <luto(a)kernel.org>
random: Don't wake crng_init_wait when crng_init == 1
Jason A. Donenfeld <Jason(a)zx2c4.com>
lib/crypto: sha1: re-roll loops to reduce code size
Jason A. Donenfeld <Jason(a)zx2c4.com>
lib/crypto: blake2s: move hmac construction into wireguard
Jason A. Donenfeld <Jason(a)zx2c4.com>
crypto: blake2s - generic C library implementation and selftest
Andy Shevchenko <andriy.shevchenko(a)linux.intel.com>
crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
Herbert Xu <herbert(a)gondor.apana.org.au>
Revert "hwrng: core - Freeze khwrng thread during suspend"
Borislav Petkov <bp(a)alien8.de>
char/random: Add a newline at the end of the file
Stephen Boyd <swboyd(a)chromium.org>
random: Use wait_event_freezable() in add_hwgenerator_randomness()
Hsin-Yi Wang <hsinyi(a)chromium.org>
fdt: add support for rng-seed
Stephen Boyd <swboyd(a)chromium.org>
random: Support freezable kthreads in add_hwgenerator_randomness()
Theodore Ts'o <tytso(a)mit.edu>
random: fix soft lockup when trying to read from an uninitialized blocking pool
Vasily Gorbik <gor(a)linux.ibm.com>
latent_entropy: avoid build error when plugin cflags are not set
George Spelvin <lkml(a)sdf.org>
random: document get_random_int() family
Kees Cook <keescook(a)chromium.org>
random: move rand_initialize() earlier
Theodore Ts'o <tytso(a)mit.edu>
random: only read from /dev/random after its pool has received 128 bits
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: make primary_crng static
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: remove unused stuct poolinfo::poolbits
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: constify poolinfo_table
Kees Cook <keescook(a)chromium.org>
random: make CPU trust a boot parameter
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: Make crng state queryable
Ingo Molnar <mingo(a)elte.hu>
random: remove preempt disabled region
Theodore Ts'o <tytso(a)mit.edu>
random: add a config option to trust the CPU's hwrng
Tobin C. Harding <me(a)tobin.cc>
random: Return nbytes filled from hw RNG
Tobin C. Harding <me(a)tobin.cc>
random: Fix whitespace pre random-bytes work
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: remove unused dont_count_entropy
Andi Kleen <ak(a)linux.intel.com>
random: optimize add_interrupt_randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: always fill buffer in get_random_bytes_wait
Eric Biggers <ebiggers(a)google.com>
crypto: chacha20 - Fix keystream alignment for chacha20_block()
Al Viro <viro(a)zeniv.linux.org.uk>
9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 12 +
Documentation/sysctl/kernel.txt | 35 +-
MAINTAINERS | 1 +
Makefile | 4 +-
arch/alpha/include/asm/timex.h | 1 +
arch/arm/include/asm/timex.h | 1 +
arch/arm64/kernel/ftrace.c | 4 +-
arch/ia64/include/asm/timex.h | 1 +
arch/m68k/include/asm/timex.h | 2 +-
arch/mips/include/asm/timex.h | 17 +-
arch/nios2/include/asm/timex.h | 3 +
arch/parisc/include/asm/timex.h | 3 +-
