This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
------------- Pseudo-Shortlog of commits:
Greg Kroah-Hartman gregkh@linuxfoundation.org Linux 5.4.200-rc1
Alexey Kardashevskiy aik@ozlabs.ru powerpc/mm: Switch obsolete dssall to .long
Olof Johansson olof@lixom.net riscv: Less inefficient gcc tishift helpers (and export their symbols)
Randy Dunlap rdunlap@infradead.org RISC-V: fix barrier() use in <vdso/processor.h>
Jean-Philippe Brucker jean-philippe@linaro.org arm64: kprobes: Use BRK instead of single-step when executing instructions out-of-line
Ilya Maximets i.maximets@ovn.org net: openvswitch: fix leak of nested actions
Ilya Maximets i.maximets@ovn.org net: openvswitch: fix misuse of the cached connection on tuple changes
Davide Caratti dcaratti@redhat.com net/sched: act_police: more accurate MTU policing
Murilo Opsfelder Araujo muriloo@linux.ibm.com virtio-pci: Remove wrong address verification in vp_del_vqs()
Andy Chi andy.chi@canonical.com ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
Jeremy Szu jeremy.szu@canonical.com ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8
Zhang Yi yi.zhang@huawei.com ext4: add reserved GDT blocks check
Ding Xiang dingxiang@cmss.chinamobile.com ext4: make variable "count" signed
Baokun Li libaokun1@huawei.com ext4: fix bug_on ext4_mb_use_inode_pa
Mikulas Patocka mpatocka@redhat.com dm mirror log: round up region bitmap size to BITS_PER_LONG
Ilpo Järvinen ilpo.jarvinen@linux.intel.com serial: 8250: Store to lsr_save_flags after lsr read
Miaoqian Lin linmq006@gmail.com usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
Miaoqian Lin linmq006@gmail.com usb: dwc2: Fix memory leak in dwc2_hcd_init
Robert Eckelmann longnoserob@gmail.com USB: serial: io_ti: add Agilent E5805A support
Slark Xiao slark_xiao@163.com USB: serial: option: add support for Cinterion MV31 with new baseline
Ian Abbott abbotti@mev.co.uk comedi: vmk80xx: fix expression for tx buffer size
Serge Semin Sergey.Semin@baikalelectronics.ru i2c: designware: Use standard optional ref clock implementation
Miaoqian Lin linmq006@gmail.com irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
Miaoqian Lin linmq006@gmail.com irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
Miaoqian Lin linmq006@gmail.com irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
Josh Poimboeuf jpoimboe@kernel.org faddr2line: Fix overlapping text section failures, the sequel
Masahiro Yamada masahiroy@kernel.org certs/blacklist_hashes.c: fix const confusion in certs blacklist
Mark Rutland mark.rutland@arm.com arm64: ftrace: fix branch range checks
Christophe JAILLET christophe.jaillet@wanadoo.fr net: bgmac: Fix an erroneous kfree() in bgmac_remove()
Petr Machata petrm@nvidia.com mlxsw: spectrum_cnt: Reorder counter pools
Miaoqian Lin linmq006@gmail.com misc: atmel-ssc: Fix IRQ check in ssc_probe
Vincent Whitchurch vincent.whitchurch@axis.com tty: goldfish: Fix free_irq() on remove
Aleksandr Loktionov aleksandr.loktionov@intel.com i40e: Fix call trace in setup_tx_descriptors
Grzegorz Szczurek grzegorzx.szczurek@intel.com i40e: Fix calculating the number of queue pairs
Grzegorz Szczurek grzegorzx.szczurek@intel.com i40e: Fix adding ADQ filter to TC0
Masahiro Yamada masahiroy@kernel.org clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()
Trond Myklebust trond.myklebust@hammerspace.com pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
Jason A. Donenfeld Jason@zx2c4.com random: credit cpu and bootloader seeds by default
Linus Torvalds torvalds@linux-foundation.org netfs: gcc-12: temporarily disable '-Wattribute-warning' for now
Chen Lin chen45464546@163.com net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
Wang Yufen wangyufen@huawei.com ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
