[2/2,dunfell] linux-yocto/5.4: update to v5.4.203

Message ID 20220707163827.857-2-bruce.ashfield@gmail.com
State New, archived
Headers show
Series [1/2,dunfell] linux-yocto/5.4: update to v5.4.199 | expand

Commit Message

Bruce Ashfield July 7, 2022, 4:38 p.m. UTC
From: Bruce Ashfield <bruce.ashfield@gmail.com>

Updating  to the latest korg -stable release that comprises
the following commits:

    871cbc208bf0 Linux 5.4.203
    572cc34503d4 crypto: arm/ghash-ce - define fpu before fpu registers are referenced
    3bf992f9d9a8 crypto: arm - use Kconfig based compiler checks for crypto opcodes
    1b43c30cd5d5 ARM: 9029/1: Make iwmmxt.S support Clang's integrated assembler
    9e00e5d195ed ARM: OMAP2+: drop unnecessary adrl
    3657432a75e3 ARM: 8929/1: use APSR_nzcv instead of r15 as mrc operand
    02c200fdba46 ARM: 8933/1: replace Sun/Solaris style flag on section directive
    54e6ecd5b7ca crypto: arm/sha512-neon - avoid ADRL pseudo instruction
    5e6f80033286 crypto: arm/sha256-neon - avoid ADRL pseudo instruction
    e120403c0e7c ARM: 8971/1: replace the sole use of a symbol with its definition
    0a43679016f0 ARM: 8990/1: use VFP assembler mnemonics in register load/store macros
    472671eec98a ARM: 8989/1: use .fpu assembler directives instead of assembler arguments
    2bfb0d43a47c net: mscc: ocelot: allow unregistered IP multicast flooding
    223d551a6681 kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
    ab3ed204a146 powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
    77e2ad091850 drm: remove drm_fb_helper_modinit
    9ef3ad40a81f Linux 5.4.202
    ceda71d49f6b powerpc/pseries: wire up rng during setup_arch()
    ece983890287 kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt)
    2a81e813141e random: update comment from copy_to_user() -> copy_to_iter()
    80f0038d757e modpost: fix section mismatch check for exported init/exit sections
    d1359e4129ad ARM: cns3xxx: Fix refcount leak in cns3xxx_init
    29ca9c4efacc ARM: Fix refcount leak in axxia_boot_secondary
    734a4d15142b soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
    f9b77a529375 ARM: exynos: Fix refcount leak in exynos_map_pmu
    615907ccc421 ARM: dts: imx6qdl: correct PU regulator ramp delay
    93e6137d2a5b powerpc/powernv: wire up rng during setup_arch
    97808c781721 powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
    b6232979320a powerpc: Enable execve syscall exit tracepoint
    e0701f150b28 parisc: Enable ARCH_HAS_STRICT_MODULE_RWX
    e5234a9d64a9 xtensa: Fix refcount leak bug in time.c
    a52972ee706b xtensa: xtfpga: Fix refcount leak bug in setup
    f0fc7cdf5f19 iio: adc: axp288: Override TS pin bias current for some models
    11c7ea38be91 iio: adc: stm32: fix maximum clock rate for stm32mp15x
    5e39397d60da iio: trigger: sysfs: fix use-after-free on remove
    6d2e68d02171 iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
    1ad6d668543d iio: accel: mma8452: ignore the return value of reset operation
    a391bced8404 iio:accel:mxc4005: rearrange iio trigger get and register
    23c158caa032 iio:accel:bma180: rearrange iio trigger get and register
    8ea16a64aafc iio:chemical:ccs811: rearrange iio trigger get and register
    2333db14d875 usb: chipidea: udc: check request status before setting device address
    47e41b4dabbf xhci: turn off port power in shutdown
    d62d1c606db0 iio: adc: vf610: fix conversion mode sysfs node name
    741b6c8363c2 s390/cpumf: Handle events cycles and instructions identical
    4837d1c81223 gpio: winbond: Fix error code in winbond_gpio_get()
    bb18ad00c0b7 Revert "net/tls: fix tls_sk_proto_close executed repeatedly"
    8c7a32b7c155 virtio_net: fix xdp_rxq_info bug after suspend/resume
    28a78414f21e igb: Make DMA faster when CPU is active on the PCIe link
    a5ed066bc246 regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips
    844168a5dabf ice: ethtool: advertise 1000M speeds properly
    e3a232e57670 afs: Fix dynamic root getattr
    cacab1e620e0 MIPS: Remove repetitive increase irq_err_count
    788c954f194c x86/xen: Remove undefined behavior in setup_features()
    c7bdaad9cbfe udmabuf: add back sanity check
    05c6c36c7931 net/tls: fix tls_sk_proto_close executed repeatedly
    02da602bc2f3 erspan: do not assume transport header is always set
    d1592d3e362c drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
    f1f9c2a5a3d9 net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
    47d31b97bf47 bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
    104a59b74577 phy: aquantia: Fix AN when higher speeds than 1G are not advertised
    8ffe2e50e967 bpf: Fix request_sock leak in sk lookup helpers
    f074ab253988 USB: serial: option: add Quectel RM500K module support
    ea7b23eadebc USB: serial: option: add Quectel EM05-G modem
    613c849d73df USB: serial: option: add Telit LE910Cx 0x1250 composition
    ae183969bd66 random: quiet urandom warning ratelimit suppression message
    06a24ddba93a dm mirror log: clear log bits up to BITS_PER_LONG boundary
    1f350f3cf0c1 dm era: commit metadata in postsuspend after worker stops
    0e75acbe1b76 ata: libata: add qc->flags in ata_qc_complete_template tracepoint
    71c76f56b97c mtd: rawnand: gpmi: Fix setting busy timeout setting
    c8d37e6ca180 mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing
    af28f602df74 net: openvswitch: fix parsing of nw_proto for IPv6 fragments
    6fda65dabd3e ALSA: hda/realtek: Add quirk for Clevo PD70PNT
    5fbad99e76c0 ALSA: hda/realtek - ALC897 headset MIC no sound
    cf81f367cf81 ALSA: hda/conexant: Fix missing beep setup
    eca9b5e36e24 ALSA: hda/via: Fix missing beep setup
    1df5178fdebe random: schedule mix_interrupt_randomness() less often
    c87e851b23e5 vt: drop old FONT ioctls
    23db944f754e Linux 5.4.201
    3994d2ee55e2 Revert "hwmon: Make chip parameter for with_info API mandatory"
    7b9c3bfbad25 arm64: mm: Don't invalidate FROM_DEVICE buffers at start of DMA transfer
    2e1591c27b95 tcp: drop the hash_32() part from the index calculation
    c26e1addf157 tcp: increase source port perturb table to 2^16
    77d29f3b18c4 tcp: dynamically allocate the perturb table used by source ports
    7c0a777b7dbd tcp: add small random increments to the source port
    53c5de3092ad tcp: use different parts of the port_offset for index and offset
    95921a3bab76 tcp: add some entropy in __inet_hash_connect()
    bdcbf2602feb usb: gadget: u_ether: fix regression in setting fixed MAC address
    2577d67a9a8a dm: remove special-casing of bio-based immutable singleton target on NVMe
    4143503b486a s390/mm: use non-quiescing sske for KVM switch to keyed guest
    f0c280af0ec7 Linux 5.4.200
    ab8dff4b716e powerpc/mm: Switch obsolete dssall to .long
    1a48a41f1422 riscv: Less inefficient gcc tishift helpers (and export their symbols)
    2464a1c0de53 RISC-V: fix barrier() use in <vdso/processor.h>
    490a02cd8205 arm64: kprobes: Use BRK instead of single-step when executing instructions out-of-line
    ef6f9ce0a79a net: openvswitch: fix leak of nested actions
    6bb3c77c74f5 net: openvswitch: fix misuse of the cached connection on tuple changes
    b47319b4aa21 net/sched: act_police: more accurate MTU policing
    13fbdea1184b virtio-pci: Remove wrong address verification in vp_del_vqs()
    80e4d8a27451 ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
    119e0268cc1c ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8
    fba542891767 ext4: add reserved GDT blocks check
    4ca0d2f1e04e ext4: make variable "count" signed
    a6b31616e5af ext4: fix bug_on ext4_mb_use_inode_pa
    ae4603128751 dm mirror log: round up region bitmap size to BITS_PER_LONG
    64d2df648003 serial: 8250: Store to lsr_save_flags after lsr read
    b75bddfcc181 usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
    6506aff2dc2f usb: dwc2: Fix memory leak in dwc2_hcd_init
    940653b51c33 USB: serial: io_ti: add Agilent E5805A support
    31363b2b868e USB: serial: option: add support for Cinterion MV31 with new baseline
    d0c3730f2763 comedi: vmk80xx: fix expression for tx buffer size
    bf833c484881 i2c: designware: Use standard optional ref clock implementation
    8d884c08eeb8 irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
    58e67c81e229 irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
    56526c3883fc irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
    4695bafabf5b faddr2line: Fix overlapping text section failures, the sequel
    1b34d6a93832 certs/blacklist_hashes.c: fix const confusion in certs blacklist
    fb775ee3cfff arm64: ftrace: fix branch range checks
    0e21311ba459 net: bgmac: Fix an erroneous kfree() in bgmac_remove()
    c19cdd72b3ec mlxsw: spectrum_cnt: Reorder counter pools
    c03304dc4234 misc: atmel-ssc: Fix IRQ check in ssc_probe
    f7183c76d500 tty: goldfish: Fix free_irq() on remove
    ff6e03fe84bc i40e: Fix call trace in setup_tx_descriptors
    4b94408e1617 i40e: Fix calculating the number of queue pairs
    43f65970eeb2 i40e: Fix adding ADQ filter to TC0
    cff3a7ce6e81 clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()
    11c870c0b532 pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
    e32fe87afcfe random: credit cpu and bootloader seeds by default
    9e4cab02b7ec net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
    2f42389d270f ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
    6b4d8b44e716 nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
    786428a1dec2 virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
    aacb264d54c4 ALSA: hda/realtek - Add HW8326 support
    ff882404dff7 scsi: pmcraid: Fix missing resource cleanup in error case
    c48119223618 scsi: ipr: Fix missing/incorrect resource cleanup in error case
    fe0855944a64 scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion
    1f1be79189fd scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
    001de3d8ce82 scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
    9e3a0d3fc71c ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put()
    bc046649c5d6 ASoC: es8328: Fix event generation for deemphasis control
    a81f5a7f7a20 ASoC: wm8962: Fix suspend while playing music
    253334f84c81 ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
    052cd621acbf ASoC: cs42l56: Correct typo in minimum level for SX volume controls
    6d180913b3ab ASoC: cs42l52: Correct TLV for Bypass Volume
    385a031c56a9 ASoC: cs53l30: Correct number of volume levels on SX controls
    675b6a49cf70 ASoC: cs35l36: Update digital volume TLV
    b00f63dba5b8 ASoC: cs42l52: Fix TLV scales for mixer controls
    cd8c1e6c01f1 dma-debug: make things less spammy under memory pressure
    a45e19fd6ed8 ASoC: nau8822: Add operation for internal PLL off and on
    348831a9e8aa powerpc/kasan: Silence KASAN warnings in __get_wchan()
    5624055c8f4b random: account for arch randomness in bits
    c0bf6bfce70a random: mark bootloader randomness code as __init
    f96250197b43 random: avoid checking crng_ready() twice in random_init()
    072cd87d12a8 crypto: drbg - make reseeding from get_random_bytes() synchronous
    e9eb0c4741a7 crypto: drbg - always try to free Jitter RNG instance
    f284afc3a9ca crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
    babba4bf53a6 crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
    1b93b302e942 crypto: drbg - prepare for more fine-grained tracking of seeding state
    98e574a73414 crypto: drbg - always seeded with SP800-90B compliant noise source
    61f87ea3f957 Revert "random: use static branch for crng_ready()"
    3faf33a85650 random: check for signals after page of pool writes
    2177cef53ec9 random: wire up fops->splice_{read,write}_iter()
    35db2a073118 random: convert to using fops->write_iter()
    43e62db84a99 random: convert to using fops->read_iter()
    c23188facd10 random: unify batched entropy implementations
    1aeedbe02b5c random: move randomize_page() into mm where it belongs
    ceaf1feefe6e random: move initialization functions out of hot pages
    d3bf98d61fb6 random: make consistent use of buf and len
    70fce7f105bb random: use proper return types on get_random_{int,long}_wait()
    d05948dc23e6 random: remove extern from functions in header
    d8b4296417ea random: use static branch for crng_ready()
    087a14b9cf9b random: credit architectural init the exact amount
    ac48f7bee198 random: handle latent entropy and command line from random_init()
    736a22645d98 random: use proper jiffies comparison macro
    3266fba20661 random: remove ratelimiting for in-kernel unseeded randomness
    c5373bd6e4fb random: move initialization out of reseeding hot path
    0747ad152fa1 random: avoid initializing twice in credit race
    0baeec0effc7 random: use symbolic constants for crng_init states
    55d64df3ad5b siphash: use one source of truth for siphash permutations
    e4e8a9f8a616 random: help compiler out with fast_mix() by using simpler arguments
    bf3b51eb0f13 random: do not use input pool from hard IRQs
    6d4203a2cddc random: order timer entropy functions below interrupt functions
    58da574f105a random: do not pretend to handle premature next security model
    e739d5bd1466 random: use first 128 bits of input as fast init
    c44f8b386376 random: do not use batches when !crng_ready()
    e247ea8d97bf random: insist on random_get_entropy() existing in order to simplify
    9bfbcb37e5f6 xtensa: use fallback for random_get_entropy() instead of zero
    fa15650b51f6 sparc: use fallback for random_get_entropy() instead of zero
    9dfc14590c5d um: use fallback for random_get_entropy() instead of zero
    0cc41e2c73f7 x86/tsc: Use fallback for random_get_entropy() instead of zero
    f2a6e8727084 nios2: use fallback for random_get_entropy() instead of zero
    db1d13fe4c80 arm: use fallback for random_get_entropy() instead of zero
    6fa912f987fa mips: use fallback for random_get_entropy() instead of just c0 random
    36f38f838c5b m68k: use fallback for random_get_entropy() instead of zero
    a7d04ca9da61 timekeeping: Add raw clock fallback for random_get_entropy()
    eb2f9d72f32a powerpc: define get_cycles macro for arch-override
    10455a367c33 alpha: define get_cycles macro for arch-override
    5f0b77ca1978 parisc: define get_cycles macro for arch-override
    80459abc9fee s390: define get_cycles macro for arch-override
    73385644490a ia64: define get_cycles macro for arch-override
    5fac86663976 init: call time_init() before rand_initialize()
    b88ae87b100c random: fix sysctl documentation nits
    465425748359 random: document crng_fast_key_erasure() destination possibility
    ec07b3494517 random: make random_get_entropy() return an unsigned long
    fe156368f987 random: allow partial reads if later user copies fail
    70788723da70 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
    2ce859d91fe9 random: check for signal_pending() outside of need_resched() check
    0e8030c9e03d random: do not allow user to keep crng key around on stack
    95aed891f7be random: do not split fast init input in add_hwgenerator_randomness()
    1d53d5a0973e random: mix build-time latent entropy into pool at init
    0aba75c6173d random: re-add removed comment about get_random_{u32,u64} reseeding
    81ea8a609b48 random: treat bootloader trust toggle the same way as cpu trust toggle
    a08d52a6081b random: skip fast_init if hwrng provides large chunk of entropy
    8320bc665c29 random: check for signal and try earlier when generating entropy
    3a53b818bb0e random: reseed more often immediately after booting
    905759e0fc17 random: make consistent usage of crng_ready()
    ad4c6bd98c54 random: use SipHash as interrupt entropy accumulator
    631503001ccf random: replace custom notifier chain with standard one
    1ae73fb2a635 random: don't let 644 read-only sysctls be written to
    ed409757100b random: give sysctl_random_min_urandom_seed a more sensible value
    75d95c1b5dea random: do crng pre-init loading in worker rather than irq
    219c84fe93e5 random: unify cycles_t and jiffies usage and types
    673637c4c9e0 random: cleanup UUID handling
    4d5151cc288a random: only wake up writers after zap if threshold was passed
    ac0081dec7d6 random: round-robin registers as ulong, not u32
    62cd795e465a random: clear fast pool, crng, and batches in cpuhp bring up
    a7f8f385bb6f random: pull add_hwgenerator_randomness() declaration into random.h
    ff607fc7607d random: check for crng_init == 0 in add_device_randomness()
    20788eb4ce70 random: unify early init crng load accounting
    49567f947735 random: do not take pool spinlock at boot
    4a61bf7f9b18 random: defer fast pool mixing to worker
    944d1bd0e5be random: rewrite header introductory comment
    c0e35949c736 random: group sysctl functions
    d946084180ee random: group userspace read/write functions
    565a66043bdf random: group entropy collection functions
    f2d587c493fc random: group entropy extraction functions
    a8786d54762f random: group crng functions
    c12dfec1aacf random: group initialization wait functions
    22e3db57ab94 random: remove whitespace and reorder includes
    cee64be60591 random: remove useless header comment
    904e6123c400 random: introduce drain_entropy() helper to declutter crng_reseed()
    47c56790d51c random: deobfuscate irq u32/u64 contributions
    e280b79c3127 random: add proper SPDX header
    776927dfd4ac random: remove unused tracepoints
    d68883956d36 random: remove ifdef'd out interrupt bench
    4a14a5a6969a random: tie batched entropy generation to base_crng generation
    d8a6684950c1 random: fix locking for crng_init in crng_reseed()
    b1d561138150 random: zero buffer after reading entropy from userspace
    21da00f8cb3a random: remove outdated INT_MAX >> 6 check in urandom_read()
    b530684129b2 random: make more consistent use of integer types
    3eed6af93ecd random: use hash function for crng_slow_load()
    cee3c7056900 random: use simpler fast key erasure flow on per-cpu keys
    ea9941fd6e26 random: absorb fast pool into input pool after fast load
    a3562bf4e8c9 random: do not xor RDRAND when writing into /dev/random
    574c8839504b random: ensure early RDSEED goes through mixer on init
    d3d3c1c214c3 random: inline leaves of rand_initialize()
    817315517af9 random: get rid of secondary crngs
    c15fc80b7df0 random: use RDSEED instead of RDRAND in entropy extraction
    72db8151c889 random: fix locking in crng_fast_load()
    7229c6d90a1a random: remove batched entropy locking
    6c8911579221 random: remove use_input_pool parameter from crng_reseed()
    4ef908fb81d9 random: make credit_entropy_bits() always safe
    42a9a7e80750 random: always wake up entropy writers after extraction
    373ef51f3e8a random: use linear min-entropy accumulation crediting
    a1a2bae5ef93 random: simplify entropy debiting
    4e5814bd2e75 random: use computational hash for entropy extraction
    99a0f8e22d4c random: only call crng_finalize_init() for primary_crng
    88609b892fdd random: access primary_pool directly rather than through pointer
    0b9f9b94f1ea random: continually use hwgenerator randomness
    811e333c4eb2 random: simplify arithmetic function flow in account()
    56de23dcf9d0 random: selectively clang-format where it makes sense
    86eac12b1cf5 random: access input_pool_data directly rather than through pointer
    4f5400ca7fc1 random: cleanup fractional entropy shift constants
    1b6f1d32a858 random: prepend remaining pool constants with POOL_
    0fe4a64fd946 random: de-duplicate INPUT_POOL constants
    e35576c4cb18 random: remove unused OUTPUT_POOL constants
    74cb3093f2de random: rather than entropy_store abstraction, use global
    14652d864280 random: remove unused extract_entropy() reserved argument
    12f17e3f3a14 random: remove incomplete last_data logic
    adcbbb44ccc1 random: cleanup integer types
    4ac4c7f057ff random: cleanup poolinfo abstraction
    5c3818e3bd7b random: fix typo in comments
    0a7e65810269 random: don't reset crng_init_cnt on urandom_read()
    8d7c55563ed0 random: avoid superfluous call to RDRAND in CRNG extraction
    8b4695640bc5 random: early initialization of ChaCha constants
    cfc69065005e random: initialize ChaCha20 constants with correct endianness
    922d082e3363 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
    565b3af16894 random: harmonize "crng init done" messages
    346c4a697c29 random: mix bootloader randomness into pool
    afce74c0c04f random: do not re-init if crng_reseed completes before primary init
    d76758c71209 random: do not sign extend bytes for rotation when mixing
    c2f0a89cd1d5 random: use BLAKE2s instead of SHA1 in extraction
    6e6ae70c1eac random: remove unused irq_flags argument from add_interrupt_randomness()
    2580b0b3fd5a random: document add_hwgenerator_randomness() with other input functions
    3cc36a4aa1ca crypto: blake2s - adjust include guard naming
    09342a544c4b crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
    f850f3643d6b MAINTAINERS: co-maintain random.c
    967e3a136f9b random: remove dead code left over from blocking pool
    610f0b439a6b random: avoid arch_get_random_seed_long() when collecting IRQ randomness
    ad3fce669105 random: add arch_get_random_*long_early()
    41b0d3e86c50 powerpc: Use bool in archrandom.h
    89533373e11c linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
    0222f9f1d168 linux/random.h: Use false with bool
    15f93060b718 linux/random.h: Remove arch_has_random, arch_has_random_seed
    a95ed04e21da s390: Remove arch_has_random, arch_has_random_seed
    aab52172d9f9 powerpc: Remove arch_has_random, arch_has_random_seed
    35e28a05f659 x86: Remove arch_has_random, arch_has_random_seed
    98f749e29728 random: avoid warnings for !CONFIG_NUMA builds
    c13b9c3627d8 random: split primary/secondary crng init paths
    c070b07aaf34 random: remove some dead code of poolinfo
    898498bb4414 random: fix typo in add_timer_randomness()
    2c53d6d6a7be random: Add and use pr_fmt()
    f3375cfe31bc random: convert to ENTROPY_BITS for better code readability
    9f757cad20b7 random: remove unnecessary unlikely()
    4431c366fe23 random: remove kernel.random.read_wakeup_threshold
    ec134003cc39 random: delete code to pull data into pools
    a9564e14c6dd random: remove the blocking pool
    940cbc47b369 random: make /dev/random be almost like /dev/urandom
    c4edc1055c11 random: ignore GRND_RANDOM in getentropy(2)
    7f9f864af021 random: add GRND_INSECURE to return best-effort non-cryptographic bytes
    479d39707ff7 random: Add a urandom_read_nowait() for random APIs that don't warn
    69441ba56f13 random: Don't wake crng_init_wait when crng_init == 1
    69ef3109d422 random: don't forget compat_ioctl on urandom
    927fc225af29 compat_ioctl: remove /dev/random commands
    996fba14fa35 lib/crypto: sha1: re-roll loops to reduce code size
    c4f48374407b lib/crypto: blake2s: move hmac construction into wireguard
    97126d2f65b3 crypto: blake2s - generic C library implementation and selftest
    76101f1b7f59 nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
    e804587ecdcd bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
    f91da317e6fa 9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
 .../linux/linux-yocto-rt_5.4.bb               |  6 ++---
 .../linux/linux-yocto-tiny_5.4.bb             |  8 +++----
 meta/recipes-kernel/linux/linux-yocto_5.4.bb  | 22 +++++++++----------
 3 files changed, 18 insertions(+), 18 deletions(-)

