Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3389488pxk; Mon, 5 Oct 2020 08:30:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJywar3972sgsS+kV7ap3LiY/W9GHi3mbW6uAptN2KKrsM83XeiJrzA907YDNGK/JHP3zqAb X-Received: by 2002:aa7:c746:: with SMTP id c6mr141748eds.221.1601911810545; Mon, 05 Oct 2020 08:30:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601911810; cv=none; d=google.com; s=arc-20160816; b=H9SnIFvAEhlVTD65gY6NOIHafNLr3DCkjc/XgCuk3EXYSNf3Tsy/p+aoHwogVFF2C9 cc+Wq55Y7SR3FIhSPQ5FPREvcOEPfC6aOlpVZgPFdgSa5bHPeb2bEwIhibz3e3wRgM96 sJn6nIPivp3f/VcybTYOPbZzKS/genbBWpDUfSQo5B6jMPvTN4ymA9kq/hOQjFKY25vu tiQj7UxqMC88emW5eXxTtsBvc9qeLCqyRBlPvedL0ND0MGswvAQjICLrTIhr0zT2EToM DO8P6qGjQ4RHBCCkZup0HZ/dORKI5sjwmaEwrN051uQkRCkj50IUjbJv/f97h9w11+AG neyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FUey6tNIOtEsNZd/trCVSXauBVcj5fTGLxHID6E6I3o=; b=OxSbgV7bbKHkVB6VGDPJTgwt7tsOSguyTi714T1vQj6qXwInf2x78fHUEcsIMbuLMd T4/EsYU8Aj4V2MnIRSF4Q1zIA5fKUhhYSzN3yOqgOl2ScLHEm8ox/gTXMtcBwDlrAsS6 +gt9V+Bi1YqG3brnuzEqxgTlRROXW0trvO3J4eXpdZwgJlxkpcitUTyTRKLbColDGNU5 xXDI2ac9PeP7amfaxXbkrh/yf+W0NEfKwBxLfXGKaW3NHXTLcswjowXakDk/dlqyrqiR SYR7YFfLdpA6wUjMhZyUJralyJNezFn/V7Sa4jklQI9rqkyjjn5sGVq+LoF1t4Q0b1VW 2JkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RUYkNKy2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f4si7230311ejt.278.2020.10.05.08.29.46; Mon, 05 Oct 2020 08:30:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RUYkNKy2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727333AbgJEP2E (ORCPT + 99 others); Mon, 5 Oct 2020 11:28:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:52504 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727227AbgJEP1s (ORCPT ); Mon, 5 Oct 2020 11:27:48 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9DB25207BC; Mon, 5 Oct 2020 15:27:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601911667; bh=uiNqTYDURgLGySXhEc28Mgra9vdGHTQiyoSaglBcKxk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RUYkNKy2aUbxRuVHqK1Gcv97WTv7ieo1cbiNFvwHXHSD4QC7bHd+xxG96ejYMR0cs b6evMK/24CoAU5xq7TYH6oBNhQPbvtH1/1Uji72BsXSDgs29vUK134E2DNekudv0PS tyvHVds2DJaU5z4LsjQj7osP/zZ6z9f7C0SyON5Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Willy Tarreau , Emese Revfy , Thibaut Sautereau , Linus Torvalds , Sasha Levin Subject: [PATCH 4.19 30/38] random32: Restore __latent_entropy attribute on net_rand_state Date: Mon, 5 Oct 2020 17:26:47 +0200 Message-Id: <20201005142110.124077096@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201005142108.650363140@linuxfoundation.org> References: <20201005142108.650363140@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thibaut Sautereau [ Upstream commit 09a6b0bc3be793ca8cba580b7992d73e9f68f15d ] Commit f227e3ec3b5c ("random32: update the net random state on interrupt and activity") broke compilation and was temporarily fixed by Linus in 83bdc7275e62 ("random32: remove net_rand_state from the latent entropy gcc plugin") by entirely moving net_rand_state out of the things handled by the latent_entropy GCC plugin. >From what I understand when reading the plugin code, using the __latent_entropy attribute on a declaration was the wrong part and simply keeping the __latent_entropy attribute on the variable definition was the correct fix. Fixes: 83bdc7275e62 ("random32: remove net_rand_state from the latent entropy gcc plugin") Acked-by: Willy Tarreau Cc: Emese Revfy Signed-off-by: Thibaut Sautereau Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/random32.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/random32.c b/lib/random32.c index 036de0c93e224..b6f3325e38e43 100644 --- a/lib/random32.c +++ b/lib/random32.c @@ -48,7 +48,7 @@ static inline void prandom_state_selftest(void) } #endif -DEFINE_PER_CPU(struct rnd_state, net_rand_state); +DEFINE_PER_CPU(struct rnd_state, net_rand_state) __latent_entropy; /** * prandom_u32_state - seeded pseudo-random number generator. -- 2.25.1