Xiaohui Zhang xiaohuizhang@ruc.edu.cn nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
chengkaitao pilgrimtao@gmail.com virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
huangwenhui huangwenhuia@uniontech.com ALSA: hda/realtek - Add HW8326 support
Chengguang Xu cgxu519@mykernel.net scsi: pmcraid: Fix missing resource cleanup in error case
Chengguang Xu cgxu519@mykernel.net scsi: ipr: Fix missing/incorrect resource cleanup in error case
James Smart jsmart2021@gmail.com scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion
James Smart jsmart2021@gmail.com scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
Wentao Wang wwentao@vmware.com scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
Mark Brown broonie@kernel.org ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put()
Mark Brown broonie@kernel.org ASoC: es8328: Fix event generation for deemphasis control
Adam Ford aford173@gmail.com ASoC: wm8962: Fix suspend while playing music
Sergey Shtylyov s.shtylyov@omp.ru ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
Charles Keepax ckeepax@opensource.cirrus.com ASoC: cs42l56: Correct typo in minimum level for SX volume controls
Charles Keepax ckeepax@opensource.cirrus.com ASoC: cs42l52: Correct TLV for Bypass Volume
Charles Keepax ckeepax@opensource.cirrus.com ASoC: cs53l30: Correct number of volume levels on SX controls
Charles Keepax ckeepax@opensource.cirrus.com ASoC: cs35l36: Update digital volume TLV
Charles Keepax ckeepax@opensource.cirrus.com ASoC: cs42l52: Fix TLV scales for mixer controls
Rob Clark robdclark@chromium.org dma-debug: make things less spammy under memory pressure
Hui Wang hui.wang@canonical.com ASoC: nau8822: Add operation for internal PLL off and on
He Ying heying24@huawei.com powerpc/kasan: Silence KASAN warnings in __get_wchan()
Jason A. Donenfeld Jason@zx2c4.com random: account for arch randomness in bits
Jason A. Donenfeld Jason@zx2c4.com random: mark bootloader randomness code as __init
Jason A. Donenfeld Jason@zx2c4.com random: avoid checking crng_ready() twice in random_init()
Nicolai Stange nstange@suse.de crypto: drbg - make reseeding from get_random_bytes() synchronous
Stephan Müller smueller@chronox.de crypto: drbg - always try to free Jitter RNG instance
Nicolai Stange nstange@suse.de crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
Nicolai Stange nstange@suse.de crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
Nicolai Stange nstange@suse.de crypto: drbg - prepare for more fine-grained tracking of seeding state
Stephan Müller smueller@chronox.de crypto: drbg - always seeded with SP800-90B compliant noise source
Jason A. Donenfeld Jason@zx2c4.com Revert "random: use static branch for crng_ready()"
Jason A. Donenfeld Jason@zx2c4.com random: check for signals after page of pool writes
Jens Axboe axboe@kernel.dk random: wire up fops->splice_{read,write}_iter()
Jens Axboe axboe@kernel.dk random: convert to using fops->write_iter()
Jens Axboe axboe@kernel.dk random: convert to using fops->read_iter()
Jason A. Donenfeld Jason@zx2c4.com random: unify batched entropy implementations
Jason A. Donenfeld Jason@zx2c4.com random: move randomize_page() into mm where it belongs
Jason A. Donenfeld Jason@zx2c4.com random: move initialization functions out of hot pages
Jason A. Donenfeld Jason@zx2c4.com random: make consistent use of buf and len
Jason A. Donenfeld Jason@zx2c4.com random: use proper return types on get_random_{int,long}_wait()
Jason A. Donenfeld Jason@zx2c4.com random: remove extern from functions in header
Jason A. Donenfeld Jason@zx2c4.com random: use static branch for crng_ready()
Jason A. Donenfeld Jason@zx2c4.com random: credit architectural init the exact amount
Jason A. Donenfeld Jason@zx2c4.com random: handle latent entropy and command line from random_init()