Comments

Denys Dmytriyenko July 18, 2022, 6:06 p.m. UTC | #1
There's been some rework done around random subsystem lately. It now breaks RT 
kernel, at least on Aarch64, x86_64, maybe other platforms. Is there a quick 
fix, or should this update be reverted in Dunfell?


| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:39:45: warning: 'struct random_ready_callback' declared inside parameter list will not be visible outside of this definition or declaration
|    39 | extern int add_random_ready_callback(struct random_ready_callback *rdy);
|       |                                             ^~~~~~~~~~~~~~~~~~~~~
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:40:46: warning: 'struct random_ready_callback' declared inside parameter list will not be visible outside of this definition or declaration
|    40 | extern void del_random_ready_callback(struct random_ready_callback *rdy);
|       |                                              ^~~~~~~~~~~~~~~~~~~~~
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:47:6: error: conflicting types for 'get_random_bytes'
|    47 | void get_random_bytes(void *buf, size_t len);
|       |      ^~~~~~~~~~~~~~~~
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:35:13: note: previous declaration of 'get_random_bytes' was here
|    35 | extern void get_random_bytes(void *buf, int nbytes);
|       |             ^~~~~~~~~~~~~~~~
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:48:21: error: conflicting types for 'get_random_bytes_arch'
|    48 | size_t __must_check get_random_bytes_arch(void *buf, size_t len);
|       |                     ^~~~~~~~~~~~~~~~~~~~~
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:41:25: note: previous declaration of 'get_random_bytes_arch' was here
|    41 | extern int __must_check get_random_bytes_arch(void *buf, int nbytes);
|       |                         ^~~~~~~~~~~~~~~~~~~~~
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/scripts/Makefile.build:99: recipe for target 'arch/arm64/kernel/asm-offsets.s' failed
| make[2]: *** [arch/arm64/kernel/asm-offsets.s] Error 1
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:1134: recipe for target 'prepare0' failed
| make[1]: *** [prepare0] Error 2
| /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:179: recipe for target 'sub-make' failed
| make: *** [sub-make] Error 2
| ERROR: oe_runmake failed
| WARNING: exit code 1 from a shell command.
| ERROR: Execution of '/OE/poky-dunfell/build/tmp/work/qemuarm64-poky-linux/linux-yocto-rt/5.4.203+gitAUTOINC+010ac788e8_fa8536530b-r0/temp/run.do_compile.240410' failed with exit code 1
ERROR: Task (/OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile) failed with exit code '1'
NOTE: Tasks Summary: Attempted 586 tasks of which 465 didn't need to be rerun and 1 failed.

Summary: 1 task failed:
  /OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile
Summary: There were 2 ERROR messages shown, returning a non-zero exit code.