arch/powerpc/include/asm/archrandom.h | 27 +-
arch/powerpc/include/asm/timex.h | 1 +
arch/s390/include/asm/archrandom.h | 12 -
arch/s390/include/asm/timex.h | 1 +
arch/s390/mm/pgtable.c | 2 +-
arch/sparc/include/asm/timex_32.h | 4 +-
arch/um/include/asm/timex.h | 9 +-
arch/x86/include/asm/archrandom.h | 12 +-
arch/x86/include/asm/timex.h | 9 +
arch/x86/include/asm/tsc.h | 7 +-
arch/xtensa/include/asm/timex.h | 6 +-
certs/blacklist_hashes.c | 2 +-
crypto/chacha20_generic.c | 3 +-
crypto/drbg.c | 220 +-
crypto/md4.c | 17 -
crypto/md5.c | 17 -
drivers/ata/libata-core.c | 4 +-
drivers/char/Kconfig | 38 +-
drivers/char/hw_random/core.c | 1 +
drivers/char/random.c | 3032 +++++++++--------------
drivers/hv/vmbus_drv.c | 2 +-
drivers/irqchip/irq-gic-realview.c | 1 +
drivers/misc/atmel-ssc.c | 4 +-
drivers/net/ethernet/broadcom/bgmac-bcma.c | 1 -
drivers/net/ethernet/intel/i40e/i40e_ethtool.c | 25 +-
drivers/net/ethernet/mediatek/mtk_eth_soc.c | 21 +-
drivers/nfc/nfcmrvl/usb.c | 16 +-
drivers/of/fdt.c | 14 +-
drivers/scsi/ipr.c | 4 +-
drivers/scsi/lpfc/lpfc_nportdisc.c | 3 +-
drivers/scsi/pmcraid.c | 2 +-
drivers/scsi/vmw_pvscsi.h | 4 +-
drivers/staging/comedi/drivers/vmk80xx.c | 2 +-
drivers/tty/goldfish.c | 2 +-
drivers/tty/serial/8250/8250_port.c | 2 +
drivers/usb/dwc2/hcd.c | 2 +-
drivers/usb/gadget/function/u_ether.c | 11 +-
drivers/usb/gadget/udc/lpc32xx_udc.c | 1 +
drivers/usb/serial/io_ti.c | 2 +
drivers/usb/serial/io_usbvend.h | 1 +
drivers/usb/serial/option.c | 6 +
drivers/virtio/virtio_mmio.c | 1 +
drivers/virtio/virtio_pci_common.c | 3 +-
fs/9p/vfs_inode_dotl.c | 10 +-
fs/ext4/mballoc.c | 9 +
fs/ext4/namei.c | 3 +-
fs/ext4/resize.c | 10 +
fs/nfs/pnfs.c | 6 +
include/crypto/blake2s.h | 102 +
include/crypto/chacha20.h | 17 +-
include/crypto/drbg.h | 18 +-
include/crypto/internal/blake2s.h | 19 +
include/linux/byteorder/generic.h | 17 +
include/linux/cpuhotplug.h | 2 +
include/linux/hw_random.h | 2 -
include/linux/mm.h | 2 +
include/linux/prandom.h | 23 +-
include/linux/random.h | 125 +-
include/linux/siphash.h | 28 +
include/linux/timex.h | 10 +-
include/trace/events/random.h | 316 ---
include/uapi/linux/random.h | 4 +-
init/main.c | 18 +-
kernel/cpu.c | 11 +
kernel/irq/handle.c | 2 +-
kernel/time/timekeeping.c | 16 +
lib/Kconfig.debug | 5 +-
lib/Makefile | 2 +
lib/chacha20.c | 6 +-
lib/crypto/Makefile | 7 +
lib/crypto/blake2s-generic.c | 111 +
lib/crypto/blake2s-selftest.c | 591 +++++
lib/crypto/blake2s.c | 78 +
lib/random32.c | 15 +-
lib/sha1.c | 95 +-
lib/siphash.c | 32 +-
mm/util.c | 33 +
net/ipv4/inet_hashtables.c | 34 +-
net/l2tp/l2tp_ip6.c | 5 +-
net/l2tp/l2tp_ppp.c | 60 +-
net/sunrpc/xprtrdma/rpc_rdma.c | 4 +-
sound/soc/codecs/cs42l52.c | 8 +-
sound/soc/codecs/cs42l56.c | 4 +-
sound/soc/codecs/cs53l30.c | 16 +-
sound/soc/codecs/wm8962.c | 1 +
97 files changed, 2776 insertions(+), 2739 deletions(-)
This is the start of the stable review cycle for the 4.19.249 release.
