From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8F94C433FE for ; Fri, 27 May 2022 08:51:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349937AbiE0IvD (ORCPT ); Fri, 27 May 2022 04:51:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57020 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245159AbiE0Iu7 (ORCPT ); Fri, 27 May 2022 04:50:59 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2220CF135A; Fri, 27 May 2022 01:50:58 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 4EA35CE237A; Fri, 27 May 2022 08:50:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E2F62C385A9; Fri, 27 May 2022 08:50:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653641454; bh=ofUkXB5eZZpMIZpuuB99JHmCx+kH//clxwl3lJYJ2T0=; h=From:To:Cc:Subject:Date:From; b=Y6F1vKf3W+i4/HpCa1QWWMjAs1z/xWe75ZrJUWckuklyLvN5AGZA2eRKBEmpAMG1I C83BAtIFjxn0PBCRdIq89SSn7Ad1zH+mByWLxrKE43bFKyaTMKjrrs9tntQn08k7gd yZLcwnH1CRt/eDWCXBF2WDOrg0dCs3hZtNWBz6j4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, slade@sladewatkins.com Subject: [PATCH 5.17 000/111] 5.17.12-rc1 review Date: Fri, 27 May 2022 10:48:32 +0200 Message-Id: <20220527084819.133490171@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.17.12-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.17.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.17.12-rc1 X-KernelTest-Deadline: 2022-05-29T08:48+00:00 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 5.17.12 release. There are 111 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Sun, 29 May 2022 08:46:36 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.17.12-rc1.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.17.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.17.12-rc1 Edward Matijevic ALSA: ctxfi: Add SB046x PCI ID Lorenzo Pieralisi ACPI: sysfs: Fix BERT error region memory mapping Jason A. Donenfeld random: check for signals after page of pool writes Jens Axboe random: wire up fops->splice_{read,write}_iter() Jens Axboe random: convert to using fops->write_iter() Jens Axboe random: convert to using fops->read_iter() Jason A. Donenfeld random: unify batched entropy implementations Jason A. Donenfeld random: move randomize_page() into mm where it belongs Jason A. Donenfeld random: move initialization functions out of hot pages Jason A. Donenfeld random: make consistent use of buf and len Jason A. Donenfeld random: use proper return types on get_random_{int,long}_wait() Jason A. Donenfeld random: remove extern from functions in header Jason A. Donenfeld random: use static branch for crng_ready() Jason A. Donenfeld random: credit architectural init the exact amount Jason A. Donenfeld random: handle latent entropy and command line from random_init() Jason A. Donenfeld random: use proper jiffies comparison macro Jason A. Donenfeld random: remove ratelimiting for in-kernel unseeded randomness Jason A. Donenfeld random: move initialization out of reseeding hot path Jason A. Donenfeld random: avoid initializing twice in credit race Jason A. Donenfeld random: use symbolic constants for crng_init states Jason A. Donenfeld siphash: use one source of truth for siphash permutations Jason A. Donenfeld random: help compiler out with fast_mix() by using simpler arguments Jason A. Donenfeld random: do not use input pool from hard IRQs Jason A. Donenfeld random: order timer entropy functions below interrupt functions Jason A. Donenfeld random: do not pretend to handle premature next security model Jason A. Donenfeld random: use first 128 bits of input as fast init Jason A. Donenfeld random: do not use batches when !crng_ready() Jason A. Donenfeld random: insist on random_get_entropy() existing in order to simplify Jason A. Donenfeld xtensa: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld sparc: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld um: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld x86/tsc: Use fallback for random_get_entropy() instead of zero Jason A. Donenfeld nios2: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld arm: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld mips: use fallback for random_get_entropy() instead of just c0 random Jason A. Donenfeld riscv: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld m68k: use fallback for random_get_entropy() instead of zero Jason A. Donenfeld timekeeping: Add raw clock fallback for random_get_entropy() Jason A. Donenfeld powerpc: define get_cycles macro for arch-override Jason A. Donenfeld alpha: define get_cycles macro for arch-override Jason A. Donenfeld parisc: define get_cycles macro for arch-override Jason A. Donenfeld s390: define get_cycles macro for arch-override Jason A. Donenfeld ia64: define get_cycles macro for arch-override Jason A. Donenfeld init: call time_init() before rand_initialize() Jason A. Donenfeld random: fix sysctl documentation nits Jason A. Donenfeld random: document crng_fast_key_erasure() destination possibility Jason A. Donenfeld random: make random_get_entropy() return an unsigned long Jason A. Donenfeld random: allow partial reads if later user copies fail Jason A. Donenfeld random: check for signals every PAGE_SIZE chunk of /dev/[u]random Jann Horn random: check for signal_pending() outside of need_resched() check Jason A. Donenfeld random: do not allow user to keep crng key around on stack Jan Varho random: do not split fast init input in add_hwgenerator_randomness() Jason A. Donenfeld random: mix build-time latent entropy into pool at init Jason A. Donenfeld random: re-add removed comment