On Thu, Jul 07, 2022 at 12:38:27PM -0400, Bruce Ashfield wrote:
> From: Bruce Ashfield <bruce.ashfield@gmail.com>
> 
> Updating  to the latest korg -stable release that comprises
> the following commits:
> 
>     871cbc208bf0 Linux 5.4.203
>     572cc34503d4 crypto: arm/ghash-ce - define fpu before fpu registers are referenced
>     3bf992f9d9a8 crypto: arm - use Kconfig based compiler checks for crypto opcodes
>     1b43c30cd5d5 ARM: 9029/1: Make iwmmxt.S support Clang's integrated assembler
>     9e00e5d195ed ARM: OMAP2+: drop unnecessary adrl
>     3657432a75e3 ARM: 8929/1: use APSR_nzcv instead of r15 as mrc operand
>     02c200fdba46 ARM: 8933/1: replace Sun/Solaris style flag on section directive
>     54e6ecd5b7ca crypto: arm/sha512-neon - avoid ADRL pseudo instruction
>     5e6f80033286 crypto: arm/sha256-neon - avoid ADRL pseudo instruction
>     e120403c0e7c ARM: 8971/1: replace the sole use of a symbol with its definition
>     0a43679016f0 ARM: 8990/1: use VFP assembler mnemonics in register load/store macros
>     472671eec98a ARM: 8989/1: use .fpu assembler directives instead of assembler arguments
>     2bfb0d43a47c net: mscc: ocelot: allow unregistered IP multicast flooding
>     223d551a6681 kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
>     ab3ed204a146 powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
>     77e2ad091850 drm: remove drm_fb_helper_modinit
>     9ef3ad40a81f Linux 5.4.202
>     ceda71d49f6b powerpc/pseries: wire up rng during setup_arch()
>     ece983890287 kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt)
>     2a81e813141e random: update comment from copy_to_user() -> copy_to_iter()
>     80f0038d757e modpost: fix section mismatch check for exported init/exit sections
>     d1359e4129ad ARM: cns3xxx: Fix refcount leak in cns3xxx_init
>     29ca9c4efacc ARM: Fix refcount leak in axxia_boot_secondary
>     734a4d15142b soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
>     f9b77a529375 ARM: exynos: Fix refcount leak in exynos_map_pmu
>     615907ccc421 ARM: dts: imx6qdl: correct PU regulator ramp delay
>     93e6137d2a5b powerpc/powernv: wire up rng during setup_arch
>     97808c781721 powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
>     b6232979320a powerpc: Enable execve syscall exit tracepoint
>     e0701f150b28 parisc: Enable ARCH_HAS_STRICT_MODULE_RWX
>     e5234a9d64a9 xtensa: Fix refcount leak bug in time.c
>     a52972ee706b xtensa: xtfpga: Fix refcount leak bug in setup
>     f0fc7cdf5f19 iio: adc: axp288: Override TS pin bias current for some models
>     11c7ea38be91 iio: adc: stm32: fix maximum clock rate for stm32mp15x
>     5e39397d60da iio: trigger: sysfs: fix use-after-free on remove
>     6d2e68d02171 iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
>     1ad6d668543d iio: accel: mma8452: ignore the return value of reset operation
>     a391bced8404 iio:accel:mxc4005: rearrange iio trigger get and register
>     23c158caa032 iio:accel:bma180: rearrange iio trigger get and register
>     8ea16a64aafc iio:chemical:ccs811: rearrange iio trigger get and register
>     2333db14d875 usb: chipidea: udc: check request status before setting device address
>     47e41b4dabbf xhci: turn off port power in shutdown
>     d62d1c606db0 iio: adc: vf610: fix conversion mode sysfs node name
>     741b6c8363c2 s390/cpumf: Handle events cycles and instructions identical
>     4837d1c81223 gpio: winbond: Fix error code in winbond_gpio_get()
>     bb18ad00c0b7 Revert "net/tls: fix tls_sk_proto_close executed repeatedly"
>     8c7a32b7c155 virtio_net: fix xdp_rxq_info bug after suspend/resume
>     28a78414f21e igb: Make DMA faster when CPU is active on the PCIe link
>     a5ed066bc246 regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips
>     844168a5dabf ice: ethtool: advertise 1000M speeds properly
>     e3a232e57670 afs: Fix dynamic root getattr
>     cacab1e620e0 MIPS: Remove repetitive increase irq_err_count
>     788c954f194c x86/xen: Remove undefined behavior in setup_features()
>     c7bdaad9cbfe udmabuf: add back sanity check
>     05c6c36c7931 net/tls: fix tls_sk_proto_close executed repeatedly
>     02da602bc2f3 erspan: do not assume transport header is always set
>     d1592d3e362c drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
>     f1f9c2a5a3d9 net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
>     47d31b97bf47 bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
>     104a59b74577 phy: aquantia: Fix AN when higher speeds than 1G are not advertised
>     8ffe2e50e967 bpf: Fix request_sock leak in sk lookup helpers
>     f074ab253988 USB: serial: option: add Quectel RM500K module support
>     ea7b23eadebc USB: serial: option: add Quectel EM05-G modem
>     613c849d73df USB: serial: option: add Telit LE910Cx 0x1250 composition
>     ae183969bd66 random: quiet urandom warning ratelimit suppression message
>     06a24ddba93a dm mirror log: clear log bits up to BITS_PER_LONG boundary
>     1f350f3cf0c1 dm era: commit metadata in postsuspend after worker stops
>     0e75acbe1b76 ata: libata: add qc->flags in ata_qc_complete_template tracepoint
>     71c76f56b97c mtd: rawnand: gpmi: Fix setting busy timeout setting
>     c8d37e6ca180 mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing
>     af28f602df74 net: openvswitch: fix parsing of nw_proto for IPv6 fragments
>     6fda65dabd3e ALSA: hda/realtek: Add quirk for Clevo PD70PNT
>     5fbad99e76c0 ALSA: hda/realtek - ALC897 headset MIC no sound
>     cf81f367cf81 ALSA: hda/conexant: Fix missing beep setup
>     eca9b5e36e24 ALSA: hda/via: Fix missing beep setup
>     1df5178fdebe random: schedule mix_interrupt_randomness() less often
>     c87e851b23e5 vt: drop old FONT ioctls
>     23db944f754e Linux 5.4.201
>     3994d2ee55e2 Revert "hwmon: Make chip parameter for with_info API mandatory"
>     7b9c3bfbad25 arm64: mm: Don't invalidate FROM_DEVICE buffers at start of DMA transfer
>     2e1591c27b95 tcp: drop the hash_32() part from the index calculation
>     c26e1addf157 tcp: increase source port perturb table to 2^16
>     77d29f3b18c4 tcp: dynamically allocate the perturb table used by source ports
>     7c0a777b7dbd tcp: add small random increments to the source port
>     53c5de3092ad tcp: use different parts of the port_offset for index and offset
>     95921a3bab76 tcp: add some entropy in __inet_hash_connect()
>     bdcbf2602feb usb: gadget: u_ether: fix regression in setting fixed MAC address
>     2577d67a9a8a dm: remove special-casing of bio-based immutable singleton target on NVMe
>     4143503b486a s390/mm: use non-quiescing sske for KVM switch to keyed guest
>     f0c280af0ec7 Linux 5.4.200
>     ab8dff4b716e powerpc/mm: Switch obsolete dssall to .long
>     1a48a41f1422 riscv: Less inefficient gcc tishift helpers (and export their symbols)
>     2464a1c0de53 RISC-V: fix barrier() use in <vdso/processor.h>
>     490a02cd8205 arm64: kprobes: Use BRK instead of single-step when executing instructions out-of-line
>     ef6f9ce0a79a net: openvswitch: fix leak of nested actions
>     6bb3c77c74f5 net: openvswitch: fix misuse of the cached connection on tuple changes
>     b47319b4aa21 net/sched: act_police: more accurate MTU policing
>     13fbdea1184b virtio-pci: Remove wrong address verification in vp_del_vqs()
>     80e4d8a27451 ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
>     119e0268cc1c ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8
>     fba542891767 ext4: add reserved GDT blocks check
>     4ca0d2f1e04e ext4: make variable "count" signed
>     a6b31616e5af ext4: fix bug_on ext4_mb_use_inode_pa
>     ae4603128751 dm mirror log: round up region bitmap size to BITS_PER_LONG
>     64d2df648003 serial: 8250: Store to lsr_save_flags after lsr read
>     b75bddfcc181 usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
>     6506aff2dc2f usb: dwc2: Fix memory leak in dwc2_hcd_init
>     940653b51c33 USB: serial: io_ti: add Agilent E5805A support
>     31363b2b868e USB: serial: option: add support for Cinterion MV31 with new baseline
>     d0c3730f2763 comedi: vmk80xx: fix expression for tx buffer size
>     bf833c484881 i2c: designware: Use standard optional ref clock implementation
>     8d884c08eeb8 irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
>     58e67c81e229 irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
>     56526c3883fc irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
>     4695bafabf5b faddr2line: Fix overlapping text section failures, the sequel
>     1b34d6a93832 certs/blacklist_hashes.c: fix const confusion in certs blacklist
>     fb775ee3cfff arm64: ftrace: fix branch range checks
>     0e21311ba459 net: bgmac: Fix an erroneous kfree() in bgmac_remove()
>     c19cdd72b3ec mlxsw: spectrum_cnt: Reorder counter pools
>     c03304dc4234 misc: atmel-ssc: Fix IRQ check in ssc_probe
>     f7183c76d500 tty: goldfish: Fix free_irq() on remove
>     ff6e03fe84bc i40e: Fix call trace in setup_tx_descriptors
>     4b94408e1617 i40e: Fix calculating the number of queue pairs
>     43f65970eeb2 i40e: Fix adding ADQ filter to TC0
>     cff3a7ce6e81 clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()
>     11c870c0b532 pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
>     e32fe87afcfe random: credit cpu and bootloader seeds by default
>     9e4cab02b7ec net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
>     2f42389d270f ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
>     6b4d8b44e716 nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
>     786428a1dec2 virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
>     aacb264d54c4 ALSA: hda/realtek - Add HW8326 support
>     ff882404dff7 scsi: pmcraid: Fix missing resource cleanup in error case
>     c48119223618 scsi: ipr: Fix missing/incorrect resource cleanup in error case
>     fe0855944a64 scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion
>     1f1be79189fd scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
>     001de3d8ce82 scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
>     9e3a0d3fc71c ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put()
>     bc046649c5d6 ASoC: es8328: Fix event generation for deemphasis control
>     a81f5a7f7a20 ASoC: wm8962: Fix suspend while playing music
>     253334f84c81 ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
>     052cd621acbf ASoC: cs42l56: Correct typo in minimum level for SX volume controls
>     6d180913b3ab ASoC: cs42l52: Correct TLV for Bypass Volume
>     385a031c56a9 ASoC: cs53l30: Correct number of volume levels on SX controls
>     675b6a49cf70 ASoC: cs35l36: Update digital volume TLV
>     b00f63dba5b8 ASoC: cs42l52: Fix TLV scales for mixer controls
>     cd8c1e6c01f1 dma-debug: make things less spammy under memory pressure
>     a45e19fd6ed8 ASoC: nau8822: Add operation for internal PLL off and on
>     348831a9e8aa powerpc/kasan: Silence KASAN warnings in __get_wchan()
>     5624055c8f4b random: account for arch randomness in bits
>     c0bf6bfce70a random: mark bootloader randomness code as __init
>     f96250197b43 random: avoid checking crng_ready() twice in random_init()
>     072cd87d12a8 crypto: drbg - make reseeding from get_random_bytes() synchronous
>     e9eb0c4741a7 crypto: drbg - always try to free Jitter RNG instance
>     f284afc3a9ca crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
>     babba4bf53a6 crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
>     1b93b302e942 crypto: drbg - prepare for more fine-grained tracking of seeding state
>     98e574a73414 crypto: drbg - always seeded with SP800-90B compliant noise source
>     61f87ea3f957 Revert "random: use static branch for crng_ready()"
>     3faf33a85650 random: check for signals after page of pool writes
>     2177cef53ec9 random: wire up fops->splice_{read,write}_iter()
>     35db2a073118 random: convert to using fops->write_iter()
>     43e62db84a99 random: convert to using fops->read_iter()
>     c23188facd10 random: unify batched entropy implementations
>     1aeedbe02b5c random: move randomize_page() into mm where it belongs
>     ceaf1feefe6e random: move initialization functions out of hot pages
>     d3bf98d61fb6 random: make consistent use of buf and len
>     70fce7f105bb random: use proper return types on get_random_{int,long}_wait()
>     d05948dc23e6 random: remove extern from functions in header
>     d8b4296417ea random: use static branch for crng_ready()
>     087a14b9cf9b random: credit architectural init the exact amount
>     ac48f7bee198 random: handle latent entropy and command line from random_init()
>     736a22645d98 random: use proper jiffies comparison macro
>     3266fba20661 random: remove ratelimiting for in-kernel unseeded randomness
>     c5373bd6e4fb random: move initialization out of reseeding hot path
>     0747ad152fa1 random: avoid initializing twice in credit race
>     0baeec0effc7 random: use symbolic constants for crng_init states
>     55d64df3ad5b siphash: use one source of truth for siphash permutations
>     e4e8a9f8a616 random: help compiler out with fast_mix() by using simpler arguments
>     bf3b51eb0f13 random: do not use input pool from hard IRQs
>     6d4203a2cddc random: order timer entropy functions below interrupt functions
>     58da574f105a random: do not pretend to handle premature next security model
>     e739d5bd1466 random: use first 128 bits of input as fast init
>     c44f8b386376 random: do not use batches when !crng_ready()
>     e247ea8d97bf random: insist on random_get_entropy() existing in order to simplify
>     9bfbcb37e5f6 xtensa: use fallback for random_get_entropy() instead of zero
>     fa15650b51f6 sparc: use fallback for random_get_entropy() instead of zero
>     9dfc14590c5d um: use fallback for random_get_entropy() instead of zero
>     0cc41e2c73f7 x86/tsc: Use fallback for random_get_entropy() instead of zero
>     f2a6e8727084 nios2: use fallback for random_get_entropy() instead of zero
>     db1d13fe4c80 arm: use fallback for random_get_entropy() instead of zero