There are 234 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 25 Jun 2022 16:43:11 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.249-r…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.19.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.19.249-rc1
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Revert "hwmon: Make chip parameter for with_info API mandatory"
Willy Tarreau <w(a)1wt.eu>
tcp: drop the hash_32() part from the index calculation
Willy Tarreau <w(a)1wt.eu>
tcp: increase source port perturb table to 2^16
Willy Tarreau <w(a)1wt.eu>
tcp: dynamically allocate the perturb table used by source ports
Willy Tarreau <w(a)1wt.eu>
tcp: add small random increments to the source port
Willy Tarreau <w(a)1wt.eu>
tcp: use different parts of the port_offset for index and offset
Eric Dumazet <edumazet(a)google.com>
tcp: add some entropy in __inet_hash_connect()
Colin Ian King <colin.king(a)canonical.com>
xprtrdma: fix incorrect header size calculations
Marian Postevca <posteuca(a)mutex.one>
usb: gadget: u_ether: fix regression in setting fixed MAC address
Christian Borntraeger <borntraeger(a)linux.ibm.com>
s390/mm: use non-quiescing sske for KVM switch to keyed guest
Alexey Kardashevskiy <aik(a)ozlabs.ru>
powerpc/mm: Switch obsolete dssall to .long
Randy Dunlap <rdunlap(a)infradead.org>
RISC-V: fix barrier() use in <vdso/processor.h>
Ilya Maximets <i.maximets(a)ovn.org>
net: openvswitch: fix leak of nested actions
Ilya Maximets <i.maximets(a)ovn.org>
net: openvswitch: fix misuse of the cached connection on tuple changes
Murilo Opsfelder Araujo <muriloo(a)linux.ibm.com>
virtio-pci: Remove wrong address verification in vp_del_vqs()
Zhang Yi <yi.zhang(a)huawei.com>
ext4: add reserved GDT blocks check
Ding Xiang <dingxiang(a)cmss.chinamobile.com>
ext4: make variable "count" signed
Baokun Li <libaokun1(a)huawei.com>
ext4: fix bug_on ext4_mb_use_inode_pa
Ilpo Järvinen <ilpo.jarvinen(a)linux.intel.com>
serial: 8250: Store to lsr_save_flags after lsr read
Miaoqian Lin <linmq006(a)gmail.com>
usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
Miaoqian Lin <linmq006(a)gmail.com>
usb: dwc2: Fix memory leak in dwc2_hcd_init
Robert Eckelmann <longnoserob(a)gmail.com>
USB: serial: io_ti: add Agilent E5805A support
Slark Xiao <slark_xiao(a)163.com>
USB: serial: option: add support for Cinterion MV31 with new baseline
Ian Abbott <abbotti(a)mev.co.uk>
comedi: vmk80xx: fix expression for tx buffer size
Miaoqian Lin <linmq006(a)gmail.com>
irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
Miaoqian Lin <linmq006(a)gmail.com>
irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
Josh Poimboeuf <jpoimboe(a)kernel.org>
faddr2line: Fix overlapping text section failures, the sequel
Masahiro Yamada <masahiroy(a)kernel.org>
certs/blacklist_hashes.c: fix const confusion in certs blacklist
Mark Rutland <mark.rutland(a)arm.com>
arm64: ftrace: fix branch range checks
Christophe JAILLET <christophe.jaillet(a)wanadoo.fr>
net: bgmac: Fix an erroneous kfree() in bgmac_remove()
Petr Machata <petrm(a)nvidia.com>
mlxsw: spectrum_cnt: Reorder counter pools
Miaoqian Lin <linmq006(a)gmail.com>
misc: atmel-ssc: Fix IRQ check in ssc_probe
Vincent Whitchurch <vincent.whitchurch(a)axis.com>
tty: goldfish: Fix free_irq() on remove
Aleksandr Loktionov <aleksandr.loktionov(a)intel.com>
i40e: Fix call trace in setup_tx_descriptors
Grzegorz Szczurek <grzegorzx.szczurek(a)intel.com>
i40e: Fix adding ADQ filter to TC0
Trond Myklebust <trond.myklebust(a)hammerspace.com>
pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: credit cpu and bootloader seeds by default
Chen Lin <chen45464546(a)163.com>
net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
Wang Yufen <wangyufen(a)huawei.com>
ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
Xiaohui Zhang <xiaohuizhang(a)ruc.edu.cn>
nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
chengkaitao <pilgrimtao(a)gmail.com>
virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
Chengguang Xu <cgxu519(a)mykernel.net>
scsi: pmcraid: Fix missing resource cleanup in error case
Chengguang Xu <cgxu519(a)mykernel.net>
scsi: ipr: Fix missing/incorrect resource cleanup in error case
James Smart <jsmart2021(a)gmail.com>
scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
Wentao Wang <wwentao(a)vmware.com>
scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
Mark Brown <broonie(a)kernel.org>
ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put()
Mark Brown <broonie(a)kernel.org>