Jason A. Donenfeld Jason@zx2c4.com random: use proper jiffies comparison macro
Jason A. Donenfeld Jason@zx2c4.com random: remove ratelimiting for in-kernel unseeded randomness
Jason A. Donenfeld Jason@zx2c4.com random: move initialization out of reseeding hot path
Jason A. Donenfeld Jason@zx2c4.com random: avoid initializing twice in credit race
Jason A. Donenfeld Jason@zx2c4.com random: use symbolic constants for crng_init states
Jason A. Donenfeld Jason@zx2c4.com siphash: use one source of truth for siphash permutations
Jason A. Donenfeld Jason@zx2c4.com random: help compiler out with fast_mix() by using simpler arguments
Jason A. Donenfeld Jason@zx2c4.com random: do not use input pool from hard IRQs
Jason A. Donenfeld Jason@zx2c4.com random: order timer entropy functions below interrupt functions
Jason A. Donenfeld Jason@zx2c4.com random: do not pretend to handle premature next security model
Jason A. Donenfeld Jason@zx2c4.com random: use first 128 bits of input as fast init
Jason A. Donenfeld Jason@zx2c4.com random: do not use batches when !crng_ready()
Jason A. Donenfeld Jason@zx2c4.com random: insist on random_get_entropy() existing in order to simplify
Jason A. Donenfeld Jason@zx2c4.com xtensa: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com sparc: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com um: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com x86/tsc: Use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com nios2: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com arm: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com mips: use fallback for random_get_entropy() instead of just c0 random
Jason A. Donenfeld Jason@zx2c4.com m68k: use fallback for random_get_entropy() instead of zero
Jason A. Donenfeld Jason@zx2c4.com timekeeping: Add raw clock fallback for random_get_entropy()
Jason A. Donenfeld Jason@zx2c4.com powerpc: define get_cycles macro for arch-override
Jason A. Donenfeld Jason@zx2c4.com alpha: define get_cycles macro for arch-override
Jason A. Donenfeld Jason@zx2c4.com parisc: define get_cycles macro for arch-override
Jason A. Donenfeld Jason@zx2c4.com s390: define get_cycles macro for arch-override
Jason A. Donenfeld Jason@zx2c4.com ia64: define get_cycles macro for arch-override
Jason A. Donenfeld Jason@zx2c4.com init: call time_init() before rand_initialize()
Jason A. Donenfeld Jason@zx2c4.com random: fix sysctl documentation nits
Jason A. Donenfeld Jason@zx2c4.com random: document crng_fast_key_erasure() destination possibility
Jason A. Donenfeld Jason@zx2c4.com random: make random_get_entropy() return an unsigned long
Jason A. Donenfeld Jason@zx2c4.com random: allow partial reads if later user copies fail
Jason A. Donenfeld Jason@zx2c4.com random: check for signals every PAGE_SIZE chunk of /dev/[u]random
Jann Horn jannh@google.com random: check for signal_pending() outside of need_resched() check
Jason A. Donenfeld Jason@zx2c4.com random: do not allow user to keep crng key around on stack
Jan Varho jan.varho@gmail.com random: do not split fast init input in add_hwgenerator_randomness()
Jason A. Donenfeld Jason@zx2c4.com random: mix build-time latent entropy into pool at init
Jason A. Donenfeld Jason@zx2c4.com random: re-add removed comment about get_random_{u32,u64} reseeding
Jason A. Donenfeld Jason@zx2c4.com random: treat bootloader trust toggle the same way as cpu trust toggle
Jason A. Donenfeld Jason@zx2c4.com random: skip fast_init if hwrng provides large chunk of entropy
Jason A. Donenfeld Jason@zx2c4.com random: check for signal and try earlier when generating entropy
Jason A. Donenfeld Jason@zx2c4.com random: reseed more often immediately after booting
Jason A. Donenfeld Jason@zx2c4.com random: make consistent usage of crng_ready()
Jason A. Donenfeld Jason@zx2c4.com random: use SipHash as interrupt entropy accumulator
