APPLIED: [SRU][Jammy][PULL] Jammy update: v5.15.44 upstream stable release
Stefan Bader
stefan.bader at canonical.com
Mon Aug 1 13:34:36 UTC 2022
On 14.07.22 01:23, Kamal Mostafa wrote:
> This pull request (148 commits) includes the following Jammy stable patchsets:
>
> Jammy update: v5.15.44 upstream stable release
> https://bugs.launchpad.net/bugs/1981649
>
> Note also that the 'stable-next' branch head contains this and all prior
> pending upstream stable releases. I recommend fetching and applying just this
> reference ('stable-next') instead of each tags/jammy-stable-v5.15.xx reference:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/jammy stable-next
>
> -Kamal
>
> -----
>
> The following changes since commit d659ebd8c884f726a680cb890bd216cf4ba2fa71:
>
> UBUNTU: Upstream stable to v5.15.43 (2022-07-12 09:43:09 -0700)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/jammy tags/jammy-stable-v5.15.44
>
> for you to fetch changes up to 9079b36d975b8eb911751aa86cd9ec89002dff5d:
>
> UBUNTU: Upstream stable to v5.15.44 (2022-07-13 16:18:10 -0700)
>
> ----------------------------------------------------------------
> Dominik Brodowski (7):
> random: harmonize "crng init done" messages
> random: early initialization of ChaCha constants
> random: continually use hwgenerator randomness
> random: access primary_pool directly rather than through pointer
> random: only call crng_finalize_init() for primary_crng
> random: fix locking in crng_fast_load()
> random: fix locking for crng_init in crng_reseed()
>
> Edward Matijevic (1):
> ALSA: ctxfi: Add SB046x PCI ID
>
> Eric Biggers (1):
> random: remove use_input_pool parameter from crng_reseed()
>
> Greg Kroah-Hartman (1):
> Linux 5.15.44
>
> Jan Varho (1):
> random: do not split fast init input in add_hwgenerator_randomness()
>
> Jann Horn (2):
> random: don't reset crng_init_cnt on urandom_read()
> random: check for signal_pending() outside of need_resched() check
>
> Jason A. Donenfeld (124):
> MAINTAINERS: co-maintain random.c
> MAINTAINERS: add git tree for random.c
> lib/crypto: blake2s: include as built-in
> lib/crypto: blake2s: move hmac construction into wireguard
> lib/crypto: sha1: re-roll loops to reduce code size
> lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI
> random: use BLAKE2s instead of SHA1 in extraction
> random: do not sign extend bytes for rotation when mixing
> random: do not re-init if crng_reseed completes before primary init
> random: mix bootloader randomness into pool
> random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
> random: avoid superfluous call to RDRAND in CRNG extraction
> random: cleanup poolinfo abstraction
> random: cleanup integer types
> random: remove incomplete last_data logic
> random: remove unused extract_entropy() reserved argument
> random: rather than entropy_store abstraction, use global
> random: remove unused OUTPUT_POOL constants
> random: de-duplicate INPUT_POOL constants
> random: prepend remaining pool constants with POOL_
> random: cleanup fractional entropy shift constants
> random: access input_pool_data directly rather than through pointer
> random: selectively clang-format where it makes sense
> random: simplify arithmetic function flow in account()
> random: use computational hash for entropy extraction
> random: simplify entropy debiting
> random: use linear min-entropy accumulation crediting
> random: always wake up entropy writers after extraction
> random: make credit_entropy_bits() always safe
> random: remove batched entropy locking
> random: use RDSEED instead of RDRAND in entropy extraction
> random: get rid of secondary crngs
> random: inline leaves of rand_initialize()
> random: ensure early RDSEED goes through mixer on init
> random: do not xor RDRAND when writing into /dev/random
> random: absorb fast pool into input pool after fast load
> random: use simpler fast key erasure flow on per-cpu keys
> random: use hash function for crng_slow_load()
> random: make more consistent use of integer types
> random: remove outdated INT_MAX >> 6 check in urandom_read()
> random: zero buffer after reading entropy from userspace
> random: tie batched entropy generation to base_crng generation