ASoC: es8328: Fix event generation for deemphasis control
Adam Ford <aford173(a)gmail.com>
ASoC: wm8962: Fix suspend while playing music
Sergey Shtylyov <s.shtylyov(a)omp.ru>
ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l56: Correct typo in minimum level for SX volume controls
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l52: Correct TLV for Bypass Volume
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs53l30: Correct number of volume levels on SX controls
Charles Keepax <ckeepax(a)opensource.cirrus.com>
ASoC: cs42l52: Fix TLV scales for mixer controls
He Ying <heying24(a)huawei.com>
powerpc/kasan: Silence KASAN warnings in __get_wchan()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: account for arch randomness in bits
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mark bootloader randomness code as __init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid checking crng_ready() twice in random_init()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - make reseeding from get_random_bytes() synchronous
Stephan Müller <smueller(a)chronox.de>
crypto: drbg - always try to free Jitter RNG instance
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
Nicolai Stange <nstange(a)suse.de>
crypto: drbg - prepare for more fine-grained tracking of seeding state
Stephan Müller <smueller(a)chronox.de>
crypto: drbg - always seeded with SP800-90B compliant noise source
Stephan Mueller <smueller(a)chronox.de>
crypto: drbg - add FIPS 140-2 CTRNG for noise source
Jason A. Donenfeld <Jason(a)zx2c4.com>
Revert "random: use static branch for crng_ready()"
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signals after page of pool writes
Jens Axboe <axboe(a)kernel.dk>
random: wire up fops->splice_{read,write}_iter()
Jens Axboe <axboe(a)kernel.dk>
random: convert to using fops->write_iter()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: move randomize_page() into mm where it belongs
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: move initialization functions out of hot pages
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use proper return types on get_random_{int,long}_wait()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove extern from functions in header
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use static branch for crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: credit architectural init the exact amount
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: handle latent entropy and command line from random_init()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use proper jiffies comparison macro
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove ratelimiting for in-kernel unseeded randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid initializing twice in credit race
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use symbolic constants for crng_init states
Jason A. Donenfeld <Jason(a)zx2c4.com>
siphash: use one source of truth for siphash permutations
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: help compiler out with fast_mix() by using simpler arguments
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not use input pool from hard IRQs
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: order timer entropy functions below interrupt functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not pretend to handle premature next security model
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not use batches when !crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: insist on random_get_entropy() existing in order to simplify
Jason A. Donenfeld <Jason(a)zx2c4.com>
xtensa: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
sparc: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
um: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
x86/tsc: Use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
nios2: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
arm: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
mips: use fallback for random_get_entropy() instead of just c0 random
Jason A. Donenfeld <Jason(a)zx2c4.com>
m68k: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld <Jason(a)zx2c4.com>
timekeeping: Add raw clock fallback for random_get_entropy()
Jason A. Donenfeld <Jason(a)zx2c4.com>
powerpc: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
alpha: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
parisc: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
s390: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