about get_random_{u32,u64} reseeding Jason A. Donenfeld random: treat bootloader trust toggle the same way as cpu trust toggle Jason A. Donenfeld random: skip fast_init if hwrng provides large chunk of entropy Jason A. Donenfeld random: check for signal and try earlier when generating entropy Jason A. Donenfeld random: reseed more often immediately after booting Jason A. Donenfeld random: make consistent usage of crng_ready() Jason A. Donenfeld random: use SipHash as interrupt entropy accumulator Jason A. Donenfeld random: replace custom notifier chain with standard one Jason A. Donenfeld random: don't let 644 read-only sysctls be written to Jason A. Donenfeld random: give sysctl_random_min_urandom_seed a more sensible value Jason A. Donenfeld random: do crng pre-init loading in worker rather than irq Jason A. Donenfeld random: unify cycles_t and jiffies usage and types Jason A. Donenfeld random: cleanup UUID handling Jason A. Donenfeld random: only wake up writers after zap if threshold was passed Jason A. Donenfeld random: round-robin registers as ulong, not u32 Jason A. Donenfeld random: clear fast pool, crng, and batches in cpuhp bring up Jason A. Donenfeld random: pull add_hwgenerator_randomness() declaration into random.h Jason A. Donenfeld random: check for crng_init == 0 in add_device_randomness() Jason A. Donenfeld random: unify early init crng load accounting Jason A. Donenfeld random: do not take pool spinlock at boot Jason A. Donenfeld random: defer fast pool mixing to worker Jason A. Donenfeld random: rewrite header introductory comment Jason A. Donenfeld random: group sysctl functions Jason A. Donenfeld random: group userspace read/write functions Jason A. Donenfeld random: group entropy collection functions Jason A. Donenfeld random: group entropy extraction functions Jason A. Donenfeld random: group crng functions Jason A. Donenfeld random: group initialization wait functions Jason A. Donenfeld random: remove whitespace and reorder includes Jason A. Donenfeld random: remove useless header comment Jason A. Donenfeld random: introduce drain_entropy() helper to declutter crng_reseed() Jason A. Donenfeld random: deobfuscate irq u32/u64 contributions Jason A. Donenfeld random: add proper SPDX header Jason A. Donenfeld random: remove unused tracepoints Jason A. Donenfeld random: remove ifdef'd out interrupt bench Jason A. Donenfeld random: tie batched entropy generation to base_crng generation Dominik Brodowski random: fix locking for crng_init in crng_reseed() Jason A. Donenfeld random: zero buffer after reading entropy from userspace Jason A. Donenfeld random: remove outdated INT_MAX >> 6 check in urandom_read() Jason A. Donenfeld random: make more consistent use of integer types Jason A. Donenfeld random: use hash function for crng_slow_load() Jason A. Donenfeld random: use simpler fast key erasure flow on per-cpu keys Jason A. Donenfeld random: absorb fast pool into input pool after fast load Jason A. Donenfeld random: do not xor RDRAND when writing into /dev/random Jason A. Donenfeld random: ensure early RDSEED goes through mixer on init Jason A. Donenfeld random: inline leaves of rand_initialize() Jason A. Donenfeld random: get rid of secondary crngs Jason A. Donenfeld random: use RDSEED instead of RDRAND in entropy extraction Dominik Brodowski random: fix locking in crng_fast_load() Jason A. Donenfeld random: remove batched entropy locking Eric Biggers random: remove use_input_pool parameter from crng_reseed() Jason A. Donenfeld random: make credit_entropy_bits() always safe Jason A. Donenfeld random: always wake up entropy writers after extraction Jason A. Donenfeld random: use linear min-entropy accumulation crediting Jason A. Donenfeld random: simplify entropy debiting Jason A. Donenfeld random: use computational hash for entropy extraction Paolo Bonzini KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID Basavaraj Natikar HID: amd_sfh: Add support for sensor discovery ------------- Diffstat: Documentation/admin-guide/kernel-parameters.txt | 6 + Documentation/admin-guide/sysctl/kernel.rst | 22 +- Makefile | 4 +- arch/alpha/include/asm/timex.h | 1 + arch/arm/include/asm/timex.h | 1 + arch/ia64/include/asm/timex.h | 1 + arch/m68k/include/asm/timex.h | 2 +- arch/mips/include/asm/timex.h | 17 +- arch/nios2/include/asm/timex.h | 3 + arch/parisc/include/asm/timex.h | 3 +- arch/powerpc/include/asm/timex.h | 1 + arch/riscv/include/asm/timex.h | 2 +- arch/s390/include/asm/timex.h | 1 + arch/sparc/include/asm/timex_32.h | 4 +- arch/um/include/asm/timex.h | 9 +- arch/x86/include/asm/timex.h | 9 + arch/x86/include/asm/tsc.h | 7 +- arch/x86/kvm/mmu/mmu.c | 6 +- arch/xtensa/include/asm/timex.h | 6 +- drivers/acpi/sysfs.c | 25 +- drivers/char/Kconfig | 3 +- drivers/char/hw_random/core.c | 1 + drivers/char/random.c | 2868 +++++++++-------------- drivers/hid/amd-sfh-hid/amd_sfh_client.c | 11 + drivers/hid/amd-sfh-hid/amd_sfh_pcie.c | 7 + drivers/hid/amd-sfh-hid/amd_sfh_pcie.h | 4 + include/linux/cpuhotplug.h | 2 + include/linux/hw_random.h | 2 - include/linux/mm.h | 1 + include/linux/prandom.h | 23 +- include/linux/random.h | 100 +- include/linux/siphash.h | 28 + include/linux/timex.h | 10 +- include/trace/events/random.h | 233 -- init/main.c | 13 +- kernel/cpu.c | 11 + kernel/time/timekeeping.c | 15 + lib/Kconfig.debug | 3 +- lib/random32.c | 14 +- lib/siphash.c | 32 +- lib/vsprintf.c | 10 +- mm/util.c | 32 + sound/pci/ctxfi/ctatc.c | 2 + sound/pci/ctxfi/cthardware.h | 3 +- 44 files changed, 1365 insertions(+), 2193 deletions(-)