From patchwork Mon Aug 10 17:53:15 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamal Mostafa X-Patchwork-Id: 1343021 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4BQNqY16qPz9sPB; Tue, 11 Aug 2020 03:53:29 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1k5BzA-0007G4-8Y; Mon, 10 Aug 2020 17:53:24 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1k5Bz8-0007Fj-DG for kernel-team@lists.ubuntu.com; Mon, 10 Aug 2020 17:53:22 +0000 Received: from 3.general.kamal.us.vpn ([10.172.68.53] helo=ascalon) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1k5Bz8-0008QL-0D for kernel-team@lists.ubuntu.com; Mon, 10 Aug 2020 17:53:22 +0000 Received: from kamal by ascalon with local (Exim 4.90_1) (envelope-from ) id 1k5Bz4-0005in-Lz for kernel-team@lists.ubuntu.com; Mon, 10 Aug 2020 10:53:18 -0700 From: Kamal Mostafa To: kernel-team@lists.ubuntu.com Subject: [SRU][Focal][PULL] Focal update: v5.4.57 upstream stable release Date: Mon, 10 Aug 2020 10:53:15 -0700 Message-Id: <20200810175315.21831-1-kamal@canonical.com> X-Mailer: git-send-email 2.17.1 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This pull request (11 commits) includes the following Focal stable patchsets: Focal update: v5.4.57 upstream stable release https://bugs.launchpad.net/bugs/1891064 Note also that the 'stable-next' branch head contains this and all prior pending upstream stable releases. I recommend fetching and applying just this reference ('stable-next') instead of each tags/focal-stable-v5.4.xx reference: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git stable-next -Kamal ----- The following changes since commit b00a6daea480ddeb5df5071069c83330fef2c7c5: UBUNTU: upstream stable to v5.4.56 (2020-08-10 08:51:57 -0700) are available in the Git repository at: git://kernel.ubuntu.com/ubuntu-stable/ubuntu-stable-focal.git tags/focal-stable-v5.4.57 for you to fetch changes up to 1317551a1fa30980a751cdb06ec29778227473fd: UBUNTU: upstream stable to v5.4.57 (2020-08-10 10:06:15 -0700) ---------------------------------------------------------------- Greg Kroah-Hartman (1): Linux 5.4.57 Grygorii Strashko (1): ARM: percpu.h: fix build error Jiang Ying (1): ext4: fix direct I/O read error Kamal Mostafa (1): UBUNTU: upstream stable to v5.4.57 Linus Torvalds (2): random32: remove net_rand_state from the latent entropy gcc plugin random32: move the pseudo-random 32-bit definitions to prandom.h Lorenz Bauer (2): selftests: bpf: Fix detach from sockmap tests bpf: sockmap: Require attach_bpf_fd when detaching a program Marc Zyngier (1): arm64: Workaround circular dependency in pointer_auth.h Willy Tarreau (2): random32: update the net random state on interrupt and activity random: fix circular include dependency on arm64 after addition of percpu.h Makefile | 2 +- arch/arm/include/asm/percpu.h | 2 + arch/arm64/include/asm/pointer_auth.h | 8 +++- debian.master/upstream-stable | 2 +- drivers/char/random.c | 1 + fs/ext4/inode.c | 5 +++ include/linux/bpf.h | 13 +++++- include/linux/prandom.h | 78 +++++++++++++++++++++++++++++++++ include/linux/random.h | 63 ++------------------------ include/linux/skmsg.h | 13 ++++++ kernel/bpf/syscall.c | 4 +- kernel/time/timer.c | 8 ++++ lib/random32.c | 2 +- net/core/sock_map.c | 50 ++++++++++++++++++--- tools/testing/selftests/bpf/test_maps.c | 12 ++--- 15 files changed, 185 insertions(+), 78 deletions(-) create mode 100644 include/linux/prandom.h