ia64: define get_cycles macro for arch-override
Jason A. Donenfeld <Jason(a)zx2c4.com>
init: call time_init() before rand_initialize()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: fix sysctl documentation nits
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: document crng_fast_key_erasure() destination possibility
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make random_get_entropy() return an unsigned long
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signals every PAGE_SIZE chunk of /dev/[u]random
Jann Horn <jannh(a)google.com>
random: check for signal_pending() outside of need_resched() check
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not allow user to keep crng key around on stack
Jan Varho <jan.varho(a)gmail.com>
random: do not split fast init input in add_hwgenerator_randomness()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mix build-time latent entropy into pool at init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: re-add removed comment about get_random_{u32,u64} reseeding
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: treat bootloader trust toggle the same way as cpu trust toggle
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: skip fast_init if hwrng provides large chunk of entropy
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for signal and try earlier when generating entropy
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: reseed more often immediately after booting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make consistent usage of crng_ready()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use SipHash as interrupt entropy accumulator
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: replace custom notifier chain with standard one
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: don't let 644 read-only sysctls be written to
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: give sysctl_random_min_urandom_seed a more sensible value
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do crng pre-init loading in worker rather than irq
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: unify cycles_t and jiffies usage and types
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup UUID handling
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: only wake up writers after zap if threshold was passed
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: round-robin registers as ulong, not u32
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: clear fast pool, crng, and batches in cpuhp bring up
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: pull add_hwgenerator_randomness() declaration into random.h
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: check for crng_init == 0 in add_device_randomness()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: unify early init crng load accounting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not take pool spinlock at boot
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: defer fast pool mixing to worker
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: rewrite header introductory comment
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group sysctl functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group userspace read/write functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group entropy collection functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group entropy extraction functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: group initialization wait functions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove whitespace and reorder includes
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove useless header comment
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: introduce drain_entropy() helper to declutter crng_reseed()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: deobfuscate irq u32/u64 contributions
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: add proper SPDX header
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused tracepoints
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove ifdef'd out interrupt bench
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: tie batched entropy generation to base_crng generation
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: zero buffer after reading entropy from userspace