Jason A. Donenfeld Jason@zx2c4.com random: replace custom notifier chain with standard one
Jason A. Donenfeld Jason@zx2c4.com random: don't let 644 read-only sysctls be written to
Jason A. Donenfeld Jason@zx2c4.com random: give sysctl_random_min_urandom_seed a more sensible value
Jason A. Donenfeld Jason@zx2c4.com random: do crng pre-init loading in worker rather than irq
Jason A. Donenfeld Jason@zx2c4.com random: unify cycles_t and jiffies usage and types
Jason A. Donenfeld Jason@zx2c4.com random: cleanup UUID handling
Jason A. Donenfeld Jason@zx2c4.com random: only wake up writers after zap if threshold was passed
Jason A. Donenfeld Jason@zx2c4.com random: round-robin registers as ulong, not u32
Jason A. Donenfeld Jason@zx2c4.com random: clear fast pool, crng, and batches in cpuhp bring up
Jason A. Donenfeld Jason@zx2c4.com random: pull add_hwgenerator_randomness() declaration into random.h
Jason A. Donenfeld Jason@zx2c4.com random: check for crng_init == 0 in add_device_randomness()
Jason A. Donenfeld Jason@zx2c4.com random: unify early init crng load accounting
Jason A. Donenfeld Jason@zx2c4.com random: do not take pool spinlock at boot
Jason A. Donenfeld Jason@zx2c4.com random: defer fast pool mixing to worker
Jason A. Donenfeld Jason@zx2c4.com random: rewrite header introductory comment
Jason A. Donenfeld Jason@zx2c4.com random: group sysctl functions
Jason A. Donenfeld Jason@zx2c4.com random: group userspace read/write functions
Jason A. Donenfeld Jason@zx2c4.com random: group entropy collection functions
Jason A. Donenfeld Jason@zx2c4.com random: group entropy extraction functions
Jason A. Donenfeld Jason@zx2c4.com random: group crng functions
Jason A. Donenfeld Jason@zx2c4.com random: group initialization wait functions
Jason A. Donenfeld Jason@zx2c4.com random: remove whitespace and reorder includes
Jason A. Donenfeld Jason@zx2c4.com random: remove useless header comment
Jason A. Donenfeld Jason@zx2c4.com random: introduce drain_entropy() helper to declutter crng_reseed()
Jason A. Donenfeld Jason@zx2c4.com random: deobfuscate irq u32/u64 contributions
Jason A. Donenfeld Jason@zx2c4.com random: add proper SPDX header
Jason A. Donenfeld Jason@zx2c4.com random: remove unused tracepoints
Jason A. Donenfeld Jason@zx2c4.com random: remove ifdef'd out interrupt bench
Jason A. Donenfeld Jason@zx2c4.com random: tie batched entropy generation to base_crng generation
Dominik Brodowski linux@dominikbrodowski.net random: fix locking for crng_init in crng_reseed()
Jason A. Donenfeld Jason@zx2c4.com random: zero buffer after reading entropy from userspace
Jason A. Donenfeld Jason@zx2c4.com random: remove outdated INT_MAX >> 6 check in urandom_read()
Jason A. Donenfeld Jason@zx2c4.com random: make more consistent use of integer types
Jason A. Donenfeld Jason@zx2c4.com random: use hash function for crng_slow_load()
Jason A. Donenfeld Jason@zx2c4.com random: use simpler fast key erasure flow on per-cpu keys
Jason A. Donenfeld Jason@zx2c4.com random: absorb fast pool into input pool after fast load
Jason A. Donenfeld Jason@zx2c4.com random: do not xor RDRAND when writing into /dev/random
Jason A. Donenfeld Jason@zx2c4.com random: ensure early RDSEED goes through mixer on init
Jason A. Donenfeld Jason@zx2c4.com random: inline leaves of rand_initialize()
Jason A. Donenfeld Jason@zx2c4.com random: get rid of secondary crngs
Jason A. Donenfeld Jason@zx2c4.com random: use RDSEED instead of RDRAND in entropy extraction
Dominik Brodowski linux@dominikbrodowski.net random: fix locking in crng_fast_load()
Jason A. Donenfeld Jason@zx2c4.com random: remove batched entropy locking
Eric Biggers ebiggers@google.com random: remove use_input_pool parameter from crng_reseed()
Jason A. Donenfeld Jason@zx2c4.com random: make credit_entropy_bits() always safe
