Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp797402pxa; Wed, 5 Aug 2020 13:02:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyWnc87/7ewdXDNrG24RZ3hL4SBQx8xQe0/i1yMBe72JA5qGGjiwJgoCb4D8I5jR2z2WLv8 X-Received: by 2002:a05:6402:c81:: with SMTP id cm1mr914202edb.256.1596657739231; Wed, 05 Aug 2020 13:02:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596657739; cv=none; d=google.com; s=arc-20160816; b=gMBOMcVbPw9Z7X5szne0bfiS1x6P3d06a20VUwD9c87ANt401c+D2USj/SrR77D3GL ZiSFco7MCfpz3AV7uLhLRYMY8BtH10tMEQqkUe3vMBXqUigdVEFEQdHl5S9FFnTowXVV +8Ry6li12znvIXb9FcDRFVqqCGafMV7kTgsAItVZ17EFeiSkM89Z4tuKTc9OsYlcK5CZ +ROOl/d+Z/zOI0uEp+2DHb6/Pk+6kZWV3zpe38ehp47ZNPsf5PisuDFAqEvNH8NKwpQg XqymI/ZCVjakcvPv9k7CJqSJXy+lmMfYaXsAXbFSfv9oQ//p4ua7zB9M+oC0mdfLThCR hAXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:user-agent :mime-version:message-id:date:subject:cc:to:from:dkim-signature; bh=tUc0gmSNZGNbFbt6Af7rMPqlw6FckMt1idYeva9PeoE=; b=ArzP+iGMhZ4W55DOAK7GIAyd0xdoFhWS2V3Dho7lXoJGjkXigHfQS/zQ+V8kIxJBU6 6srTDykS3mwgoQ2hK5F6UKvxK6SHUt+xA3wBdyriT6X55MTcLQHlBfMnN/AjFQqp24nW rPczlX8DTHn5TxZDq53SmBh+uLlPX0PZ3+8sKjBTxIzFRtUp/eQccM8t5PZmiYPcPu5A 3xJzf7oUfGrjDQ6/vTnMW9IoacRfPTB0Qro8+jFsRb4WvMmpCzMrlNfKfDROCh5XmpAx Aua5PYW4QFtpl4irAh1FZTLhvuSb1rhe38BIHPCBe7AyaddY7xBgml6guuRMqFq6W97K AlKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=s4JZgkbr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a92si1824290edf.509.2020.08.05.13.01.56; Wed, 05 Aug 2020 13:02:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=s4JZgkbr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728248AbgHET7T (ORCPT + 99 others); Wed, 5 Aug 2020 15:59:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:40238 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727791AbgHET7R (ORCPT ); Wed, 5 Aug 2020 15:59:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D643320842; Wed, 5 Aug 2020 19:59:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1596657557; bh=NqqjDQMRilzAdD7UPU03j2iNb8NGkE/19Y0RHoqcz6U=; h=From:To:Cc:Subject:Date:From; b=s4JZgkbrDrXzFR7AF2Xnqbs6Z7UGlQfMZzgq+Tvj+qs1oGYl/GgPTP/HBvQ9WpdW9 /NstMv7W5yf5RuTWoQ13cRHrurjLSXNyq4klOhHIxH3Ha8/INecpHxTkzTRJVmeQUO FD9k51RCAXX6yZ54RIzQIxyWl4xPY/vJS734vzvQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: [PATCH 5.7 0/7] 5.7.14-rc2 review Date: Wed, 5 Aug 2020 21:59:33 +0200 Message-Id: <20200805195916.183355405@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-5.7.14-rc2.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.14-rc2 X-KernelTest-Deadline: 2020-08-07T19:59+00:00 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the start of the stable review cycle for the 5.7.14 release. There are 7 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri, 07 Aug 2020 19:59:06 +0000. Anything received after that time might be too late. The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.14-rc2.gz or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.7.y and the diffstat can be found below. thanks, greg k-h ------------- Pseudo-Shortlog of commits: Greg Kroah-Hartman Linux 5.7.14-rc2 Linus Torvalds random: random.h should include archrandom.h, not the other way around Marc Zyngier arm64: Workaround circular dependency in pointer_auth.h Linus Torvalds random32: move the pseudo-random 32-bit definitions to prandom.h Linus Torvalds random32: remove net_rand_state from the latent entropy gcc plugin Willy Tarreau random: fix circular include dependency on arm64 after addition of percpu.h Grygorii Strashko ARM: percpu.h: fix build error Willy Tarreau random32: update the net random state on interrupt and activity ------------- Diffstat: Makefile | 4 +- arch/arm/include/asm/percpu.h | 2 + arch/arm64/include/asm/archrandom.h | 1 - arch/arm64/include/asm/pointer_auth.h | 8 +++- arch/arm64/kernel/kaslr.c | 2 +- drivers/char/random.c | 1 + include/linux/prandom.h | 78 +++++++++++++++++++++++++++++++++++ include/linux/random.h | 63 ++-------------------------- kernel/time/timer.c | 8 ++++ lib/random32.c | 2 +- 10 files changed, 104 insertions(+), 65 deletions(-)