Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp805418pxa; Wed, 5 Aug 2020 13:13:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxa+gorDSr8joER7cOB2Mz48/vDYehRmkqTyDVOCsuGcgQybSIrXYcoF4dEgK2+WCEJgtDR X-Received: by 2002:a05:6402:12d0:: with SMTP id k16mr981252edx.199.1596658402119; Wed, 05 Aug 2020 13:13:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596658402; cv=none; d=google.com; s=arc-20160816; b=g6ZuzONa5TZbrAoT+FHennoQ3IU9ExeEtVBl7CqtRvQnXrW/lrC55tHoFXaeSfXIPh BlKERdF9Ae4EUJAYLrUq9FObtngmoMrYI0F/j/Jt3BgmuEaDm3cqO+1EzeRLdyiJPn2L g+49eDlKWPEJVwJx3c1Cd2HhvMBg2hWekfFrXQVKGj/Qcrnr5CIX9r7+QMFRRMoyWWWc C2Bfk5oDxHbLkcsRKBOWmWP+gASoZdk0zPmhuFO7kKHPwpKglJFwqfSaRQXLh0AZzdEu czzutRDCI/cjQeH1mwvqlojsAHd8dM8EN8YC2oroS8/3eEy9wF4UDwhQk891R6uo5d8W PKew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dZp0Q2+HsKMcWf6aDgzJuqWI0QJphi1CMJobt8S3H+k=; b=Bh+SI56F97UWfaysx+TA1uGBgiCz7XuC0sMb+BPcJTyRKA4DdBCDqQ5EHQyr+5zSub YzBXi6n3QpnYClz4F7Fxu8pDqjsgg1ndSedxguPVPx+Iv5I2+VnT5G6ssmPa1puARzDq QWV2XKthtpfm/e8koNhOEm6hpvoUlp6AYWIw7+x9RuHKc1T2RLRArZQEx8nGb9yjLYvf dzTaES9S+FlRpL+gdJ4j7c8/Q3Ksi92ZhNgVUy9f4iW8kchkzAXvLIGoteFALbZsFD9U aSCvz66LXAYu/omxtC4MF60oG8QBKPCBT58HxAfdt4WQC4XHdAhgjK70R+WjGFXFQLWp jYCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ZB/3Nhzk"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d11si1750016edh.571.2020.08.05.13.12.59; Wed, 05 Aug 2020 13:13:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ZB/3Nhzk"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729014AbgHEUMv (ORCPT + 99 others); Wed, 5 Aug 2020 16:12:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:48910 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726276AbgHEQZe (ORCPT ); Wed, 5 Aug 2020 12:25:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 66D6A23380; Wed, 5 Aug 2020 15:52:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1596642768; bh=lRGvQiX1NE9fADubZkFmjLqelZvyaGRyN7GJQ68Un9s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZB/3NhzkPfNQEQ3ZbZdqjaGOopqwJxNmlTunod32263PUB+eo66fD7prn/1PkYaWm xR4QXo3mNWYuqyuhhyu1sgfZBIx20jHvaqlpg02fD19g01zZ8Xt6HuSgIcmCTZGe/W 3NjSgjEFOiKO/ubaP4erIpqbpbBfvduXDzpmEYDo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephen Rothwell , Emese Revfy , Kees Cook , Willy Tarreau , Linus Torvalds Subject: [PATCH 5.4 4/9] random32: remove net_rand_state from the latent entropy gcc plugin Date: Wed, 5 Aug 2020 17:52:41 +0200 Message-Id: <20200805153507.262787048@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200805153507.053638231@linuxfoundation.org> References: <20200805153507.053638231@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit 83bdc7275e6206f560d247be856bceba3e1ed8f2 upstream. It turns out that the plugin right now ends up being really unhappy about the change from 'static' to 'extern' storage that happened in commit f227e3ec3b5c ("random32: update the net random state on interrupt and activity"). This is probably a trivial fix for the latent_entropy plugin, but for now, just remove net_rand_state from the list of things the plugin worries about. Reported-by: Stephen Rothwell Cc: Emese Revfy Cc: Kees Cook Cc: Willy Tarreau Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- include/linux/random.h | 2 +- lib/random32.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) --- a/include/linux/random.h +++ b/include/linux/random.h @@ -118,7 +118,7 @@ struct rnd_state { __u32 s1, s2, s3, s4; }; -DECLARE_PER_CPU(struct rnd_state, net_rand_state) __latent_entropy; +DECLARE_PER_CPU(struct rnd_state, net_rand_state); u32 prandom_u32_state(struct rnd_state *state); void prandom_bytes_state(struct rnd_state *state, void *buf, size_t nbytes); --- a/lib/random32.c +++ b/lib/random32.c @@ -48,7 +48,7 @@ static inline void prandom_state_selftes } #endif -DEFINE_PER_CPU(struct rnd_state, net_rand_state) __latent_entropy; +DEFINE_PER_CPU(struct rnd_state, net_rand_state); /** * prandom_u32_state - seeded pseudo-random number generator.