>     6fa912f987fa mips: use fallback for random_get_entropy() instead of just c0 random
>     36f38f838c5b m68k: use fallback for random_get_entropy() instead of zero
>     a7d04ca9da61 timekeeping: Add raw clock fallback for random_get_entropy()
>     eb2f9d72f32a powerpc: define get_cycles macro for arch-override
>     10455a367c33 alpha: define get_cycles macro for arch-override
>     5f0b77ca1978 parisc: define get_cycles macro for arch-override
>     80459abc9fee s390: define get_cycles macro for arch-override
>     73385644490a ia64: define get_cycles macro for arch-override
>     5fac86663976 init: call time_init() before rand_initialize()
>     b88ae87b100c random: fix sysctl documentation nits
>     465425748359 random: document crng_fast_key_erasure() destination possibility
>     ec07b3494517 random: make random_get_entropy() return an unsigned long
>     fe156368f987 random: allow partial reads if later user copies fail
>     70788723da70 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
>     2ce859d91fe9 random: check for signal_pending() outside of need_resched() check
>     0e8030c9e03d random: do not allow user to keep crng key around on stack
>     95aed891f7be random: do not split fast init input in add_hwgenerator_randomness()
>     1d53d5a0973e random: mix build-time latent entropy into pool at init
>     0aba75c6173d random: re-add removed comment about get_random_{u32,u64} reseeding
>     81ea8a609b48 random: treat bootloader trust toggle the same way as cpu trust toggle
>     a08d52a6081b random: skip fast_init if hwrng provides large chunk of entropy
>     8320bc665c29 random: check for signal and try earlier when generating entropy
>     3a53b818bb0e random: reseed more often immediately after booting
>     905759e0fc17 random: make consistent usage of crng_ready()
>     ad4c6bd98c54 random: use SipHash as interrupt entropy accumulator
>     631503001ccf random: replace custom notifier chain with standard one
>     1ae73fb2a635 random: don't let 644 read-only sysctls be written to
>     ed409757100b random: give sysctl_random_min_urandom_seed a more sensible value
>     75d95c1b5dea random: do crng pre-init loading in worker rather than irq
>     219c84fe93e5 random: unify cycles_t and jiffies usage and types
>     673637c4c9e0 random: cleanup UUID handling
>     4d5151cc288a random: only wake up writers after zap if threshold was passed
>     ac0081dec7d6 random: round-robin registers as ulong, not u32
>     62cd795e465a random: clear fast pool, crng, and batches in cpuhp bring up
>     a7f8f385bb6f random: pull add_hwgenerator_randomness() declaration into random.h
>     ff607fc7607d random: check for crng_init == 0 in add_device_randomness()
>     20788eb4ce70 random: unify early init crng load accounting
>     49567f947735 random: do not take pool spinlock at boot
>     4a61bf7f9b18 random: defer fast pool mixing to worker
>     944d1bd0e5be random: rewrite header introductory comment
>     c0e35949c736 random: group sysctl functions
>     d946084180ee random: group userspace read/write functions
>     565a66043bdf random: group entropy collection functions
>     f2d587c493fc random: group entropy extraction functions
>     a8786d54762f random: group crng functions
>     c12dfec1aacf random: group initialization wait functions
>     22e3db57ab94 random: remove whitespace and reorder includes
>     cee64be60591 random: remove useless header comment
>     904e6123c400 random: introduce drain_entropy() helper to declutter crng_reseed()
>     47c56790d51c random: deobfuscate irq u32/u64 contributions
>     e280b79c3127 random: add proper SPDX header
>     776927dfd4ac random: remove unused tracepoints
>     d68883956d36 random: remove ifdef'd out interrupt bench
>     4a14a5a6969a random: tie batched entropy generation to base_crng generation
>     d8a6684950c1 random: fix locking for crng_init in crng_reseed()
>     b1d561138150 random: zero buffer after reading entropy from userspace
>     21da00f8cb3a random: remove outdated INT_MAX >> 6 check in urandom_read()
>     b530684129b2 random: make more consistent use of integer types
>     3eed6af93ecd random: use hash function for crng_slow_load()
>     cee3c7056900 random: use simpler fast key erasure flow on per-cpu keys
>     ea9941fd6e26 random: absorb fast pool into input pool after fast load
>     a3562bf4e8c9 random: do not xor RDRAND when writing into /dev/random
>     574c8839504b random: ensure early RDSEED goes through mixer on init
>     d3d3c1c214c3 random: inline leaves of rand_initialize()
>     817315517af9 random: get rid of secondary crngs
>     c15fc80b7df0 random: use RDSEED instead of RDRAND in entropy extraction
>     72db8151c889 random: fix locking in crng_fast_load()
>     7229c6d90a1a random: remove batched entropy locking
>     6c8911579221 random: remove use_input_pool parameter from crng_reseed()
>     4ef908fb81d9 random: make credit_entropy_bits() always safe
>     42a9a7e80750 random: always wake up entropy writers after extraction
>     373ef51f3e8a random: use linear min-entropy accumulation crediting
>     a1a2bae5ef93 random: simplify entropy debiting
>     4e5814bd2e75 random: use computational hash for entropy extraction
>     99a0f8e22d4c random: only call crng_finalize_init() for primary_crng
>     88609b892fdd random: access primary_pool directly rather than through pointer
>     0b9f9b94f1ea random: continually use hwgenerator randomness
>     811e333c4eb2 random: simplify arithmetic function flow in account()
>     56de23dcf9d0 random: selectively clang-format where it makes sense
>     86eac12b1cf5 random: access input_pool_data directly rather than through pointer
>     4f5400ca7fc1 random: cleanup fractional entropy shift constants
>     1b6f1d32a858 random: prepend remaining pool constants with POOL_
>     0fe4a64fd946 random: de-duplicate INPUT_POOL constants
>     e35576c4cb18 random: remove unused OUTPUT_POOL constants
>     74cb3093f2de random: rather than entropy_store abstraction, use global
>     14652d864280 random: remove unused extract_entropy() reserved argument
>     12f17e3f3a14 random: remove incomplete last_data logic
>     adcbbb44ccc1 random: cleanup integer types
>     4ac4c7f057ff random: cleanup poolinfo abstraction
>     5c3818e3bd7b random: fix typo in comments
>     0a7e65810269 random: don't reset crng_init_cnt on urandom_read()
>     8d7c55563ed0 random: avoid superfluous call to RDRAND in CRNG extraction
>     8b4695640bc5 random: early initialization of ChaCha constants
>     cfc69065005e random: initialize ChaCha20 constants with correct endianness
>     922d082e3363 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
>     565b3af16894 random: harmonize "crng init done" messages
>     346c4a697c29 random: mix bootloader randomness into pool
>     afce74c0c04f random: do not re-init if crng_reseed completes before primary init
>     d76758c71209 random: do not sign extend bytes for rotation when mixing
>     c2f0a89cd1d5 random: use BLAKE2s instead of SHA1 in extraction
>     6e6ae70c1eac random: remove unused irq_flags argument from add_interrupt_randomness()
>     2580b0b3fd5a random: document add_hwgenerator_randomness() with other input functions
>     3cc36a4aa1ca crypto: blake2s - adjust include guard naming
>     09342a544c4b crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
>     f850f3643d6b MAINTAINERS: co-maintain random.c
>     967e3a136f9b random: remove dead code left over from blocking pool
>     610f0b439a6b random: avoid arch_get_random_seed_long() when collecting IRQ randomness
>     ad3fce669105 random: add arch_get_random_*long_early()
>     41b0d3e86c50 powerpc: Use bool in archrandom.h
>     89533373e11c linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
>     0222f9f1d168 linux/random.h: Use false with bool
>     15f93060b718 linux/random.h: Remove arch_has_random, arch_has_random_seed
>     a95ed04e21da s390: Remove arch_has_random, arch_has_random_seed
>     aab52172d9f9 powerpc: Remove arch_has_random, arch_has_random_seed
>     35e28a05f659 x86: Remove arch_has_random, arch_has_random_seed
>     98f749e29728 random: avoid warnings for !CONFIG_NUMA builds
>     c13b9c3627d8 random: split primary/secondary crng init paths
>     c070b07aaf34 random: remove some dead code of poolinfo
>     898498bb4414 random: fix typo in add_timer_randomness()
>     2c53d6d6a7be random: Add and use pr_fmt()
>     f3375cfe31bc random: convert to ENTROPY_BITS for better code readability
>     9f757cad20b7 random: remove unnecessary unlikely()
>     4431c366fe23 random: remove kernel.random.read_wakeup_threshold
>     ec134003cc39 random: delete code to pull data into pools
>     a9564e14c6dd random: remove the blocking pool
>     940cbc47b369 random: make /dev/random be almost like /dev/urandom
>     c4edc1055c11 random: ignore GRND_RANDOM in getentropy(2)
>     7f9f864af021 random: add GRND_INSECURE to return best-effort non-cryptographic bytes
>     479d39707ff7 random: Add a urandom_read_nowait() for random APIs that don't warn
>     69441ba56f13 random: Don't wake crng_init_wait when crng_init == 1
>     69ef3109d422 random: don't forget compat_ioctl on urandom
>     927fc225af29 compat_ioctl: remove /dev/random commands
>     996fba14fa35 lib/crypto: sha1: re-roll loops to reduce code size
>     c4f48374407b lib/crypto: blake2s: move hmac construction into wireguard
>     97126d2f65b3 crypto: blake2s - generic C library implementation and selftest
>     76101f1b7f59 nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
>     e804587ecdcd bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
>     f91da317e6fa 9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
> 
> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
> ---
>  .../linux/linux-yocto-rt_5.4.bb               |  6 ++---
>  .../linux/linux-yocto-tiny_5.4.bb             |  8 +++----
>  meta/recipes-kernel/linux/linux-yocto_5.4.bb  | 22 +++++++++----------
>  3 files changed, 18 insertions(+), 18 deletions(-)
> 
> diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> index 2fef4f032d..7fa1b81229 100644
> --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> @@ -11,13 +11,13 @@ python () {
>          raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
>  }
>  
> -SRCREV_machine ?= "d7693f19702e1fa1bb18507260198478cba0d6a2"
> -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> +SRCREV_machine ?= "fa8536530bdd6a87856aa6fe0af4f9ef4af21fe0"
> +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
>  
>  SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \
>             git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
>  
> -LINUX_VERSION ?= "5.4.199"
> +LINUX_VERSION ?= "5.4.203"
>  
>  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
>  
> diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> index 32ff438a57..d08658cf7e 100644
> --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig"
>  
>  require recipes-kernel/linux/linux-yocto.inc
>  
> -LINUX_VERSION ?= "5.4.199"
> +LINUX_VERSION ?= "5.4.203"
>  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
>  
>  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
> @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native"
>  KMETA = "kernel-meta"
>  KCONF_BSP_AUDIT_LEVEL = "2"
>  
> -SRCREV_machine_qemuarm ?= "a117c8494d49f5ab6ec54a69c0f926bad5d55616"
> -SRCREV_machine ?= "fbc1147bd48ea6b51895e8ab9d6422d112cdd58a"
> -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> +SRCREV_machine_qemuarm ?= "d92cd7d5916772a20105ef776c7f3bf433df55a4"
> +SRCREV_machine ?= "5f7c3e952857eb90a4113a41901bb770150af46b"
> +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
>  
>  PV = "${LINUX_VERSION}+git${SRCPV}"
>  
> diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> index e2130386b2..545c754c1d 100644
> --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> +++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> @@ -12,16 +12,16 @@ KBRANCH_qemux86  ?= "v5.4/standard/base"
>  KBRANCH_qemux86-64 ?= "v5.4/standard/base"
>  KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64"
>  
> -SRCREV_machine_qemuarm ?= "3bc1fc1cd35bd8f95e80fb49627c2f6977debc84"
> -SRCREV_machine_qemuarm64 ?= "c048122124fdbd78d02ac64ef6558503e7536f7b"
> -SRCREV_machine_qemumips ?= "19fc003e228a56e30943ddcba0614de6365e2740"
> -SRCREV_machine_qemuppc ?= "ef263615ec81ddfac29c82c5c61f6195dde31944"
> -SRCREV_machine_qemuriscv64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> -SRCREV_machine_qemux86 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> -SRCREV_machine_qemux86-64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> -SRCREV_machine_qemumips64 ?= "9ee7899b379b865fe676d50be29162845c9a9ee3"
> -SRCREV_machine ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> +SRCREV_machine_qemuarm ?= "bf4029e0d9ff2e65d654909d7e9df50dce294c77"
> +SRCREV_machine_qemuarm64 ?= "3e0dab732964f7bbc26671fee05be420fd02890a"
> +SRCREV_machine_qemumips ?= "e8bea70e0c6a527383f2351e4f3d189aedf543a3"
> +SRCREV_machine_qemuppc ?= "24cc2a066b8151925fdf86136b70b63cf37cc540"
> +SRCREV_machine_qemuriscv64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> +SRCREV_machine_qemux86 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> +SRCREV_machine_qemux86-64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> +SRCREV_machine_qemumips64 ?= "5a5e07ef8df0e73b2f318b921f9262b49a6125d5"
> +SRCREV_machine ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
>  
>  # remap qemuarm to qemuarma15 for the 5.4 kernel
>  # KMACHINE_qemuarm ?= "qemuarma15"
> @@ -30,7 +30,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
>             git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
>  
>  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> -LINUX_VERSION ?= "5.4.199"
> +LINUX_VERSION ?= "5.4.203"
>  
>  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
>  DEPENDS += "openssl-native util-linux-native"
> -- 
> 2.19.1
>
Denys Dmytriyenko July 18, 2022, 6:19 p.m. UTC | #2
Oops, Richard's alias didn't get resolved properly the first time, sorry