> random: remove ifdef'd out interrupt bench
> random: remove unused tracepoints
> random: add proper SPDX header
> random: deobfuscate irq u32/u64 contributions
> random: introduce drain_entropy() helper to declutter crng_reseed()
> random: remove useless header comment
> random: remove whitespace and reorder includes
> random: group initialization wait functions
> random: group crng functions
> random: group entropy extraction functions
> random: group entropy collection functions
> random: group userspace read/write functions
> random: group sysctl functions
> random: rewrite header introductory comment
> random: defer fast pool mixing to worker
> random: do not take pool spinlock at boot
> random: unify early init crng load accounting
> random: check for crng_init == 0 in add_device_randomness()
> random: pull add_hwgenerator_randomness() declaration into random.h
> random: clear fast pool, crng, and batches in cpuhp bring up
> random: round-robin registers as ulong, not u32
> random: only wake up writers after zap if threshold was passed
> random: cleanup UUID handling
> random: unify cycles_t and jiffies usage and types
> random: do crng pre-init loading in worker rather than irq
> random: give sysctl_random_min_urandom_seed a more sensible value
> random: don't let 644 read-only sysctls be written to
> random: replace custom notifier chain with standard one
> random: use SipHash as interrupt entropy accumulator
> random: make consistent usage of crng_ready()
> random: reseed more often immediately after booting
> random: check for signal and try earlier when generating entropy
> random: skip fast_init if hwrng provides large chunk of entropy
> random: treat bootloader trust toggle the same way as cpu trust toggle
> random: re-add removed comment about get_random_{u32,u64} reseeding
> random: mix build-time latent entropy into pool at init
> random: do not allow user to keep crng key around on stack
> random: check for signals every PAGE_SIZE chunk of /dev/[u]random
> random: allow partial reads if later user copies fail
> random: make random_get_entropy() return an unsigned long
> random: document crng_fast_key_erasure() destination possibility
> random: fix sysctl documentation nits
> init: call time_init() before rand_initialize()
> ia64: define get_cycles macro for arch-override
> s390: define get_cycles macro for arch-override
> parisc: define get_cycles macro for arch-override
> alpha: define get_cycles macro for arch-override
> powerpc: define get_cycles macro for arch-override
> timekeeping: Add raw clock fallback for random_get_entropy()
> m68k: use fallback for random_get_entropy() instead of zero
> riscv: use fallback for random_get_entropy() instead of zero
> mips: use fallback for random_get_entropy() instead of just c0 random
> arm: use fallback for random_get_entropy() instead of zero
> nios2: use fallback for random_get_entropy() instead of zero
> x86/tsc: Use fallback for random_get_entropy() instead of zero
> um: use fallback for random_get_entropy() instead of zero
> sparc: use fallback for random_get_entropy() instead of zero
> xtensa: use fallback for random_get_entropy() instead of zero
> random: insist on random_get_entropy() existing in order to simplify
> random: do not use batches when !crng_ready()
> random: use first 128 bits of input as fast init
> random: do not pretend to handle premature next security model
> random: order timer entropy functions below interrupt functions
> random: do not use input pool from hard IRQs
> random: help compiler out with fast_mix() by using simpler arguments
> siphash: use one source of truth for siphash permutations
> random: use symbolic constants for crng_init states
> random: avoid initializing twice in credit race
> random: move initialization out of reseeding hot path
> random: remove ratelimiting for in-kernel unseeded randomness
> random: use proper jiffies comparison macro
> random: handle latent entropy and command line from random_init()
> random: credit architectural init the exact amount
> random: use static branch for crng_ready()
> random: remove extern from functions in header
> random: use proper return types on get_random_{int,long}_wait()
> random: make consistent use of buf and len