Jason A. Donenfeld Jason@zx2c4.com random: always wake up entropy writers after extraction
Jason A. Donenfeld Jason@zx2c4.com random: use linear min-entropy accumulation crediting
Jason A. Donenfeld Jason@zx2c4.com random: simplify entropy debiting
Jason A. Donenfeld Jason@zx2c4.com random: use computational hash for entropy extraction
Dominik Brodowski linux@dominikbrodowski.net random: only call crng_finalize_init() for primary_crng
Dominik Brodowski linux@dominikbrodowski.net random: access primary_pool directly rather than through pointer
Dominik Brodowski linux@dominikbrodowski.net random: continually use hwgenerator randomness
Jason A. Donenfeld Jason@zx2c4.com random: simplify arithmetic function flow in account()
Jason A. Donenfeld Jason@zx2c4.com random: selectively clang-format where it makes sense
Jason A. Donenfeld Jason@zx2c4.com random: access input_pool_data directly rather than through pointer
Jason A. Donenfeld Jason@zx2c4.com random: cleanup fractional entropy shift constants
Jason A. Donenfeld Jason@zx2c4.com random: prepend remaining pool constants with POOL_
Jason A. Donenfeld Jason@zx2c4.com random: de-duplicate INPUT_POOL constants
Jason A. Donenfeld Jason@zx2c4.com random: remove unused OUTPUT_POOL constants
Jason A. Donenfeld Jason@zx2c4.com random: rather than entropy_store abstraction, use global
Jason A. Donenfeld Jason@zx2c4.com random: remove unused extract_entropy() reserved argument
Jason A. Donenfeld Jason@zx2c4.com random: remove incomplete last_data logic
Jason A. Donenfeld Jason@zx2c4.com random: cleanup integer types
Jason A. Donenfeld Jason@zx2c4.com random: cleanup poolinfo abstraction
Schspa Shi schspa@gmail.com random: fix typo in comments
Jann Horn jannh@google.com random: don't reset crng_init_cnt on urandom_read()
Jason A. Donenfeld Jason@zx2c4.com random: avoid superfluous call to RDRAND in CRNG extraction
Dominik Brodowski linux@dominikbrodowski.net random: early initialization of ChaCha constants
Eric Biggers ebiggers@google.com random: initialize ChaCha20 constants with correct endianness
Jason A. Donenfeld Jason@zx2c4.com random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
Dominik Brodowski linux@dominikbrodowski.net random: harmonize "crng init done" messages
Jason A. Donenfeld Jason@zx2c4.com random: mix bootloader randomness into pool
Jason A. Donenfeld Jason@zx2c4.com random: do not re-init if crng_reseed completes before primary init
Jason A. Donenfeld Jason@zx2c4.com random: do not sign extend bytes for rotation when mixing
Jason A. Donenfeld Jason@zx2c4.com random: use BLAKE2s instead of SHA1 in extraction
Sebastian Andrzej Siewior bigeasy@linutronix.de random: remove unused irq_flags argument from add_interrupt_randomness()
Mark Brown broonie@kernel.org random: document add_hwgenerator_randomness() with other input functions
Eric Biggers ebiggers@google.com crypto: blake2s - adjust include guard naming
Eric Biggers ebiggers@google.com crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
Jason A. Donenfeld Jason@zx2c4.com MAINTAINERS: co-maintain random.c
Eric Biggers ebiggers@google.com random: remove dead code left over from blocking pool
Ard Biesheuvel ardb@kernel.org random: avoid arch_get_random_seed_long() when collecting IRQ randomness
Mark Rutland mark.rutland@arm.com random: add arch_get_random_*long_early()
Richard Henderson richard.henderson@linaro.org powerpc: Use bool in archrandom.h
Richard Henderson richard.henderson@linaro.org linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
Richard Henderson richard.henderson@linaro.org linux/random.h: Use false with bool
Richard Henderson richard.henderson@linaro.org linux/random.h: Remove arch_has_random, arch_has_random_seed
Richard Henderson richard.henderson@linaro.org s390: Remove arch_has_random, arch_has_random_seed