On Mon, Jul 18, 2022 at 02:06:52PM -0400, Denys Dmytriyenko wrote:
> There's been some rework done around random subsystem lately. It now breaks RT 
> kernel, at least on Aarch64, x86_64, maybe other platforms. Is there a quick 
> fix, or should this update be reverted in Dunfell?
> 
> 
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:39:45: warning: 'struct random_ready_callback' declared inside parameter list will not be visible outside of this definition or declaration
> |    39 | extern int add_random_ready_callback(struct random_ready_callback *rdy);
> |       |                                             ^~~~~~~~~~~~~~~~~~~~~
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:40:46: warning: 'struct random_ready_callback' declared inside parameter list will not be visible outside of this definition or declaration
> |    40 | extern void del_random_ready_callback(struct random_ready_callback *rdy);
> |       |                                              ^~~~~~~~~~~~~~~~~~~~~
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:47:6: error: conflicting types for 'get_random_bytes'
> |    47 | void get_random_bytes(void *buf, size_t len);
> |       |      ^~~~~~~~~~~~~~~~
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:35:13: note: previous declaration of 'get_random_bytes' was here
> |    35 | extern void get_random_bytes(void *buf, int nbytes);
> |       |             ^~~~~~~~~~~~~~~~
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:48:21: error: conflicting types for 'get_random_bytes_arch'
> |    48 | size_t __must_check get_random_bytes_arch(void *buf, size_t len);
> |       |                     ^~~~~~~~~~~~~~~~~~~~~
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:41:25: note: previous declaration of 'get_random_bytes_arch' was here
> |    41 | extern int __must_check get_random_bytes_arch(void *buf, int nbytes);
> |       |                         ^~~~~~~~~~~~~~~~~~~~~
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/scripts/Makefile.build:99: recipe for target 'arch/arm64/kernel/asm-offsets.s' failed
> | make[2]: *** [arch/arm64/kernel/asm-offsets.s] Error 1
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:1134: recipe for target 'prepare0' failed
> | make[1]: *** [prepare0] Error 2
> | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:179: recipe for target 'sub-make' failed
> | make: *** [sub-make] Error 2
> | ERROR: oe_runmake failed
> | WARNING: exit code 1 from a shell command.
> | ERROR: Execution of '/OE/poky-dunfell/build/tmp/work/qemuarm64-poky-linux/linux-yocto-rt/5.4.203+gitAUTOINC+010ac788e8_fa8536530b-r0/temp/run.do_compile.240410' failed with exit code 1
> ERROR: Task (/OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile) failed with exit code '1'
> NOTE: Tasks Summary: Attempted 586 tasks of which 465 didn't need to be rerun and 1 failed.
> 
> Summary: 1 task failed:
>   /OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile
> Summary: There were 2 ERROR messages shown, returning a non-zero exit code.
> 
> 
> On Thu, Jul 07, 2022 at 12:38:27PM -0400, Bruce Ashfield wrote:
> > From: Bruce Ashfield <bruce.ashfield@gmail.com>
> > 
> > Updating  to the latest korg -stable release that comprises
> > the following commits:
> > 
> >     871cbc208bf0 Linux 5.4.203
> >     572cc34503d4 crypto: arm/ghash-ce - define fpu before fpu registers are referenced
> >     3bf992f9d9a8 crypto: arm - use Kconfig based compiler checks for crypto opcodes
> >     1b43c30cd5d5 ARM: 9029/1: Make iwmmxt.S support Clang's integrated assembler
> >     9e00e5d195ed ARM: OMAP2+: drop unnecessary adrl
> >     3657432a75e3 ARM: 8929/1: use APSR_nzcv instead of r15 as mrc operand
> >     02c200fdba46 ARM: 8933/1: replace Sun/Solaris style flag on section directive
> >     54e6ecd5b7ca crypto: arm/sha512-neon - avoid ADRL pseudo instruction
> >     5e6f80033286 crypto: arm/sha256-neon - avoid ADRL pseudo instruction
> >     e120403c0e7c ARM: 8971/1: replace the sole use of a symbol with its definition
> >     0a43679016f0 ARM: 8990/1: use VFP assembler mnemonics in register load/store macros
> >     472671eec98a ARM: 8989/1: use .fpu assembler directives instead of assembler arguments
> >     2bfb0d43a47c net: mscc: ocelot: allow unregistered IP multicast flooding
> >     223d551a6681 kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
> >     ab3ed204a146 powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
> >     77e2ad091850 drm: remove drm_fb_helper_modinit
> >     9ef3ad40a81f Linux 5.4.202
> >     ceda71d49f6b powerpc/pseries: wire up rng during setup_arch()
> >     ece983890287 kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt)
> >     2a81e813141e random: update comment from copy_to_user() -> copy_to_iter()
> >     80f0038d757e modpost: fix section mismatch check for exported init/exit sections
> >     d1359e4129ad ARM: cns3xxx: Fix refcount leak in cns3xxx_init
> >     29ca9c4efacc ARM: Fix refcount leak in axxia_boot_secondary
> >     734a4d15142b soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
> >     f9b77a529375 ARM: exynos: Fix refcount leak in exynos_map_pmu
> >     615907ccc421 ARM: dts: imx6qdl: correct PU regulator ramp delay
> >     93e6137d2a5b powerpc/powernv: wire up rng during setup_arch
> >     97808c781721 powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
> >     b6232979320a powerpc: Enable execve syscall exit tracepoint
> >     e0701f150b28 parisc: Enable ARCH_HAS_STRICT_MODULE_RWX
> >     e5234a9d64a9 xtensa: Fix refcount leak bug in time.c
> >     a52972ee706b xtensa: xtfpga: Fix refcount leak bug in setup
> >     f0fc7cdf5f19 iio: adc: axp288: Override TS pin bias current for some models
> >     11c7ea38be91 iio: adc: stm32: fix maximum clock rate for stm32mp15x
> >     5e39397d60da iio: trigger: sysfs: fix use-after-free on remove
> >     6d2e68d02171 iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
> >     1ad6d668543d iio: accel: mma8452: ignore the return value of reset operation
> >     a391bced8404 iio:accel:mxc4005: rearrange iio trigger get and register
> >     23c158caa032 iio:accel:bma180: rearrange iio trigger get and register
> >     8ea16a64aafc iio:chemical:ccs811: rearrange iio trigger get and register
> >     2333db14d875 usb: chipidea: udc: check request status before setting device address
> >     47e41b4dabbf xhci: turn off port power in shutdown
> >     d62d1c606db0 iio: adc: vf610: fix conversion mode sysfs node name
> >     741b6c8363c2 s390/cpumf: Handle events cycles and instructions identical
> >     4837d1c81223 gpio: winbond: Fix error code in winbond_gpio_get()
> >     bb18ad00c0b7 Revert "net/tls: fix tls_sk_proto_close executed repeatedly"
> >     8c7a32b7c155 virtio_net: fix xdp_rxq_info bug after suspend/resume
> >     28a78414f21e igb: Make DMA faster when CPU is active on the PCIe link
> >     a5ed066bc246 regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips
> >     844168a5dabf ice: ethtool: advertise 1000M speeds properly
> >     e3a232e57670 afs: Fix dynamic root getattr
> >     cacab1e620e0 MIPS: Remove repetitive increase irq_err_count
> >     788c954f194c x86/xen: Remove undefined behavior in setup_features()
> >     c7bdaad9cbfe udmabuf: add back sanity check
> >     05c6c36c7931 net/tls: fix tls_sk_proto_close executed repeatedly
> >     02da602bc2f3 erspan: do not assume transport header is always set
> >     d1592d3e362c drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
> >     f1f9c2a5a3d9 net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
> >     47d31b97bf47 bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
> >     104a59b74577 phy: aquantia: Fix AN when higher speeds than 1G are not advertised
> >     8ffe2e50e967 bpf: Fix request_sock leak in sk lookup helpers
> >     f074ab253988 USB: serial: option: add Quectel RM500K module support
> >     ea7b23eadebc USB: serial: option: add Quectel EM05-G modem
> >     613c849d73df USB: serial: option: add Telit LE910Cx 0x1250 composition
> >     ae183969bd66 random: quiet urandom warning ratelimit suppression message
> >     06a24ddba93a dm mirror log: clear log bits up to BITS_PER_LONG boundary
> >     1f350f3cf0c1 dm era: commit metadata in postsuspend after worker stops
> >     0e75acbe1b76 ata: libata: add qc->flags in ata_qc_complete_template tracepoint
> >     71c76f56b97c mtd: rawnand: gpmi: Fix setting busy timeout setting
> >     c8d37e6ca180 mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing
> >     af28f602df74 net: openvswitch: fix parsing of nw_proto for IPv6 fragments
> >     6fda65dabd3e ALSA: hda/realtek: Add quirk for Clevo PD70PNT
> >     5fbad99e76c0 ALSA: hda/realtek - ALC897 headset MIC no sound
> >     cf81f367cf81 ALSA: hda/conexant: Fix missing beep setup
> >     eca9b5e36e24 ALSA: hda/via: Fix missing beep setup
> >     1df5178fdebe random: schedule mix_interrupt_randomness() less often
> >     c87e851b23e5 vt: drop old FONT ioctls
> >     23db944f754e Linux 5.4.201
> >     3994d2ee55e2 Revert "hwmon: Make chip parameter for with_info API mandatory"
> >     7b9c3bfbad25 arm64: mm: Don't invalidate FROM_DEVICE buffers at start of DMA transfer
> >     2e1591c27b95 tcp: drop the hash_32() part from the index calculation
> >     c26e1addf157 tcp: increase source port perturb table to 2^16
> >     77d29f3b18c4 tcp: dynamically allocate the perturb table used by source ports
> >     7c0a777b7dbd tcp: add small random increments to the source port
> >     53c5de3092ad tcp: use different parts of the port_offset for index and offset
> >     95921a3bab76 tcp: add some entropy in __inet_hash_connect()
> >     bdcbf2602feb usb: gadget: u_ether: fix regression in setting fixed MAC address
> >     2577d67a9a8a dm: remove special-casing of bio-based immutable singleton target on NVMe
> >     4143503b486a s390/mm: use non-quiescing sske for KVM switch to keyed guest
> >     f0c280af0ec7 Linux 5.4.200
> >     ab8dff4b716e powerpc/mm: Switch obsolete dssall to .long
> >     1a48a41f1422 riscv: Less inefficient gcc tishift helpers (and export their symbols)
> >     2464a1c0de53 RISC-V: fix barrier() use in <vdso/processor.h>
> >     490a02cd8205 arm64: kprobes: Use BRK instead of single-step when executing instructions out-of-line
> >     ef6f9ce0a79a net: openvswitch: fix leak of nested actions
> >     6bb3c77c74f5 net: openvswitch: fix misuse of the cached connection on tuple changes
> >     b47319b4aa21 net/sched: act_police: more accurate MTU policing
> >     13fbdea1184b virtio-pci: Remove wrong address verification in vp_del_vqs()
> >     80e4d8a27451 ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
> >     119e0268cc1c ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8
> >     fba542891767 ext4: add reserved GDT blocks check
> >     4ca0d2f1e04e ext4: make variable "count" signed
> >     a6b31616e5af ext4: fix bug_on ext4_mb_use_inode_pa
> >     ae4603128751 dm mirror log: round up region bitmap size to BITS_PER_LONG
> >     64d2df648003 serial: 8250: Store to lsr_save_flags after lsr read
> >     b75bddfcc181 usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
> >     6506aff2dc2f usb: dwc2: Fix memory leak in dwc2_hcd_init
> >     940653b51c33 USB: serial: io_ti: add Agilent E5805A support
> >     31363b2b868e USB: serial: option: add support for Cinterion MV31 with new baseline
> >     d0c3730f2763 comedi: vmk80xx: fix expression for tx buffer size
> >     bf833c484881 i2c: designware: Use standard optional ref clock implementation
> >     8d884c08eeb8 irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
> >     58e67c81e229 irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
> >     56526c3883fc irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
> >     4695bafabf5b faddr2line: Fix overlapping text section failures, the sequel
> >     1b34d6a93832 certs/blacklist_hashes.c: fix const confusion in certs blacklist
> >     fb775ee3cfff arm64: ftrace: fix branch range checks
> >     0e21311ba459 net: bgmac: Fix an erroneous kfree() in bgmac_remove()
> >     c19cdd72b3ec mlxsw: spectrum_cnt: Reorder counter pools
> >     c03304dc4234 misc: atmel-ssc: Fix IRQ check in ssc_probe
> >     f7183c76d500 tty: goldfish: Fix free_irq() on remove
> >     ff6e03fe84bc i40e: Fix call trace in setup_tx_descriptors
> >     4b94408e1617 i40e: Fix calculating the number of queue pairs
> >     43f65970eeb2 i40e: Fix adding ADQ filter to TC0
> >     cff3a7ce6e81 clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()
> >     11c870c0b532 pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
> >     e32fe87afcfe random: credit cpu and bootloader seeds by default
> >     9e4cab02b7ec net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
> >     2f42389d270f ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
> >     6b4d8b44e716 nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
> >     786428a1dec2 virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
> >     aacb264d54c4 ALSA: hda/realtek - Add HW8326 support
> >     ff882404dff7 scsi: pmcraid: Fix missing resource cleanup in error case
> >     c48119223618 scsi: ipr: Fix missing/incorrect resource cleanup in error case
> >     fe0855944a64 scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion
> >     1f1be79189fd scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
> >     001de3d8ce82 scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
> >     9e3a0d3fc71c ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put()
> >     bc046649c5d6 ASoC: es8328: Fix event generation for deemphasis control
> >     a81f5a7f7a20 ASoC: wm8962: Fix suspend while playing music
> >     253334f84c81 ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
> >     052cd621acbf ASoC: cs42l56: Correct typo in minimum level for SX volume controls
> >     6d180913b3ab ASoC: cs42l52: Correct TLV for Bypass Volume
> >     385a031c56a9 ASoC: cs53l30: Correct number of volume levels on SX controls
> >     675b6a49cf70 ASoC: cs35l36: Update digital volume TLV
> >     b00f63dba5b8 ASoC: cs42l52: Fix TLV scales for mixer controls
> >     cd8c1e6c01f1 dma-debug: make things less spammy under memory pressure
> >     a45e19fd6ed8 ASoC: nau8822: Add operation for internal PLL off and on
> >     348831a9e8aa powerpc/kasan: Silence KASAN warnings in __get_wchan()
> >     5624055c8f4b random: account for arch randomness in bits
> >     c0bf6bfce70a random: mark bootloader randomness code as __init
> >     f96250197b43 random: avoid checking crng_ready() twice in random_init()
> >     072cd87d12a8 crypto: drbg - make reseeding from get_random_bytes() synchronous
> >     e9eb0c4741a7 crypto: drbg - always try to free Jitter RNG instance
> >     f284afc3a9ca crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
> >     babba4bf53a6 crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
> >     1b93b302e942 crypto: drbg - prepare for more fine-grained tracking of seeding state
> >     98e574a73414 crypto: drbg - always seeded with SP800-90B compliant noise source
> >     61f87ea3f957 Revert "random: use static branch for crng_ready()"
> >     3faf33a85650 random: check for signals after page of pool writes
> >     2177cef53ec9 random: wire up fops->splice_{read,write}_iter()
> >     35db2a073118 random: convert to using fops->write_iter()
> >     43e62db84a99 random: convert to using fops->read_iter()
> >     c23188facd10 random: unify batched entropy implementations
> >     1aeedbe02b5c random: move randomize_page() into mm where it belongs
> >     ceaf1feefe6e random: move initialization functions out of hot pages
> >     d3bf98d61fb6 random: make consistent use of buf and len
> >     70fce7f105bb random: use proper return types on get_random_{int,long}_wait()
> >     d05948dc23e6 random: remove extern from functions in header
> >     d8b4296417ea random: use static branch for crng_ready()
> >     087a14b9cf9b random: credit architectural init the exact amount
> >     ac48f7bee198 random: handle latent entropy and command line from random_init()