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove outdated INT_MAX >> 6 check in urandom_read()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use hash function for crng_slow_load()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: absorb fast pool into input pool after fast load
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not xor RDRAND when writing into /dev/random
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: ensure early RDSEED goes through mixer on init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: inline leaves of rand_initialize()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use RDSEED instead of RDRAND in entropy extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: fix locking in crng_fast_load()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove batched entropy locking
Eric Biggers <ebiggers(a)google.com>
random: remove use_input_pool parameter from crng_reseed()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: make credit_entropy_bits() always safe
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: always wake up entropy writers after extraction
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use linear min-entropy accumulation crediting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: simplify entropy debiting
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use computational hash for entropy extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: only call crng_finalize_init() for primary_crng
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: access primary_pool directly rather than through pointer
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: continually use hwgenerator randomness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: simplify arithmetic function flow in account()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: access input_pool_data directly rather than through pointer
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup fractional entropy shift constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: prepend remaining pool constants with POOL_
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: de-duplicate INPUT_POOL constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused OUTPUT_POOL constants
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: rather than entropy_store abstraction, use global
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove unused extract_entropy() reserved argument
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: remove incomplete last_data logic
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup integer types
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: cleanup poolinfo abstraction
Schspa Shi <schspa(a)gmail.com>
random: fix typo in comments
Jann Horn <jannh(a)google.com>
random: don't reset crng_init_cnt on urandom_read()
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: avoid superfluous call to RDRAND in CRNG extraction
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: early initialization of ChaCha constants
Eric Biggers <ebiggers(a)google.com>
random: initialize ChaCha20 constants with correct endianness
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: harmonize "crng init done" messages
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: mix bootloader randomness into pool
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not re-init if crng_reseed completes before primary init
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: do not sign extend bytes for rotation when mixing
Jason A. Donenfeld <Jason(a)zx2c4.com>
random: use BLAKE2s instead of SHA1 in extraction
Sebastian Andrzej Siewior <bigeasy(a)linutronix.de>
random: remove unused irq_flags argument from add_interrupt_randomness()
Mark Brown <broonie(a)kernel.org>
random: document add_hwgenerator_randomness() with other input functions
Eric Biggers <ebiggers(a)google.com>
crypto: blake2s - adjust include guard naming
Eric Biggers <ebiggers(a)google.com>
crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
Jason A. Donenfeld <Jason(a)zx2c4.com>
MAINTAINERS: co-maintain random.c
Eric Biggers <ebiggers(a)google.com>
random: remove dead code left over from blocking pool
Ard Biesheuvel <ardb(a)kernel.org>
random: avoid arch_get_random_seed_long() when collecting IRQ randomness
Mark Rutland <mark.rutland(a)arm.com>
random: add arch_get_random_*long_early()
Richard Henderson <richard.henderson(a)linaro.org>
powerpc: Use bool in archrandom.h
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Use false with bool
Richard Henderson <richard.henderson(a)linaro.org>