Richard Henderson richard.henderson@linaro.org powerpc: Remove arch_has_random, arch_has_random_seed
Richard Henderson richard.henderson@linaro.org x86: Remove arch_has_random, arch_has_random_seed
Mark Rutland mark.rutland@arm.com random: avoid warnings for !CONFIG_NUMA builds
Mark Rutland mark.rutland@arm.com random: split primary/secondary crng init paths
Yangtao Li tiny.windzz@gmail.com random: remove some dead code of poolinfo
Yangtao Li tiny.windzz@gmail.com random: fix typo in add_timer_randomness()
Yangtao Li tiny.windzz@gmail.com random: Add and use pr_fmt()
Yangtao Li tiny.windzz@gmail.com random: convert to ENTROPY_BITS for better code readability
Yangtao Li tiny.windzz@gmail.com random: remove unnecessary unlikely()
Andy Lutomirski luto@kernel.org random: remove kernel.random.read_wakeup_threshold
Andy Lutomirski luto@kernel.org random: delete code to pull data into pools
Andy Lutomirski luto@kernel.org random: remove the blocking pool
Andy Lutomirski luto@kernel.org random: make /dev/random be almost like /dev/urandom
Andy Lutomirski luto@kernel.org random: ignore GRND_RANDOM in getentropy(2)
Andy Lutomirski luto@kernel.org random: add GRND_INSECURE to return best-effort non-cryptographic bytes
Andy Lutomirski luto@kernel.org random: Add a urandom_read_nowait() for random APIs that don't warn
Andy Lutomirski luto@kernel.org random: Don't wake crng_init_wait when crng_init == 1
Jason A. Donenfeld Jason@zx2c4.com random: don't forget compat_ioctl on urandom
Arnd Bergmann arnd@arndb.de compat_ioctl: remove /dev/random commands
Jason A. Donenfeld Jason@zx2c4.com lib/crypto: sha1: re-roll loops to reduce code size
Jason A. Donenfeld Jason@zx2c4.com lib/crypto: blake2s: move hmac construction into wireguard
Jason A. Donenfeld Jason@zx2c4.com crypto: blake2s - generic C library implementation and selftest
Martin Faltesek mfaltesek@google.com nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
Yuntao Wang ytcoode@gmail.com bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
Al Viro viro@zeniv.linux.org.uk 9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
-------------
Diffstat:
Documentation/admin-guide/kernel-parameters.txt | 6 + Documentation/admin-guide/sysctl/kernel.rst | 35 +- MAINTAINERS | 1 + Makefile | 4 +- arch/alpha/include/asm/timex.h | 1 + arch/arm/include/asm/timex.h | 1 + arch/arm64/include/asm/brk-imm.h | 2 + arch/arm64/include/asm/debug-monitors.h | 1 + arch/arm64/include/asm/kprobes.h | 2 +- arch/arm64/kernel/ftrace.c | 4 +- arch/arm64/kernel/probes/kprobes.c | 69 +- arch/ia64/include/asm/timex.h | 1 + arch/m68k/include/asm/timex.h | 2 +- arch/mips/include/asm/timex.h | 17 +- arch/nios2/include/asm/timex.h | 3 + arch/parisc/include/asm/timex.h | 3 +- arch/powerpc/include/asm/archrandom.h | 27 +- arch/powerpc/include/asm/ppc-opcode.h | 2 + arch/powerpc/include/asm/timex.h | 1 + arch/powerpc/kernel/idle_6xx.S | 2 +- arch/powerpc/kernel/l2cr_6xx.S | 6 +- arch/powerpc/kernel/process.c | 4 +- arch/powerpc/kernel/swsusp_32.S | 2 +- arch/powerpc/kernel/swsusp_asm64.S | 2 +- arch/powerpc/mm/mmu_context.c | 2 +- arch/powerpc/platforms/powermac/cache.S | 4 +- arch/riscv/include/asm/asm-prototypes.h | 4 + arch/riscv/include/asm/processor.h | 2 + arch/riscv/lib/tishift.S | 75 +- arch/s390/include/asm/archrandom.h | 12 - arch/s390/include/asm/timex.h | 1 + arch/sparc/include/asm/timex_32.h | 4 +- arch/um/include/asm/timex.h | 9 +- arch/x86/include/asm/archrandom.h | 12 +- arch/x86/include/asm/timex.h | 9 + arch/x86/include/asm/tsc.h | 7 +- arch/x86/kernel/cpu/mshyperv.c | 2 +- arch/xtensa/include/asm/timex.h | 6 +- certs/blacklist_hashes.c | 2 +- crypto/drbg.c | 135 +- drivers/ata/libata-core.c | 4 +- drivers/char/Kconfig | 53 +- drivers/char/hw_random/core.c | 1 + drivers/char/random.c | 3213 +++++++------------- drivers/clocksource/hyperv_timer.c | 1 - drivers/hv/vmbus_drv.c | 2 +- drivers/i2c/busses/i2c-designware-common.c | 3 - drivers/i2c/busses/i2c-designware-platdrv.c | 13 +- drivers/irqchip/irq-gic-realview.c | 1 + drivers/irqchip/irq-gic-v3.c | 7 +- drivers/md/dm-log.c | 3 +- drivers/misc/atmel-ssc.c | 4 +- drivers/net/ethernet/broadcom/bgmac-bcma.c | 1 - drivers/net/ethernet/intel/i40e/i40e_ethtool.c | 25 +- drivers/net/ethernet/intel/i40e/i40e_main.c | 5 + drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c | 2 +- drivers/net/ethernet/mediatek/mtk_eth_soc.c | 21 +- drivers/net/ethernet/mellanox/mlxsw/spectrum_cnt.h | 2 +- drivers/nfc/nfcmrvl/usb.c | 16 +- drivers/nfc/st21nfca/se.c | 61 +- drivers/scsi/ipr.c | 4 +- drivers/scsi/lpfc/lpfc_hw4.h | 3 + drivers/scsi/lpfc/lpfc_nportdisc.c | 3 +- drivers/scsi/lpfc/lpfc_nvme.c | 11 +- drivers/scsi/pmcraid.c | 2 +- drivers/scsi/vmw_pvscsi.h | 4 +- drivers/staging/comedi/drivers/vmk80xx.c | 2 +- drivers/tty/goldfish.c | 2 +- drivers/tty/serial/8250/8250_port.c | 2 + drivers/usb/dwc2/hcd.c | 2 +- drivers/usb/gadget/udc/lpc32xx_udc.c | 1 + drivers/usb/serial/io_ti.c | 2 + drivers/usb/serial/io_usbvend.h | 1 + drivers/usb/serial/option.c | 6 + drivers/virtio/virtio_mmio.c | 1 + drivers/virtio/virtio_pci_common.c | 3 +- fs/9p/vfs_inode_dotl.c | 10 +- fs/afs/inode.c | 3 + fs/ceph/inode.c | 3 + fs/compat_ioctl.c | 7 - fs/ext4/mballoc.c | 9 + fs/ext4/namei.c | 3 +- fs/ext4/resize.c | 10 + fs/nfs/pnfs.c | 6 + include/crypto/blake2s.h | 102 + include/crypto/chacha.h | 15 + include/crypto/drbg.h | 16 +- include/crypto/internal/blake2s.h | 19 + include/linux/cpuhotplug.h | 2 + include/linux/hw_random.h | 2 - include/linux/mm.h | 1 + include/linux/prandom.h | 23 +- include/linux/random.h | 122 +- include/linux/siphash.h | 28 + include/linux/timex.h | 10 +- include/trace/events/random.h | 313 -- include/uapi/linux/random.h | 4 +- init/main.c | 13 +- kernel/bpf/stackmap.c | 3 +- kernel/cpu.c | 11 + kernel/dma/debug.c | 2 +- kernel/irq/handle.c | 2 +- kernel/time/timekeeping.c | 15 + lib/Kconfig.debug | 3 +- lib/crypto/Makefile | 6 + lib/crypto/blake2s-generic.c | 111 + lib/crypto/blake2s-selftest.c | 591 ++++ lib/crypto/blake2s.c | 78 + lib/random32.c | 15 +- lib/sha1.c | 95 +- lib/siphash.c | 32 +- lib/vsprintf.c | 10 +- mm/util.c | 32 + net/l2tp/l2tp_ip6.c | 5 +- net/openvswitch/actions.c | 6 + net/openvswitch/conntrack.c | 3 +- net/openvswitch/flow_netlink.c | 80 +- net/sched/act_police.c | 16 +- scripts/faddr2line | 45 +- sound/hda/hdac_device.c | 1 + sound/pci/hda/patch_realtek.c | 27 + sound/soc/codecs/cs35l36.c | 3 +- sound/soc/codecs/cs42l52.c | 8 +- sound/soc/codecs/cs42l56.c | 4 +- sound/soc/codecs/cs53l30.c | 16 +- sound/soc/codecs/es8328.c | 5 +- sound/soc/codecs/nau8822.c | 4 + sound/soc/codecs/nau8822.h | 3 + sound/soc/codecs/wm8962.c | 1 + sound/soc/codecs/wm_adsp.c | 2 +- 130 files changed, 2914 insertions(+), 3013 deletions(-)
On 6/20/22 05:48, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
On ARCH_BCMSTB using 32-bit and 64-bit ARM kernels:
Tested-by: Florian Fainelli f.fainelli@gmail.com
On Mon, Jun 20, 2022 at 02:48:21PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
Build results: total: 161 pass: 161 fail: 0 Qemu test results: total: 449 pass: 449 fail: 0
Tested-by: Guenter Roeck linux@roeck-us.net
Guenter
On Mon, 20 Jun 2022 at 18:41, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro’s test farm. No regressions on arm64, arm, x86_64, and i386.
Tested-by: Linux Kernel Functional Testing lkft@linaro.org
## Build * kernel: 5.4.200-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-5.4.y * git commit: bc956dd0d885f095b41747a151ae0caa1b9dcdd4 * git describe: v5.4.199-241-gbc956dd0d885 * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.19...