> >     736a22645d98 random: use proper jiffies comparison macro
> >     3266fba20661 random: remove ratelimiting for in-kernel unseeded randomness
> >     c5373bd6e4fb random: move initialization out of reseeding hot path
> >     0747ad152fa1 random: avoid initializing twice in credit race
> >     0baeec0effc7 random: use symbolic constants for crng_init states
> >     55d64df3ad5b siphash: use one source of truth for siphash permutations
> >     e4e8a9f8a616 random: help compiler out with fast_mix() by using simpler arguments
> >     bf3b51eb0f13 random: do not use input pool from hard IRQs
> >     6d4203a2cddc random: order timer entropy functions below interrupt functions
> >     58da574f105a random: do not pretend to handle premature next security model
> >     e739d5bd1466 random: use first 128 bits of input as fast init
> >     c44f8b386376 random: do not use batches when !crng_ready()
> >     e247ea8d97bf random: insist on random_get_entropy() existing in order to simplify
> >     9bfbcb37e5f6 xtensa: use fallback for random_get_entropy() instead of zero
> >     fa15650b51f6 sparc: use fallback for random_get_entropy() instead of zero
> >     9dfc14590c5d um: use fallback for random_get_entropy() instead of zero
> >     0cc41e2c73f7 x86/tsc: Use fallback for random_get_entropy() instead of zero
> >     f2a6e8727084 nios2: use fallback for random_get_entropy() instead of zero
> >     db1d13fe4c80 arm: use fallback for random_get_entropy() instead of zero
> >     6fa912f987fa mips: use fallback for random_get_entropy() instead of just c0 random
> >     36f38f838c5b m68k: use fallback for random_get_entropy() instead of zero
> >     a7d04ca9da61 timekeeping: Add raw clock fallback for random_get_entropy()
> >     eb2f9d72f32a powerpc: define get_cycles macro for arch-override
> >     10455a367c33 alpha: define get_cycles macro for arch-override
> >     5f0b77ca1978 parisc: define get_cycles macro for arch-override
> >     80459abc9fee s390: define get_cycles macro for arch-override
> >     73385644490a ia64: define get_cycles macro for arch-override
> >     5fac86663976 init: call time_init() before rand_initialize()
> >     b88ae87b100c random: fix sysctl documentation nits
> >     465425748359 random: document crng_fast_key_erasure() destination possibility
> >     ec07b3494517 random: make random_get_entropy() return an unsigned long
> >     fe156368f987 random: allow partial reads if later user copies fail
> >     70788723da70 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
> >     2ce859d91fe9 random: check for signal_pending() outside of need_resched() check
> >     0e8030c9e03d random: do not allow user to keep crng key around on stack
> >     95aed891f7be random: do not split fast init input in add_hwgenerator_randomness()
> >     1d53d5a0973e random: mix build-time latent entropy into pool at init
> >     0aba75c6173d random: re-add removed comment about get_random_{u32,u64} reseeding
> >     81ea8a609b48 random: treat bootloader trust toggle the same way as cpu trust toggle
> >     a08d52a6081b random: skip fast_init if hwrng provides large chunk of entropy
> >     8320bc665c29 random: check for signal and try earlier when generating entropy
> >     3a53b818bb0e random: reseed more often immediately after booting
> >     905759e0fc17 random: make consistent usage of crng_ready()
> >     ad4c6bd98c54 random: use SipHash as interrupt entropy accumulator
> >     631503001ccf random: replace custom notifier chain with standard one
> >     1ae73fb2a635 random: don't let 644 read-only sysctls be written to
> >     ed409757100b random: give sysctl_random_min_urandom_seed a more sensible value
> >     75d95c1b5dea random: do crng pre-init loading in worker rather than irq
> >     219c84fe93e5 random: unify cycles_t and jiffies usage and types
> >     673637c4c9e0 random: cleanup UUID handling
> >     4d5151cc288a random: only wake up writers after zap if threshold was passed
> >     ac0081dec7d6 random: round-robin registers as ulong, not u32
> >     62cd795e465a random: clear fast pool, crng, and batches in cpuhp bring up
> >     a7f8f385bb6f random: pull add_hwgenerator_randomness() declaration into random.h
> >     ff607fc7607d random: check for crng_init == 0 in add_device_randomness()
> >     20788eb4ce70 random: unify early init crng load accounting
> >     49567f947735 random: do not take pool spinlock at boot
> >     4a61bf7f9b18 random: defer fast pool mixing to worker
> >     944d1bd0e5be random: rewrite header introductory comment
> >     c0e35949c736 random: group sysctl functions
> >     d946084180ee random: group userspace read/write functions
> >     565a66043bdf random: group entropy collection functions
> >     f2d587c493fc random: group entropy extraction functions
> >     a8786d54762f random: group crng functions
> >     c12dfec1aacf random: group initialization wait functions
> >     22e3db57ab94 random: remove whitespace and reorder includes
> >     cee64be60591 random: remove useless header comment
> >     904e6123c400 random: introduce drain_entropy() helper to declutter crng_reseed()
> >     47c56790d51c random: deobfuscate irq u32/u64 contributions
> >     e280b79c3127 random: add proper SPDX header
> >     776927dfd4ac random: remove unused tracepoints
> >     d68883956d36 random: remove ifdef'd out interrupt bench
> >     4a14a5a6969a random: tie batched entropy generation to base_crng generation
> >     d8a6684950c1 random: fix locking for crng_init in crng_reseed()
> >     b1d561138150 random: zero buffer after reading entropy from userspace
> >     21da00f8cb3a random: remove outdated INT_MAX >> 6 check in urandom_read()
> >     b530684129b2 random: make more consistent use of integer types
> >     3eed6af93ecd random: use hash function for crng_slow_load()
> >     cee3c7056900 random: use simpler fast key erasure flow on per-cpu keys
> >     ea9941fd6e26 random: absorb fast pool into input pool after fast load
> >     a3562bf4e8c9 random: do not xor RDRAND when writing into /dev/random
> >     574c8839504b random: ensure early RDSEED goes through mixer on init
> >     d3d3c1c214c3 random: inline leaves of rand_initialize()
> >     817315517af9 random: get rid of secondary crngs
> >     c15fc80b7df0 random: use RDSEED instead of RDRAND in entropy extraction
> >     72db8151c889 random: fix locking in crng_fast_load()
> >     7229c6d90a1a random: remove batched entropy locking
> >     6c8911579221 random: remove use_input_pool parameter from crng_reseed()
> >     4ef908fb81d9 random: make credit_entropy_bits() always safe
> >     42a9a7e80750 random: always wake up entropy writers after extraction
> >     373ef51f3e8a random: use linear min-entropy accumulation crediting
> >     a1a2bae5ef93 random: simplify entropy debiting
> >     4e5814bd2e75 random: use computational hash for entropy extraction
> >     99a0f8e22d4c random: only call crng_finalize_init() for primary_crng
> >     88609b892fdd random: access primary_pool directly rather than through pointer
> >     0b9f9b94f1ea random: continually use hwgenerator randomness
> >     811e333c4eb2 random: simplify arithmetic function flow in account()
> >     56de23dcf9d0 random: selectively clang-format where it makes sense
> >     86eac12b1cf5 random: access input_pool_data directly rather than through pointer
> >     4f5400ca7fc1 random: cleanup fractional entropy shift constants
> >     1b6f1d32a858 random: prepend remaining pool constants with POOL_
> >     0fe4a64fd946 random: de-duplicate INPUT_POOL constants
> >     e35576c4cb18 random: remove unused OUTPUT_POOL constants
> >     74cb3093f2de random: rather than entropy_store abstraction, use global
> >     14652d864280 random: remove unused extract_entropy() reserved argument
> >     12f17e3f3a14 random: remove incomplete last_data logic
> >     adcbbb44ccc1 random: cleanup integer types
> >     4ac4c7f057ff random: cleanup poolinfo abstraction
> >     5c3818e3bd7b random: fix typo in comments
> >     0a7e65810269 random: don't reset crng_init_cnt on urandom_read()
> >     8d7c55563ed0 random: avoid superfluous call to RDRAND in CRNG extraction
> >     8b4695640bc5 random: early initialization of ChaCha constants
> >     cfc69065005e random: initialize ChaCha20 constants with correct endianness
> >     922d082e3363 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
> >     565b3af16894 random: harmonize "crng init done" messages
> >     346c4a697c29 random: mix bootloader randomness into pool
> >     afce74c0c04f random: do not re-init if crng_reseed completes before primary init
> >     d76758c71209 random: do not sign extend bytes for rotation when mixing
> >     c2f0a89cd1d5 random: use BLAKE2s instead of SHA1 in extraction
> >     6e6ae70c1eac random: remove unused irq_flags argument from add_interrupt_randomness()
> >     2580b0b3fd5a random: document add_hwgenerator_randomness() with other input functions
> >     3cc36a4aa1ca crypto: blake2s - adjust include guard naming
> >     09342a544c4b crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
> >     f850f3643d6b MAINTAINERS: co-maintain random.c
> >     967e3a136f9b random: remove dead code left over from blocking pool
> >     610f0b439a6b random: avoid arch_get_random_seed_long() when collecting IRQ randomness
> >     ad3fce669105 random: add arch_get_random_*long_early()
> >     41b0d3e86c50 powerpc: Use bool in archrandom.h
> >     89533373e11c linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
> >     0222f9f1d168 linux/random.h: Use false with bool
> >     15f93060b718 linux/random.h: Remove arch_has_random, arch_has_random_seed
> >     a95ed04e21da s390: Remove arch_has_random, arch_has_random_seed
> >     aab52172d9f9 powerpc: Remove arch_has_random, arch_has_random_seed
> >     35e28a05f659 x86: Remove arch_has_random, arch_has_random_seed
> >     98f749e29728 random: avoid warnings for !CONFIG_NUMA builds
> >     c13b9c3627d8 random: split primary/secondary crng init paths
> >     c070b07aaf34 random: remove some dead code of poolinfo
> >     898498bb4414 random: fix typo in add_timer_randomness()
> >     2c53d6d6a7be random: Add and use pr_fmt()
> >     f3375cfe31bc random: convert to ENTROPY_BITS for better code readability
> >     9f757cad20b7 random: remove unnecessary unlikely()
> >     4431c366fe23 random: remove kernel.random.read_wakeup_threshold
> >     ec134003cc39 random: delete code to pull data into pools
> >     a9564e14c6dd random: remove the blocking pool
> >     940cbc47b369 random: make /dev/random be almost like /dev/urandom
> >     c4edc1055c11 random: ignore GRND_RANDOM in getentropy(2)
> >     7f9f864af021 random: add GRND_INSECURE to return best-effort non-cryptographic bytes
> >     479d39707ff7 random: Add a urandom_read_nowait() for random APIs that don't warn
> >     69441ba56f13 random: Don't wake crng_init_wait when crng_init == 1
> >     69ef3109d422 random: don't forget compat_ioctl on urandom
> >     927fc225af29 compat_ioctl: remove /dev/random commands
> >     996fba14fa35 lib/crypto: sha1: re-roll loops to reduce code size
> >     c4f48374407b lib/crypto: blake2s: move hmac construction into wireguard
> >     97126d2f65b3 crypto: blake2s - generic C library implementation and selftest
> >     76101f1b7f59 nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
> >     e804587ecdcd bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
> >     f91da317e6fa 9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
> > 
> > Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
> > ---
> >  .../linux/linux-yocto-rt_5.4.bb               |  6 ++---
> >  .../linux/linux-yocto-tiny_5.4.bb             |  8 +++----
> >  meta/recipes-kernel/linux/linux-yocto_5.4.bb  | 22 +++++++++----------
> >  3 files changed, 18 insertions(+), 18 deletions(-)
> > 
> > diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > index 2fef4f032d..7fa1b81229 100644
> > --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > @@ -11,13 +11,13 @@ python () {
> >          raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
> >  }
> >  
> > -SRCREV_machine ?= "d7693f19702e1fa1bb18507260198478cba0d6a2"
> > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > +SRCREV_machine ?= "fa8536530bdd6a87856aa6fe0af4f9ef4af21fe0"
> > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> >  
> >  SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \
> >             git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
> >  
> > -LINUX_VERSION ?= "5.4.199"
> > +LINUX_VERSION ?= "5.4.203"
> >  
> >  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> >  
> > diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > index 32ff438a57..d08658cf7e 100644
> > --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig"
> >  
> >  require recipes-kernel/linux/linux-yocto.inc
> >  
> > -LINUX_VERSION ?= "5.4.199"
> > +LINUX_VERSION ?= "5.4.203"
> >  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> >  
> >  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
> > @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native"
> >  KMETA = "kernel-meta"
> >  KCONF_BSP_AUDIT_LEVEL = "2"
> >  
> > -SRCREV_machine_qemuarm ?= "a117c8494d49f5ab6ec54a69c0f926bad5d55616"
> > -SRCREV_machine ?= "fbc1147bd48ea6b51895e8ab9d6422d112cdd58a"
> > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > +SRCREV_machine_qemuarm ?= "d92cd7d5916772a20105ef776c7f3bf433df55a4"
> > +SRCREV_machine ?= "5f7c3e952857eb90a4113a41901bb770150af46b"
> > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> >  
> >  PV = "${LINUX_VERSION}+git${SRCPV}"
> >  
> > diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > index e2130386b2..545c754c1d 100644
> > --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > +++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > @@ -12,16 +12,16 @@ KBRANCH_qemux86  ?= "v5.4/standard/base"
> >  KBRANCH_qemux86-64 ?= "v5.4/standard/base"
> >  KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64"
> >  
> > -SRCREV_machine_qemuarm ?= "3bc1fc1cd35bd8f95e80fb49627c2f6977debc84"
> > -SRCREV_machine_qemuarm64 ?= "c048122124fdbd78d02ac64ef6558503e7536f7b"
> > -SRCREV_machine_qemumips ?= "19fc003e228a56e30943ddcba0614de6365e2740"
> > -SRCREV_machine_qemuppc ?= "ef263615ec81ddfac29c82c5c61f6195dde31944"
> > -SRCREV_machine_qemuriscv64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > -SRCREV_machine_qemux86 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > -SRCREV_machine_qemux86-64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > -SRCREV_machine_qemumips64 ?= "9ee7899b379b865fe676d50be29162845c9a9ee3"
> > -SRCREV_machine ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > +SRCREV_machine_qemuarm ?= "bf4029e0d9ff2e65d654909d7e9df50dce294c77"
> > +SRCREV_machine_qemuarm64 ?= "3e0dab732964f7bbc26671fee05be420fd02890a"
> > +SRCREV_machine_qemumips ?= "e8bea70e0c6a527383f2351e4f3d189aedf543a3"
> > +SRCREV_machine_qemuppc ?= "24cc2a066b8151925fdf86136b70b63cf37cc540"
> > +SRCREV_machine_qemuriscv64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > +SRCREV_machine_qemux86 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > +SRCREV_machine_qemux86-64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > +SRCREV_machine_qemumips64 ?= "5a5e07ef8df0e73b2f318b921f9262b49a6125d5"
> > +SRCREV_machine ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> >  
> >  # remap qemuarm to qemuarma15 for the 5.4 kernel
> >  # KMACHINE_qemuarm ?= "qemuarma15"
> > @@ -30,7 +30,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
> >             git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
> >  
> >  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > -LINUX_VERSION ?= "5.4.199"
> > +LINUX_VERSION ?= "5.4.203"
> >  
> >  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
> >  DEPENDS += "openssl-native util-linux-native"
> > -- 
> > 2.19.1
> >
Bruce Ashfield July 19, 2022, 3:45 a.m. UTC | #3
We fixed this for 5.10/5.15, but missed 5.4.