> random: move initialization functions out of hot pages
> random: move randomize_page() into mm where it belongs
> random: unify batched entropy implementations
> random: check for signals after page of pool writes
> Revert "random: use static branch for crng_ready()"
>
> Jens Axboe (3):
> random: convert to using fops->read_iter()
> random: convert to using fops->write_iter()
> random: wire up fops->splice_{read,write}_iter()
>
> Kamal Mostafa (3):
> Revert "UBUNTU: SAUCE: random: Make getrandom() ready earlier"
> UBUNTU: [Config] updateconfigs for CRYPTO_LIB_BLAKE2S
> UBUNTU: Upstream stable to v5.15.44
>
> Lorenzo Pieralisi (1):
> ACPI: sysfs: Fix BERT error region memory mapping
>
> Magnus Karlsson (1):
> ice: fix crash at allocation failure
>
> Mark Brown (1):
> random: document add_hwgenerator_randomness() with other input functions
>
> Schspa Shi (1):
> random: fix typo in comments
>
> Sebastian Andrzej Siewior (1):
> random: remove unused irq_flags argument from add_interrupt_randomness()
>
> Documentation/admin-guide/kernel-parameters.txt | 6 +
> Documentation/admin-guide/sysctl/kernel.rst | 22 +-
> MAINTAINERS | 2 +
> Makefile | 2 +-
> arch/alpha/include/asm/timex.h | 1 +
> arch/arm/crypto/Makefile | 4 +-
> arch/arm/crypto/blake2s-core.S | 8 +-
> arch/arm/crypto/blake2s-glue.c | 73 +-
> arch/arm/crypto/blake2s-shash.c | 75 +
> arch/arm/include/asm/timex.h | 1 +
> arch/ia64/include/asm/timex.h | 1 +
> arch/m68k/include/asm/timex.h | 2 +-
> arch/mips/include/asm/timex.h | 17 +-
> arch/nios2/include/asm/timex.h | 3 +
> arch/parisc/include/asm/timex.h | 3 +-
> arch/powerpc/include/asm/timex.h | 1 +
> arch/riscv/include/asm/timex.h | 2 +-
> arch/s390/include/asm/timex.h | 1 +
> arch/sparc/include/asm/timex_32.h | 4 +-
> arch/um/include/asm/timex.h | 9 +-
> arch/x86/crypto/Makefile | 4 +-
> arch/x86/crypto/blake2s-glue.c | 68 +-
> arch/x86/crypto/blake2s-shash.c | 77 +
> arch/x86/include/asm/timex.h | 9 +
> arch/x86/include/asm/tsc.h | 7 +-
> arch/x86/kernel/cpu/mshyperv.c | 2 +-
> arch/xtensa/include/asm/timex.h | 6 +-
> crypto/Kconfig | 3 +-
> crypto/blake2s_generic.c | 4 +-
> crypto/drbg.c | 17 +-
> debian.master/abi/amd64/generic.modules | 1 -
> debian.master/abi/arm64/generic-64k.modules | 1 -
> debian.master/abi/arm64/generic.modules | 1 -
> debian.master/abi/armhf/generic-lpae.modules | 1 -
> debian.master/abi/armhf/generic.modules | 1 -
> debian.master/abi/ppc64el/generic.modules | 1 -
> debian.master/abi/s390x/generic.modules | 1 -
> debian.master/config/annotations | 1 -
> debian.master/config/config.common.ubuntu | 5 +-
> debian.master/upstream-stable | 2 +-
> drivers/acpi/sysfs.c | 25 +-
> drivers/char/Kconfig | 3 +-
> drivers/char/hw_random/core.c | 1 +
> drivers/char/random.c | 3003 +++++++++--------------
> drivers/hv/vmbus_drv.c | 2 +-
> drivers/net/Kconfig | 1 -
> drivers/net/ethernet/intel/ice/ice_xsk.c | 2 +-
> drivers/net/wireguard/noise.c | 45 +-
> include/crypto/blake2s.h | 3 -
> include/crypto/chacha.h | 15 +-
> include/crypto/drbg.h | 2 +-
> include/crypto/internal/blake2s.h | 46 +-
> include/linux/cpuhotplug.h | 2 +
> include/linux/hw_random.h | 2 -
> include/linux/mm.h | 1 +
> include/linux/prandom.h | 23 +-
> include/linux/random.h | 100 +-
> include/linux/siphash.h | 28 +
> include/linux/timex.h | 10 +-
> include/trace/events/random.h | 247 --
> init/main.c | 13 +-
> kernel/cpu.c | 11 +
> kernel/irq/handle.c | 2 +-
> kernel/time/timekeeping.c | 15 +
> lib/Kconfig.debug | 3 +-
> lib/crypto/Kconfig | 23 +-
> lib/crypto/Makefile | 9 +-
> lib/crypto/blake2s-generic.c | 6 +-
> lib/crypto/blake2s-selftest.c | 31 -
> lib/crypto/blake2s.c | 47 +-
> lib/random32.c | 16 +-
> lib/sha1.c | 95 +-
> lib/siphash.c | 32 +-
> lib/vsprintf.c | 10 +-
> mm/util.c | 32 +
> sound/pci/ctxfi/ctatc.c | 2 +
> sound/pci/ctxfi/cthardware.h | 3 +-
> 77 files changed, 1651 insertions(+), 2709 deletions(-)
> create mode 100644 arch/arm/crypto/blake2s-shash.c
> create mode 100644 arch/x86/crypto/blake2s-shash.c
> delete mode 100644 include/trace/events/random.h
>
Applied to jammy:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220801/e875bdd2/attachment-0001.sig>
More information about the kernel-team
mailing list