## Test Regressions (compared to v5.4.196-11-g04a2bb5e4a0b) No test regressions found.
## Metric Regressions (compared to v5.4.196-11-g04a2bb5e4a0b) No metric regressions found.
## Test Fixes (compared to v5.4.196-11-g04a2bb5e4a0b) No test fixes found.
## Metric Fixes (compared to v5.4.196-11-g04a2bb5e4a0b) No metric fixes found.
## Test result summary total: 119849, pass: 106680, fail: 213, skip: 11709, xfail: 1247
## Build Summary * arc: 10 total, 10 passed, 0 failed * arm: 313 total, 313 passed, 0 failed * arm64: 57 total, 53 passed, 4 failed * i386: 28 total, 25 passed, 3 failed * mips: 37 total, 37 passed, 0 failed * parisc: 12 total, 12 passed, 0 failed * powerpc: 54 total, 54 passed, 0 failed * riscv: 27 total, 27 passed, 0 failed * s390: 12 total, 12 passed, 0 failed * sh: 24 total, 24 passed, 0 failed * sparc: 12 total, 12 passed, 0 failed * x86_64: 55 total, 54 passed, 1 failed
## Test suites summary * fwts * kunit * kvm-unit-tests * libgpiod * libhugetlbfs * log-parser-boot * log-parser-test * ltp-cap_bounds * ltp-cap_bounds-tests * ltp-commands * ltp-commands-tests * ltp-containers * ltp-containers-tests * ltp-controllers-tests * ltp-cpuhotplug-tests * ltp-crypto * ltp-crypto-tests * ltp-cve-tests * ltp-dio-tests * ltp-fcntl-locktests * ltp-fcntl-locktests-tests * ltp-filecaps * ltp-filecaps-tests * ltp-fs * ltp-fs-tests * ltp-fs_bind * ltp-fs_bind-tests * ltp-fs_perms_simple * ltp-fs_perms_simple-tests * ltp-fsx * ltp-fsx-tests * ltp-hugetlb * ltp-hugetlb-tests * ltp-io * ltp-io-tests * ltp-ipc * ltp-ipc-tests * ltp-math-tests * ltp-mm-tests * ltp-nptl * ltp-nptl-tests * ltp-open-posix-tests * ltp-pty * ltp-pty-tests * ltp-sched * ltp-sched-tests * ltp-securebits * ltp-securebits-tests * ltp-smoke * ltp-syscalls-tests * ltp-tracing-tests * network-basic-tests * packetdrill * perf * perf/Zstd-perf.data-compression * rcutorture * ssuite * v4l2-compliance * vdso
-- Linaro LKFT https://lkft.linaro.org
Hi Greg,
On Mon, Jun 20, 2022 at 02:48:21PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
Build test (gcc version 11.3.1 20220612): mips: 65 configs -> no failure arm: 106 configs -> no failure arm64: 2 configs -> no failure x86_64: 4 configs -> no failure alpha allmodconfig -> no failure powerpc allmodconfig -> no failure riscv allmodconfig -> no failure s390 allmodconfig -> no failure xtensa allmodconfig -> no failure
Boot test: x86_64: Booted on my test laptop. No regression. x86_64: Booted on qemu. No regression. [1]
[1]. https://openqa.qa.codethink.co.uk/tests/1360
Tested-by: Sudip Mukherjee sudip.mukherjee@codethink.co.uk
-- Regards Sudip
On Mon, 20 Jun 2022 14:48:21 +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
All tests passing for Tegra ...
Test results for stable-v5.4: 10 builds: 10 pass, 0 fail 26 boots: 26 pass, 0 fail 59 tests: 59 pass, 0 fail
Linux version: 5.4.200-rc1-gbc956dd0d885 Boards tested: tegra124-jetson-tk1, tegra186-p2771-0000, tegra194-p2972-0000, tegra20-ventana, tegra210-p2371-2180, tegra210-p3450-0000, tegra30-cardhu-a04
Tested-by: Jon Hunter jonathanh@nvidia.com
Jon
On 2022/6/20 20:48, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Tested on arm64 and x86 for 5.4.200-rc1,
Kernel repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git Branch: linux-5.4.y Version: 5.4.200-rc1 Commit: bc956dd0d885f095b41747a151ae0caa1b9dcdd4 Compiler: gcc version 7.3.0 (GCC)
arm64: -------------------------------------------------------------------- Testcase Result Summary: total: 9086 passed: 9086 failed: 0 timeout: 0 --------------------------------------------------------------------
x86: -------------------------------------------------------------------- Testcase Result Summary: total: 9086 passed: 9086 failed: 0 timeout: 0 --------------------------------------------------------------------
Tested-by: Hulk Robot hulkrobot@huawei.com
On Mon, Jun 20, 2022 at 02:48:21PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Pseudo-Shortlog of commits:
[ ... ]
Linus Torvalds torvalds@linux-foundation.org netfs: gcc-12: temporarily disable '-Wattribute-warning' for now
I am told that this commit breaks builds with clang. Maybe that is no concern for others, but we'll have to revert it when merging the release into ChromeOS.
Guenter
On Tue, Jun 21, 2022 at 06:36:27AM -0700, Guenter Roeck wrote:
On Mon, Jun 20, 2022 at 02:48:21PM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Pseudo-Shortlog of commits:
[ ... ]
Linus Torvalds torvalds@linux-foundation.org netfs: gcc-12: temporarily disable '-Wattribute-warning' for now
I am told that this commit breaks builds with clang. Maybe that is no concern for others, but we'll have to revert it when merging the release into ChromeOS.
I have now deleted it from all branches except for 5.18.y.
thanks,
greg k-h
On 6/20/22 6:48 AM, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.200 release. There are 240 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Wed, 22 Jun 2022 12:47:02 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.200-rc1... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Compiled and booted on my test system. No dmesg regressions.
Tested-by: Shuah Khan skhan@linuxfoundation.org
thanks, -- Shuah