I ported the fix from those kernels to 5.4, and it now builds fine here.

patch has been sent to the list.

Bruce

On Mon, Jul 18, 2022 at 2:19 PM Denys Dmytriyenko <denis@denix.org> wrote:
>
> Oops, Richard's alias didn't get resolved properly the first time, sorry
>
> On Mon, Jul 18, 2022 at 02:06:52PM -0400, Denys Dmytriyenko wrote:
> > There's been some rework done around random subsystem lately. It now breaks RT
> > kernel, at least on Aarch64, x86_64, maybe other platforms. Is there a quick
> > fix, or should this update be reverted in Dunfell?
> >
> >
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:39:45: warning: 'struct random_ready_callback' declared inside parameter list will not be visible outside of this definition or declaration
> > |    39 | extern int add_random_ready_callback(struct random_ready_callback *rdy);
> > |       |                                             ^~~~~~~~~~~~~~~~~~~~~
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:40:46: warning: 'struct random_ready_callback' declared inside parameter list will not be visible outside of this definition or declaration
> > |    40 | extern void del_random_ready_callback(struct random_ready_callback *rdy);
> > |       |                                              ^~~~~~~~~~~~~~~~~~~~~
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:47:6: error: conflicting types for 'get_random_bytes'
> > |    47 | void get_random_bytes(void *buf, size_t len);
> > |       |      ^~~~~~~~~~~~~~~~
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:35:13: note: previous declaration of 'get_random_bytes' was here
> > |    35 | extern void get_random_bytes(void *buf, int nbytes);
> > |       |             ^~~~~~~~~~~~~~~~
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:48:21: error: conflicting types for 'get_random_bytes_arch'
> > |    48 | size_t __must_check get_random_bytes_arch(void *buf, size_t len);
> > |       |                     ^~~~~~~~~~~~~~~~~~~~~
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:41:25: note: previous declaration of 'get_random_bytes_arch' was here
> > |    41 | extern int __must_check get_random_bytes_arch(void *buf, int nbytes);
> > |       |                         ^~~~~~~~~~~~~~~~~~~~~
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/scripts/Makefile.build:99: recipe for target 'arch/arm64/kernel/asm-offsets.s' failed
> > | make[2]: *** [arch/arm64/kernel/asm-offsets.s] Error 1
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:1134: recipe for target 'prepare0' failed
> > | make[1]: *** [prepare0] Error 2
> > | /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:179: recipe for target 'sub-make' failed
> > | make: *** [sub-make] Error 2
> > | ERROR: oe_runmake failed
> > | WARNING: exit code 1 from a shell command.
> > | ERROR: Execution of '/OE/poky-dunfell/build/tmp/work/qemuarm64-poky-linux/linux-yocto-rt/5.4.203+gitAUTOINC+010ac788e8_fa8536530b-r0/temp/run.do_compile.240410' failed with exit code 1
> > ERROR: Task (/OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile) failed with exit code '1'
> > NOTE: Tasks Summary: Attempted 586 tasks of which 465 didn't need to be rerun and 1 failed.
> >
> > Summary: 1 task failed:
> >   /OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile
> > Summary: There were 2 ERROR messages shown, returning a non-zero exit code.
> >
> >
> > On Thu, Jul 07, 2022 at 12:38:27PM -0400, Bruce Ashfield wrote:
> > > From: Bruce Ashfield <bruce.ashfield@gmail.com>
> > >
> > > Updating  to the latest korg -stable release that comprises
> > > the following commits:
> > >
> > >     871cbc208bf0 Linux 5.4.203
> > >     572cc34503d4 crypto: arm/ghash-ce - define fpu before fpu registers are referenced
> > >     3bf992f9d9a8 crypto: arm - use Kconfig based compiler checks for crypto opcodes
> > >     1b43c30cd5d5 ARM: 9029/1: Make iwmmxt.S support Clang's integrated assembler
> > >     9e00e5d195ed ARM: OMAP2+: drop unnecessary adrl
> > >     3657432a75e3 ARM: 8929/1: use APSR_nzcv instead of r15 as mrc operand
> > >     02c200fdba46 ARM: 8933/1: replace Sun/Solaris style flag on section directive
> > >     54e6ecd5b7ca crypto: arm/sha512-neon - avoid ADRL pseudo instruction
> > >     5e6f80033286 crypto: arm/sha256-neon - avoid ADRL pseudo instruction
> > >     e120403c0e7c ARM: 8971/1: replace the sole use of a symbol with its definition
> > >     0a43679016f0 ARM: 8990/1: use VFP assembler mnemonics in register load/store macros
> > >     472671eec98a ARM: 8989/1: use .fpu assembler directives instead of assembler arguments
> > >     2bfb0d43a47c net: mscc: ocelot: allow unregistered IP multicast flooding
> > >     223d551a6681 kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
> > >     ab3ed204a146 powerpc/ftrace: Remove ftrace init tramp once kernel init is complete
> > >     77e2ad091850 drm: remove drm_fb_helper_modinit
> > >     9ef3ad40a81f Linux 5.4.202
> > >     ceda71d49f6b powerpc/pseries: wire up rng during setup_arch()
> > >     ece983890287 kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt)
> > >     2a81e813141e random: update comment from copy_to_user() -> copy_to_iter()
> > >     80f0038d757e modpost: fix section mismatch check for exported init/exit sections
> > >     d1359e4129ad ARM: cns3xxx: Fix refcount leak in cns3xxx_init
> > >     29ca9c4efacc ARM: Fix refcount leak in axxia_boot_secondary
> > >     734a4d15142b soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
> > >     f9b77a529375 ARM: exynos: Fix refcount leak in exynos_map_pmu
> > >     615907ccc421 ARM: dts: imx6qdl: correct PU regulator ramp delay
> > >     93e6137d2a5b powerpc/powernv: wire up rng during setup_arch
> > >     97808c781721 powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
> > >     b6232979320a powerpc: Enable execve syscall exit tracepoint
> > >     e0701f150b28 parisc: Enable ARCH_HAS_STRICT_MODULE_RWX
> > >     e5234a9d64a9 xtensa: Fix refcount leak bug in time.c
> > >     a52972ee706b xtensa: xtfpga: Fix refcount leak bug in setup
> > >     f0fc7cdf5f19 iio: adc: axp288: Override TS pin bias current for some models
> > >     11c7ea38be91 iio: adc: stm32: fix maximum clock rate for stm32mp15x
> > >     5e39397d60da iio: trigger: sysfs: fix use-after-free on remove
> > >     6d2e68d02171 iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
> > >     1ad6d668543d iio: accel: mma8452: ignore the return value of reset operation
> > >     a391bced8404 iio:accel:mxc4005: rearrange iio trigger get and register
> > >     23c158caa032 iio:accel:bma180: rearrange iio trigger get and register
> > >     8ea16a64aafc iio:chemical:ccs811: rearrange iio trigger get and register
> > >     2333db14d875 usb: chipidea: udc: check request status before setting device address
> > >     47e41b4dabbf xhci: turn off port power in shutdown
> > >     d62d1c606db0 iio: adc: vf610: fix conversion mode sysfs node name
> > >     741b6c8363c2 s390/cpumf: Handle events cycles and instructions identical
> > >     4837d1c81223 gpio: winbond: Fix error code in winbond_gpio_get()
> > >     bb18ad00c0b7 Revert "net/tls: fix tls_sk_proto_close executed repeatedly"
> > >     8c7a32b7c155 virtio_net: fix xdp_rxq_info bug after suspend/resume
> > >     28a78414f21e igb: Make DMA faster when CPU is active on the PCIe link
> > >     a5ed066bc246 regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips
> > >     844168a5dabf ice: ethtool: advertise 1000M speeds properly
> > >     e3a232e57670 afs: Fix dynamic root getattr
> > >     cacab1e620e0 MIPS: Remove repetitive increase irq_err_count
> > >     788c954f194c x86/xen: Remove undefined behavior in setup_features()
> > >     c7bdaad9cbfe udmabuf: add back sanity check
> > >     05c6c36c7931 net/tls: fix tls_sk_proto_close executed repeatedly
> > >     02da602bc2f3 erspan: do not assume transport header is always set
> > >     d1592d3e362c drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
> > >     f1f9c2a5a3d9 net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
> > >     47d31b97bf47 bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
> > >     104a59b74577 phy: aquantia: Fix AN when higher speeds than 1G are not advertised
> > >     8ffe2e50e967 bpf: Fix request_sock leak in sk lookup helpers
> > >     f074ab253988 USB: serial: option: add Quectel RM500K module support
> > >     ea7b23eadebc USB: serial: option: add Quectel EM05-G modem
> > >     613c849d73df USB: serial: option: add Telit LE910Cx 0x1250 composition
> > >     ae183969bd66 random: quiet urandom warning ratelimit suppression message
> > >     06a24ddba93a dm mirror log: clear log bits up to BITS_PER_LONG boundary
> > >     1f350f3cf0c1 dm era: commit metadata in postsuspend after worker stops
> > >     0e75acbe1b76 ata: libata: add qc->flags in ata_qc_complete_template tracepoint
> > >     71c76f56b97c mtd: rawnand: gpmi: Fix setting busy timeout setting
> > >     c8d37e6ca180 mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing
> > >     af28f602df74 net: openvswitch: fix parsing of nw_proto for IPv6 fragments
> > >     6fda65dabd3e ALSA: hda/realtek: Add quirk for Clevo PD70PNT
> > >     5fbad99e76c0 ALSA: hda/realtek - ALC897 headset MIC no sound
> > >     cf81f367cf81 ALSA: hda/conexant: Fix missing beep setup
> > >     eca9b5e36e24 ALSA: hda/via: Fix missing beep setup
> > >     1df5178fdebe random: schedule mix_interrupt_randomness() less often
> > >     c87e851b23e5 vt: drop old FONT ioctls
> > >     23db944f754e Linux 5.4.201
> > >     3994d2ee55e2 Revert "hwmon: Make chip parameter for with_info API mandatory"
> > >     7b9c3bfbad25 arm64: mm: Don't invalidate FROM_DEVICE buffers at start of DMA transfer
> > >     2e1591c27b95 tcp: drop the hash_32() part from the index calculation
> > >     c26e1addf157 tcp: increase source port perturb table to 2^16
> > >     77d29f3b18c4 tcp: dynamically allocate the perturb table used by source ports
> > >     7c0a777b7dbd tcp: add small random increments to the source port
> > >     53c5de3092ad tcp: use different parts of the port_offset for index and offset
> > >     95921a3bab76 tcp: add some entropy in __inet_hash_connect()
> > >     bdcbf2602feb usb: gadget: u_ether: fix regression in setting fixed MAC address
> > >     2577d67a9a8a dm: remove special-casing of bio-based immutable singleton target on NVMe
> > >     4143503b486a s390/mm: use non-quiescing sske for KVM switch to keyed guest
> > >     f0c280af0ec7 Linux 5.4.200
> > >     ab8dff4b716e powerpc/mm: Switch obsolete dssall to .long
> > >     1a48a41f1422 riscv: Less inefficient gcc tishift helpers (and export their symbols)
> > >     2464a1c0de53 RISC-V: fix barrier() use in <vdso/processor.h>
> > >     490a02cd8205 arm64: kprobes: Use BRK instead of single-step when executing instructions out-of-line
> > >     ef6f9ce0a79a net: openvswitch: fix leak of nested actions
> > >     6bb3c77c74f5 net: openvswitch: fix misuse of the cached connection on tuple changes
> > >     b47319b4aa21 net/sched: act_police: more accurate MTU policing
> > >     13fbdea1184b virtio-pci: Remove wrong address verification in vp_del_vqs()
> > >     80e4d8a27451 ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
> > >     119e0268cc1c ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8
> > >     fba542891767 ext4: add reserved GDT blocks check
> > >     4ca0d2f1e04e ext4: make variable "count" signed
> > >     a6b31616e5af ext4: fix bug_on ext4_mb_use_inode_pa
> > >     ae4603128751 dm mirror log: round up region bitmap size to BITS_PER_LONG
> > >     64d2df648003 serial: 8250: Store to lsr_save_flags after lsr read
> > >     b75bddfcc181 usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe
> > >     6506aff2dc2f usb: dwc2: Fix memory leak in dwc2_hcd_init
> > >     940653b51c33 USB: serial: io_ti: add Agilent E5805A support
> > >     31363b2b868e USB: serial: option: add support for Cinterion MV31 with new baseline
> > >     d0c3730f2763 comedi: vmk80xx: fix expression for tx buffer size
> > >     bf833c484881 i2c: designware: Use standard optional ref clock implementation
> > >     8d884c08eeb8 irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
> > >     58e67c81e229 irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
> > >     56526c3883fc irqchip/gic/realview: Fix refcount leak in realview_gic_of_init
> > >     4695bafabf5b faddr2line: Fix overlapping text section failures, the sequel
> > >     1b34d6a93832 certs/blacklist_hashes.c: fix const confusion in certs blacklist
> > >     fb775ee3cfff arm64: ftrace: fix branch range checks
> > >     0e21311ba459 net: bgmac: Fix an erroneous kfree() in bgmac_remove()
> > >     c19cdd72b3ec mlxsw: spectrum_cnt: Reorder counter pools
> > >     c03304dc4234 misc: atmel-ssc: Fix IRQ check in ssc_probe
> > >     f7183c76d500 tty: goldfish: Fix free_irq() on remove
> > >     ff6e03fe84bc i40e: Fix call trace in setup_tx_descriptors
> > >     4b94408e1617 i40e: Fix calculating the number of queue pairs
> > >     43f65970eeb2 i40e: Fix adding ADQ filter to TC0
> > >     cff3a7ce6e81 clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()
> > >     11c870c0b532 pNFS: Don't keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE
> > >     e32fe87afcfe random: credit cpu and bootloader seeds by default
> > >     9e4cab02b7ec net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag
> > >     2f42389d270f ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
> > >     6b4d8b44e716 nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred
> > >     786428a1dec2 virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed
> > >     aacb264d54c4 ALSA: hda/realtek - Add HW8326 support
> > >     ff882404dff7 scsi: pmcraid: Fix missing resource cleanup in error case
> > >     c48119223618 scsi: ipr: Fix missing/incorrect resource cleanup in error case
> > >     fe0855944a64 scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion
> > >     1f1be79189fd scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology
> > >     001de3d8ce82 scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
> > >     9e3a0d3fc71c ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put()
> > >     bc046649c5d6 ASoC: es8328: Fix event generation for deemphasis control
> > >     a81f5a7f7a20 ASoC: wm8962: Fix suspend while playing music
> > >     253334f84c81 ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
> > >     052cd621acbf ASoC: cs42l56: Correct typo in minimum level for SX volume controls
> > >     6d180913b3ab ASoC: cs42l52: Correct TLV for Bypass Volume
> > >     385a031c56a9 ASoC: cs53l30: Correct number of volume levels on SX controls
> > >     675b6a49cf70 ASoC: cs35l36: Update digital volume TLV
> > >     b00f63dba5b8 ASoC: cs42l52: Fix TLV scales for mixer controls
> > >     cd8c1e6c01f1 dma-debug: make things less spammy under memory pressure
> > >     a45e19fd6ed8 ASoC: nau8822: Add operation for internal PLL off and on
> > >     348831a9e8aa powerpc/kasan: Silence KASAN warnings in __get_wchan()
> > >     5624055c8f4b random: account for arch randomness in bits
> > >     c0bf6bfce70a random: mark bootloader randomness code as __init
> > >     f96250197b43 random: avoid checking crng_ready() twice in random_init()
> > >     072cd87d12a8 crypto: drbg - make reseeding from get_random_bytes() synchronous
> > >     e9eb0c4741a7 crypto: drbg - always try to free Jitter RNG instance
> > >     f284afc3a9ca crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
> > >     babba4bf53a6 crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
> > >     1b93b302e942 crypto: drbg - prepare for more fine-grained tracking of seeding state
> > >     98e574a73414 crypto: drbg - always seeded with SP800-90B compliant noise source
> > >     61f87ea3f957 Revert "random: use static branch for crng_ready()"
> > >     3faf33a85650 random: check for signals after page of pool writes
> > >     2177cef53ec9 random: wire up fops->splice_{read,write}_iter()
> > >     35db2a073118 random: convert to using fops->write_iter()
> > >     43e62db84a99 random: convert to using fops->read_iter()
> > >     c23188facd10 random: unify batched entropy implementations
> > >     1aeedbe02b5c random: move randomize_page() into mm where it belongs
> > >     ceaf1feefe6e random: move initialization functions out of hot pages
> > >     d3bf98d61fb6 random: make consistent use of buf and len
> > >     70fce7f105bb random: use proper return types on get_random_{int,long}_wait()
> > >     d05948dc23e6 random: remove extern from functions in header
> > >     d8b4296417ea random: use static branch for crng_ready()
> > >     087a14b9cf9b random: credit architectural init the exact amount
> > >     ac48f7bee198 random: handle latent entropy and command line from random_init()
> > >     736a22645d98 random: use proper jiffies comparison macro