linux/random.h: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
s390: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
powerpc: Remove arch_has_random, arch_has_random_seed
Richard Henderson <richard.henderson(a)linaro.org>
x86: Remove arch_has_random, arch_has_random_seed
Mark Rutland <mark.rutland(a)arm.com>
random: avoid warnings for !CONFIG_NUMA builds
Mark Rutland <mark.rutland(a)arm.com>
random: split primary/secondary crng init paths
Yangtao Li <tiny.windzz(a)gmail.com>
random: remove some dead code of poolinfo
Yangtao Li <tiny.windzz(a)gmail.com>
random: fix typo in add_timer_randomness()
Yangtao Li <tiny.windzz(a)gmail.com>
random: Add and use pr_fmt()
Yangtao Li <tiny.windzz(a)gmail.com>
random: convert to ENTROPY_BITS for better code readability
Yangtao Li <tiny.windzz(a)gmail.com>
random: remove unnecessary unlikely()
Andy Lutomirski <luto(a)kernel.org>
random: remove kernel.random.read_wakeup_threshold
Andy Lutomirski <luto(a)kernel.org>
random: delete code to pull data into pools
Andy Lutomirski <luto(a)kernel.org>
random: remove the blocking pool
Dominik Brodowski <linux(a)dominikbrodowski.net>
random: fix crash on multiple early calls to add_bootloader_randomness()
Sergey Senozhatsky <sergey.senozhatsky.work(a)gmail.com>
char/random: silence a lockdep splat with printk()
Andy Lutomirski <luto(a)kernel.org>
random: make /dev/random be almost like /dev/urandom
Andy Lutomirski <luto(a)kernel.org>
random: ignore GRND_RANDOM in getentropy(2)
Andy Lutomirski <luto(a)kernel.org>
random: add GRND_INSECURE to return best-effort non-cryptographic bytes
Andy Lutomirski <luto(a)kernel.org>
random: Add a urandom_read_nowait() for random APIs that don't warn
Andy Lutomirski <luto(a)kernel.org>
random: Don't wake crng_init_wait when crng_init == 1
Jason A. Donenfeld <Jason(a)zx2c4.com>
lib/crypto: sha1: re-roll loops to reduce code size
Jason A. Donenfeld <Jason(a)zx2c4.com>
lib/crypto: blake2s: move hmac construction into wireguard
Jason A. Donenfeld <Jason(a)zx2c4.com>
crypto: blake2s - generic C library implementation and selftest
Herbert Xu <herbert(a)gondor.apana.org.au>
Revert "hwrng: core - Freeze khwrng thread during suspend"
Borislav Petkov <bp(a)alien8.de>
char/random: Add a newline at the end of the file
Stephen Boyd <swboyd(a)chromium.org>
random: Use wait_event_freezable() in add_hwgenerator_randomness()
Hsin-Yi Wang <hsinyi(a)chromium.org>
fdt: add support for rng-seed
Stephen Boyd <swboyd(a)chromium.org>
random: Support freezable kthreads in add_hwgenerator_randomness()
Theodore Ts'o <tytso(a)mit.edu>
random: fix soft lockup when trying to read from an uninitialized blocking pool
Vasily Gorbik <gor(a)linux.ibm.com>
latent_entropy: avoid build error when plugin cflags are not set
George Spelvin <lkml(a)sdf.org>
random: document get_random_int() family
Kees Cook <keescook(a)chromium.org>
random: move rand_initialize() earlier
Theodore Ts'o <tytso(a)mit.edu>
random: only read from /dev/random after its pool has received 128 bits
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: make primary_crng static
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: remove unused stuct poolinfo::poolbits
Rasmus Villemoes <linux(a)rasmusvillemoes.dk>
drivers/char/random.c: constify poolinfo_table
Al Viro <viro(a)zeniv.linux.org.uk>
9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 6 +
Documentation/hwmon/hwmon-kernel-api.txt | 2 +-
Documentation/sysctl/kernel.txt | 35 +-
MAINTAINERS | 1 +
Makefile | 4 +-
arch/alpha/include/asm/timex.h | 1 +
arch/arm/include/asm/timex.h | 1 +
arch/arm64/kernel/ftrace.c | 4 +-
arch/ia64/include/asm/timex.h | 1 +
arch/m68k/include/asm/timex.h | 2 +-
arch/mips/include/asm/timex.h | 17 +-
arch/nios2/include/asm/timex.h | 3 +
arch/parisc/include/asm/timex.h | 3 +-
arch/powerpc/include/asm/archrandom.h | 27 +-
arch/powerpc/include/asm/ppc-opcode.h | 2 +
arch/powerpc/include/asm/timex.h | 1 +
arch/powerpc/kernel/idle_6xx.S | 2 +-
arch/powerpc/kernel/l2cr_6xx.S | 6 +-
arch/powerpc/kernel/process.c | 4 +-
arch/powerpc/kernel/swsusp_32.S | 2 +-
arch/powerpc/kernel/swsusp_asm64.S | 2 +-
arch/powerpc/mm/mmu_context.c | 2 +-
arch/powerpc/platforms/powermac/cache.S | 4 +-
arch/riscv/include/asm/processor.h | 2 +
arch/s390/include/asm/archrandom.h | 12 -
arch/s390/include/asm/timex.h | 1 +
arch/s390/mm/pgtable.c | 2 +-
arch/sparc/include/asm/timex_32.h | 4 +-
arch/um/include/asm/timex.h | 9 +-
arch/x86/include/asm/archrandom.h | 12 +-
arch/x86/include/asm/timex.h | 9 +
arch/x86/include/asm/tsc.h | 7 +-
