Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp799777pxa; Wed, 5 Aug 2020 13:05:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtYMwEPvXnten5618L1HETSNfDIur07x16r6T+7W3EQEyQcChmUNq6CuKR6OO7VeMhZXlu X-Received: by 2002:a17:906:d217:: with SMTP id w23mr1046600ejz.292.1596657914540; Wed, 05 Aug 2020 13:05:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596657914; cv=none; d=google.com; s=arc-20160816; b=fnOoF7Q4btkY5nPGdnhDFXDMNMywQpv0dfodX/g5wGXGvRfe7/u9X7vK6UekV/a7ya szrle0V4s5bRIUkQTAk+d/8FC5yxenyf6t5IrM8a/pmpEeKNZ8FSBNKY7L1vbxqMFez6 WVE62pzK8QxqOZE7apX1GMqcQ3yuVZoMTyMcBxvAlHqEhBS/5M57tVaVLnqJ5HCmXSru jbu2W5qHxkcVR+imwInBgmE/zeo+1u2qU7JiDZD6wyVhYJYVnCAdEY0eP0V7Dse0XRFE cr0WhNZH/mV0sO671N9jJi1oE3PUumZOKbh1ligM6rPNvD46TZmeNJO43OgUj35+UsZf 4TFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1OzFEsNRVuZ4p0CokN+pt6qUfCZGQv5GlkCRTdjD3vI=; b=DAJ4YnnmC0hDfxTX3QFMG1E2vsGU/6WPbHVlJ6R3hQe5zvXmoIJj36XseU+blZc8JI 0Gdd6Z+M0HyUe2Q3fzPXKAPSxylinE3EKpbdVkvMy8w/JTBNcZFpr9Cvia9e2RycKDVl hpWp9ZSAHTfbXGK+wRQoQLEvqSUSjmuz6dmtRbfv23qwbXPlPE+KG1Z5cJeoBiQ6Fj1w +CaUnrr5coJimdIr17M3mBicAPxTNBuvw2E73rdEcKpArLbw/+WlkchjmjIZwfochP+h ojCMIg5Pe/c4m5PG7w8rOP8FBhRo6KE8odBXpxvV0XUd9n0Xd14r8am//XUHN05k2AMX XvRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KdltBeSS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bj23si1900189ejb.94.2020.08.05.13.04.51; Wed, 05 Aug 2020 13:05:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KdltBeSS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727897AbgHEUEc (ORCPT + 99 others); Wed, 5 Aug 2020 16:04:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:50660 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727807AbgHEQgh (ORCPT ); Wed, 5 Aug 2020 12:36:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9663F233F8; Wed, 5 Aug 2020 15:53:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1596642819; bh=szKyfdCf1Jf/SkG9ybiPLg0SInDIfcKuTeM+JmnJMz0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KdltBeSS97D5QFBcrBS7GNA9LF+6Ql3eyMCNWFFBgvh8W46mXMEinNNrePvsdjVr0 Ilc29OfbuD4pbsH6b73FmUpEB3pVdXf4KYSKDSyb66ZakmrmU5ZGHUCUUMSJ8Q+0BV JGyswoe7E9fc/JzMdWtyV1Jzr9iOl+XdWuAdAjaI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephen Rothwell , Emese Revfy , Kees Cook , Willy Tarreau , Linus Torvalds Subject: [PATCH 4.14 5/8] random32: remove net_rand_state from the latent entropy gcc plugin Date: Wed, 5 Aug 2020 17:53:31 +0200 Message-Id: <20200805153507.254999876@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200805153507.005753845@linuxfoundation.org> References: <20200805153507.005753845@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit 83bdc7275e6206f560d247be856bceba3e1ed8f2 upstream. It turns out that the plugin right now ends up being really unhappy about the change from 'static' to 'extern' storage that happened in commit f227e3ec3b5c ("random32: update the net random state on interrupt and activity"). This is probably a trivial fix for the latent_entropy plugin, but for now, just remove net_rand_state from the list of things the plugin worries about. Reported-by: Stephen Rothwell Cc: Emese Revfy Cc: Kees Cook Cc: Willy Tarreau Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- include/linux/random.h | 2 +- lib/random32.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) --- a/include/linux/random.h +++ b/include/linux/random.h @@ -117,7 +117,7 @@ struct rnd_state { __u32 s1, s2, s3, s4; }; -DECLARE_PER_CPU(struct rnd_state, net_rand_state) __latent_entropy; +DECLARE_PER_CPU(struct rnd_state, net_rand_state); u32 prandom_u32_state(struct rnd_state *state); void prandom_bytes_state(struct rnd_state *state, void *buf, size_t nbytes); --- a/lib/random32.c +++ b/lib/random32.c @@ -48,7 +48,7 @@ static inline void prandom_state_selftes } #endif -DEFINE_PER_CPU(struct rnd_state, net_rand_state) __latent_entropy; +DEFINE_PER_CPU(struct rnd_state, net_rand_state); /** * prandom_u32_state - seeded pseudo-random number generator.