arch/xtensa/include/asm/timex.h | 6 +-
certs/blacklist_hashes.c | 2 +-
crypto/drbg.c | 220 +-
drivers/ata/libata-core.c | 4 +-
drivers/char/Kconfig | 50 +-
drivers/char/hw_random/core.c | 1 +
drivers/char/random.c | 3079 +++++++-------------
drivers/hv/hv.c | 2 +-
drivers/hv/vmbus_drv.c | 2 +-
drivers/hwmon/hwmon.c | 16 +-
drivers/irqchip/irq-gic-realview.c | 1 +
drivers/irqchip/irq-gic-v3.c | 5 +-
drivers/misc/atmel-ssc.c | 4 +-
drivers/net/ethernet/broadcom/bgmac-bcma.c | 1 -
drivers/net/ethernet/intel/i40e/i40e_ethtool.c | 25 +-
drivers/net/ethernet/intel/i40e/i40e_main.c | 5 +
drivers/net/ethernet/mediatek/mtk_eth_soc.c | 21 +-
drivers/net/ethernet/mellanox/mlxsw/spectrum_cnt.h | 2 +-
drivers/nfc/nfcmrvl/usb.c | 16 +-
drivers/of/fdt.c | 14 +-
drivers/scsi/ipr.c | 4 +-
drivers/scsi/lpfc/lpfc_nportdisc.c | 3 +-
drivers/scsi/pmcraid.c | 2 +-
drivers/scsi/vmw_pvscsi.h | 4 +-
drivers/staging/comedi/drivers/vmk80xx.c | 2 +-
drivers/tty/goldfish.c | 2 +-
drivers/tty/serial/8250/8250_port.c | 2 +
drivers/usb/dwc2/hcd.c | 2 +-
drivers/usb/gadget/function/u_ether.c | 11 +-
drivers/usb/gadget/udc/lpc32xx_udc.c | 1 +
drivers/usb/serial/io_ti.c | 2 +
drivers/usb/serial/io_usbvend.h | 1 +
drivers/usb/serial/option.c | 6 +
drivers/virtio/virtio_mmio.c | 1 +
drivers/virtio/virtio_pci_common.c | 3 +-
fs/9p/vfs_inode_dotl.c | 10 +-
fs/ext4/mballoc.c | 9 +
fs/ext4/namei.c | 3 +-
fs/ext4/resize.c | 10 +
fs/nfs/pnfs.c | 6 +
include/crypto/blake2s.h | 102 +
include/crypto/chacha20.h | 15 +
include/crypto/drbg.h | 18 +-
include/crypto/internal/blake2s.h | 19 +
include/linux/cpuhotplug.h | 2 +
include/linux/hw_random.h | 2 -
include/linux/mm.h | 2 +
include/linux/prandom.h | 23 +-
include/linux/random.h | 122 +-
include/linux/siphash.h | 28 +
include/linux/timex.h | 10 +-
include/trace/events/random.h | 316 --
include/uapi/linux/random.h | 4 +-
init/main.c | 18 +-
kernel/cpu.c | 11 +
kernel/irq/handle.c | 2 +-
kernel/time/timekeeping.c | 15 +
lib/Kconfig.debug | 3 +-
lib/Makefile | 2 +
lib/crypto/Makefile | 7 +
lib/crypto/blake2s-generic.c | 111 +
lib/crypto/blake2s-selftest.c | 591 ++++
lib/crypto/blake2s.c | 78 +
lib/random32.c | 15 +-
lib/sha1.c | 95 +-
lib/siphash.c | 32 +-
lib/vsprintf.c | 10 +-
mm/util.c | 33 +
net/ipv4/inet_hashtables.c | 31 +-
net/l2tp/l2tp_ip6.c | 5 +-
net/openvswitch/actions.c | 6 +
net/openvswitch/conntrack.c | 3 +-
net/openvswitch/flow_netlink.c | 61 +-
net/sunrpc/xprtrdma/rpc_rdma.c | 4 +-
scripts/faddr2line | 45 +-
sound/soc/codecs/cs42l52.c | 8 +-
sound/soc/codecs/cs42l56.c | 4 +-
sound/soc/codecs/cs53l30.c | 16 +-
sound/soc/codecs/es8328.c | 5 +-
sound/soc/codecs/wm8962.c | 1 +
sound/soc/codecs/wm_adsp.c | 2 +-
113 files changed, 2839 insertions(+), 2788 deletions(-)
This is the start of the stable review cycle for the 5.4.201 release.
There are 11 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Sat, 25 Jun 2022 16:43:11 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.201-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 5.4.201-rc1
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Revert "hwmon: Make chip parameter for with_info API mandatory"
Will Deacon <will(a)kernel.org>
arm64: mm: Don't invalidate FROM_DEVICE buffers at start of DMA transfer
Willy Tarreau <w(a)1wt.eu>
tcp: drop the hash_32() part from the index calculation
Willy Tarreau <w(a)1wt.eu>
tcp: increase source port perturb table to 2^16
Willy Tarreau <w(a)1wt.eu>
tcp: dynamically allocate the perturb table used by source ports
Willy Tarreau <w(a)1wt.eu>
tcp: add small random increments to the source port
Willy Tarreau <w(a)1wt.eu>
tcp: use different parts of the port_offset for index and offset
Eric Dumazet <edumazet(a)google.com>
tcp: add some entropy in __inet_hash_connect()
Marian Postevca <posteuca(a)mutex.one>
usb: gadget: u_ether: fix regression in setting fixed MAC address
Mike Snitzer <snitzer(a)kernel.org>
dm: remove special-casing of bio-based immutable singleton target on NVMe
Christian Borntraeger <borntraeger(a)linux.ibm.com>
s390/mm: use non-quiescing sske for KVM switch to keyed guest
-------------
Diffstat:
Documentation/hwmon/hwmon-kernel-api.rst | 2 +-
Makefile | 4 +-
arch/arm64/mm/cache.S | 2 -
arch/s390/mm/pgtable.c | 2 +-
drivers/hwmon/hwmon.c | 16 ++++---
drivers/md/dm-table.c | 32 +-------------
drivers/md/dm.c | 73 +++-----------------------------
drivers/usb/gadget/function/u_ether.c | 11 ++++-
include/linux/device-mapper.h | 1 -
net/ipv4/inet_hashtables.c | 31 ++++++++++----
10 files changed, 54 insertions(+), 120 deletions(-)