> > >     3266fba20661 random: remove ratelimiting for in-kernel unseeded randomness
> > >     c5373bd6e4fb random: move initialization out of reseeding hot path
> > >     0747ad152fa1 random: avoid initializing twice in credit race
> > >     0baeec0effc7 random: use symbolic constants for crng_init states
> > >     55d64df3ad5b siphash: use one source of truth for siphash permutations
> > >     e4e8a9f8a616 random: help compiler out with fast_mix() by using simpler arguments
> > >     bf3b51eb0f13 random: do not use input pool from hard IRQs
> > >     6d4203a2cddc random: order timer entropy functions below interrupt functions
> > >     58da574f105a random: do not pretend to handle premature next security model
> > >     e739d5bd1466 random: use first 128 bits of input as fast init
> > >     c44f8b386376 random: do not use batches when !crng_ready()
> > >     e247ea8d97bf random: insist on random_get_entropy() existing in order to simplify
> > >     9bfbcb37e5f6 xtensa: use fallback for random_get_entropy() instead of zero
> > >     fa15650b51f6 sparc: use fallback for random_get_entropy() instead of zero
> > >     9dfc14590c5d um: use fallback for random_get_entropy() instead of zero
> > >     0cc41e2c73f7 x86/tsc: Use fallback for random_get_entropy() instead of zero
> > >     f2a6e8727084 nios2: use fallback for random_get_entropy() instead of zero
> > >     db1d13fe4c80 arm: use fallback for random_get_entropy() instead of zero
> > >     6fa912f987fa mips: use fallback for random_get_entropy() instead of just c0 random
> > >     36f38f838c5b m68k: use fallback for random_get_entropy() instead of zero
> > >     a7d04ca9da61 timekeeping: Add raw clock fallback for random_get_entropy()
> > >     eb2f9d72f32a powerpc: define get_cycles macro for arch-override
> > >     10455a367c33 alpha: define get_cycles macro for arch-override
> > >     5f0b77ca1978 parisc: define get_cycles macro for arch-override
> > >     80459abc9fee s390: define get_cycles macro for arch-override
> > >     73385644490a ia64: define get_cycles macro for arch-override
> > >     5fac86663976 init: call time_init() before rand_initialize()
> > >     b88ae87b100c random: fix sysctl documentation nits
> > >     465425748359 random: document crng_fast_key_erasure() destination possibility
> > >     ec07b3494517 random: make random_get_entropy() return an unsigned long
> > >     fe156368f987 random: allow partial reads if later user copies fail
> > >     70788723da70 random: check for signals every PAGE_SIZE chunk of /dev/[u]random
> > >     2ce859d91fe9 random: check for signal_pending() outside of need_resched() check
> > >     0e8030c9e03d random: do not allow user to keep crng key around on stack
> > >     95aed891f7be random: do not split fast init input in add_hwgenerator_randomness()
> > >     1d53d5a0973e random: mix build-time latent entropy into pool at init
> > >     0aba75c6173d random: re-add removed comment about get_random_{u32,u64} reseeding
> > >     81ea8a609b48 random: treat bootloader trust toggle the same way as cpu trust toggle
> > >     a08d52a6081b random: skip fast_init if hwrng provides large chunk of entropy
> > >     8320bc665c29 random: check for signal and try earlier when generating entropy
> > >     3a53b818bb0e random: reseed more often immediately after booting
> > >     905759e0fc17 random: make consistent usage of crng_ready()
> > >     ad4c6bd98c54 random: use SipHash as interrupt entropy accumulator
> > >     631503001ccf random: replace custom notifier chain with standard one
> > >     1ae73fb2a635 random: don't let 644 read-only sysctls be written to
> > >     ed409757100b random: give sysctl_random_min_urandom_seed a more sensible value
> > >     75d95c1b5dea random: do crng pre-init loading in worker rather than irq
> > >     219c84fe93e5 random: unify cycles_t and jiffies usage and types
> > >     673637c4c9e0 random: cleanup UUID handling
> > >     4d5151cc288a random: only wake up writers after zap if threshold was passed
> > >     ac0081dec7d6 random: round-robin registers as ulong, not u32
> > >     62cd795e465a random: clear fast pool, crng, and batches in cpuhp bring up
> > >     a7f8f385bb6f random: pull add_hwgenerator_randomness() declaration into random.h
> > >     ff607fc7607d random: check for crng_init == 0 in add_device_randomness()
> > >     20788eb4ce70 random: unify early init crng load accounting
> > >     49567f947735 random: do not take pool spinlock at boot
> > >     4a61bf7f9b18 random: defer fast pool mixing to worker
> > >     944d1bd0e5be random: rewrite header introductory comment
> > >     c0e35949c736 random: group sysctl functions
> > >     d946084180ee random: group userspace read/write functions
> > >     565a66043bdf random: group entropy collection functions
> > >     f2d587c493fc random: group entropy extraction functions
> > >     a8786d54762f random: group crng functions
> > >     c12dfec1aacf random: group initialization wait functions
> > >     22e3db57ab94 random: remove whitespace and reorder includes
> > >     cee64be60591 random: remove useless header comment
> > >     904e6123c400 random: introduce drain_entropy() helper to declutter crng_reseed()
> > >     47c56790d51c random: deobfuscate irq u32/u64 contributions
> > >     e280b79c3127 random: add proper SPDX header
> > >     776927dfd4ac random: remove unused tracepoints
> > >     d68883956d36 random: remove ifdef'd out interrupt bench
> > >     4a14a5a6969a random: tie batched entropy generation to base_crng generation
> > >     d8a6684950c1 random: fix locking for crng_init in crng_reseed()
> > >     b1d561138150 random: zero buffer after reading entropy from userspace
> > >     21da00f8cb3a random: remove outdated INT_MAX >> 6 check in urandom_read()
> > >     b530684129b2 random: make more consistent use of integer types
> > >     3eed6af93ecd random: use hash function for crng_slow_load()
> > >     cee3c7056900 random: use simpler fast key erasure flow on per-cpu keys
> > >     ea9941fd6e26 random: absorb fast pool into input pool after fast load
> > >     a3562bf4e8c9 random: do not xor RDRAND when writing into /dev/random
> > >     574c8839504b random: ensure early RDSEED goes through mixer on init
> > >     d3d3c1c214c3 random: inline leaves of rand_initialize()
> > >     817315517af9 random: get rid of secondary crngs
> > >     c15fc80b7df0 random: use RDSEED instead of RDRAND in entropy extraction
> > >     72db8151c889 random: fix locking in crng_fast_load()
> > >     7229c6d90a1a random: remove batched entropy locking
> > >     6c8911579221 random: remove use_input_pool parameter from crng_reseed()
> > >     4ef908fb81d9 random: make credit_entropy_bits() always safe
> > >     42a9a7e80750 random: always wake up entropy writers after extraction
> > >     373ef51f3e8a random: use linear min-entropy accumulation crediting
> > >     a1a2bae5ef93 random: simplify entropy debiting
> > >     4e5814bd2e75 random: use computational hash for entropy extraction
> > >     99a0f8e22d4c random: only call crng_finalize_init() for primary_crng
> > >     88609b892fdd random: access primary_pool directly rather than through pointer
> > >     0b9f9b94f1ea random: continually use hwgenerator randomness
> > >     811e333c4eb2 random: simplify arithmetic function flow in account()
> > >     56de23dcf9d0 random: selectively clang-format where it makes sense
> > >     86eac12b1cf5 random: access input_pool_data directly rather than through pointer
> > >     4f5400ca7fc1 random: cleanup fractional entropy shift constants
> > >     1b6f1d32a858 random: prepend remaining pool constants with POOL_
> > >     0fe4a64fd946 random: de-duplicate INPUT_POOL constants
> > >     e35576c4cb18 random: remove unused OUTPUT_POOL constants
> > >     74cb3093f2de random: rather than entropy_store abstraction, use global
> > >     14652d864280 random: remove unused extract_entropy() reserved argument
> > >     12f17e3f3a14 random: remove incomplete last_data logic
> > >     adcbbb44ccc1 random: cleanup integer types
> > >     4ac4c7f057ff random: cleanup poolinfo abstraction
> > >     5c3818e3bd7b random: fix typo in comments
> > >     0a7e65810269 random: don't reset crng_init_cnt on urandom_read()
> > >     8d7c55563ed0 random: avoid superfluous call to RDRAND in CRNG extraction
> > >     8b4695640bc5 random: early initialization of ChaCha constants
> > >     cfc69065005e random: initialize ChaCha20 constants with correct endianness
> > >     922d082e3363 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
> > >     565b3af16894 random: harmonize "crng init done" messages
> > >     346c4a697c29 random: mix bootloader randomness into pool
> > >     afce74c0c04f random: do not re-init if crng_reseed completes before primary init
> > >     d76758c71209 random: do not sign extend bytes for rotation when mixing
> > >     c2f0a89cd1d5 random: use BLAKE2s instead of SHA1 in extraction
> > >     6e6ae70c1eac random: remove unused irq_flags argument from add_interrupt_randomness()
> > >     2580b0b3fd5a random: document add_hwgenerator_randomness() with other input functions
> > >     3cc36a4aa1ca crypto: blake2s - adjust include guard naming
> > >     09342a544c4b crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
> > >     f850f3643d6b MAINTAINERS: co-maintain random.c
> > >     967e3a136f9b random: remove dead code left over from blocking pool
> > >     610f0b439a6b random: avoid arch_get_random_seed_long() when collecting IRQ randomness
> > >     ad3fce669105 random: add arch_get_random_*long_early()
> > >     41b0d3e86c50 powerpc: Use bool in archrandom.h
> > >     89533373e11c linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
> > >     0222f9f1d168 linux/random.h: Use false with bool
> > >     15f93060b718 linux/random.h: Remove arch_has_random, arch_has_random_seed
> > >     a95ed04e21da s390: Remove arch_has_random, arch_has_random_seed
> > >     aab52172d9f9 powerpc: Remove arch_has_random, arch_has_random_seed
> > >     35e28a05f659 x86: Remove arch_has_random, arch_has_random_seed
> > >     98f749e29728 random: avoid warnings for !CONFIG_NUMA builds
> > >     c13b9c3627d8 random: split primary/secondary crng init paths
> > >     c070b07aaf34 random: remove some dead code of poolinfo
> > >     898498bb4414 random: fix typo in add_timer_randomness()
> > >     2c53d6d6a7be random: Add and use pr_fmt()
> > >     f3375cfe31bc random: convert to ENTROPY_BITS for better code readability
> > >     9f757cad20b7 random: remove unnecessary unlikely()
> > >     4431c366fe23 random: remove kernel.random.read_wakeup_threshold
> > >     ec134003cc39 random: delete code to pull data into pools
> > >     a9564e14c6dd random: remove the blocking pool
> > >     940cbc47b369 random: make /dev/random be almost like /dev/urandom
> > >     c4edc1055c11 random: ignore GRND_RANDOM in getentropy(2)
> > >     7f9f864af021 random: add GRND_INSECURE to return best-effort non-cryptographic bytes
> > >     479d39707ff7 random: Add a urandom_read_nowait() for random APIs that don't warn
> > >     69441ba56f13 random: Don't wake crng_init_wait when crng_init == 1
> > >     69ef3109d422 random: don't forget compat_ioctl on urandom
> > >     927fc225af29 compat_ioctl: remove /dev/random commands
> > >     996fba14fa35 lib/crypto: sha1: re-roll loops to reduce code size
> > >     c4f48374407b lib/crypto: blake2s: move hmac construction into wireguard
> > >     97126d2f65b3 crypto: blake2s - generic C library implementation and selftest
> > >     76101f1b7f59 nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION
> > >     e804587ecdcd bpf: Fix incorrect memory charge cost calculation in stack_map_alloc()
> > >     f91da317e6fa 9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
> > >
> > > Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
> > > ---
> > >  .../linux/linux-yocto-rt_5.4.bb               |  6 ++---
> > >  .../linux/linux-yocto-tiny_5.4.bb             |  8 +++----
> > >  meta/recipes-kernel/linux/linux-yocto_5.4.bb  | 22 +++++++++----------
> > >  3 files changed, 18 insertions(+), 18 deletions(-)
> > >
> > > diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > > index 2fef4f032d..7fa1b81229 100644
> > > --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > > +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > > @@ -11,13 +11,13 @@ python () {
> > >          raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
> > >  }
> > >
> > > -SRCREV_machine ?= "d7693f19702e1fa1bb18507260198478cba0d6a2"
> > > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > > +SRCREV_machine ?= "fa8536530bdd6a87856aa6fe0af4f9ef4af21fe0"
> > > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> > >
> > >  SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \
> > >             git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
> > >
> > > -LINUX_VERSION ?= "5.4.199"
> > > +LINUX_VERSION ?= "5.4.203"
> > >
> > >  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > >
> > > diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > > index 32ff438a57..d08658cf7e 100644
> > > --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > > +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > > @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig"
> > >
> > >  require recipes-kernel/linux/linux-yocto.inc
> > >
> > > -LINUX_VERSION ?= "5.4.199"
> > > +LINUX_VERSION ?= "5.4.203"
> > >  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > >
> > >  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
> > > @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native"
> > >  KMETA = "kernel-meta"
> > >  KCONF_BSP_AUDIT_LEVEL = "2"
> > >
> > > -SRCREV_machine_qemuarm ?= "a117c8494d49f5ab6ec54a69c0f926bad5d55616"
> > > -SRCREV_machine ?= "fbc1147bd48ea6b51895e8ab9d6422d112cdd58a"
> > > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > > +SRCREV_machine_qemuarm ?= "d92cd7d5916772a20105ef776c7f3bf433df55a4"
> > > +SRCREV_machine ?= "5f7c3e952857eb90a4113a41901bb770150af46b"
> > > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> > >
> > >  PV = "${LINUX_VERSION}+git${SRCPV}"
> > >
> > > diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > > index e2130386b2..545c754c1d 100644
> > > --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > > +++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > > @@ -12,16 +12,16 @@ KBRANCH_qemux86  ?= "v5.4/standard/base"
> > >  KBRANCH_qemux86-64 ?= "v5.4/standard/base"
> > >  KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64"
> > >
> > > -SRCREV_machine_qemuarm ?= "3bc1fc1cd35bd8f95e80fb49627c2f6977debc84"
> > > -SRCREV_machine_qemuarm64 ?= "c048122124fdbd78d02ac64ef6558503e7536f7b"
> > > -SRCREV_machine_qemumips ?= "19fc003e228a56e30943ddcba0614de6365e2740"
> > > -SRCREV_machine_qemuppc ?= "ef263615ec81ddfac29c82c5c61f6195dde31944"
> > > -SRCREV_machine_qemuriscv64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > -SRCREV_machine_qemux86 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > -SRCREV_machine_qemux86-64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > -SRCREV_machine_qemumips64 ?= "9ee7899b379b865fe676d50be29162845c9a9ee3"
> > > -SRCREV_machine ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > > +SRCREV_machine_qemuarm ?= "bf4029e0d9ff2e65d654909d7e9df50dce294c77"
> > > +SRCREV_machine_qemuarm64 ?= "3e0dab732964f7bbc26671fee05be420fd02890a"
> > > +SRCREV_machine_qemumips ?= "e8bea70e0c6a527383f2351e4f3d189aedf543a3"
> > > +SRCREV_machine_qemuppc ?= "24cc2a066b8151925fdf86136b70b63cf37cc540"
> > > +SRCREV_machine_qemuriscv64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > +SRCREV_machine_qemux86 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > +SRCREV_machine_qemux86-64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > +SRCREV_machine_qemumips64 ?= "5a5e07ef8df0e73b2f318b921f9262b49a6125d5"
> > > +SRCREV_machine ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> > >
> > >  # remap qemuarm to qemuarma15 for the 5.4 kernel
> > >  # KMACHINE_qemuarm ?= "qemuarma15"
> > > @@ -30,7 +30,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
> > >             git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
> > >
> > >  LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > > -LINUX_VERSION ?= "5.4.199"
> > > +LINUX_VERSION ?= "5.4.203"
> > >
> > >  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
> > >  DEPENDS += "openssl-native util-linux-native"
> > > --
> > > 2.19.1
> > >
Steve Sakoman July 19, 2022, 4:21 a.m. UTC | #4
Thanks Bruce!

Steve

On Mon, Jul 18, 2022, 5:46 PM Bruce Ashfield <bruce.ashfield@gmail.com>
wrote:

> We fixed this for 5.10/5.15, but missed 5.4.
>
> I ported the fix from those kernels to 5.4, and it now builds fine here.
>
> patch has been sent to the list.
>
> Bruce
>
> On Mon, Jul 18, 2022 at 2:19 PM Denys Dmytriyenko <denis@denix.org> wrote:
> >
> > Oops, Richard's alias didn't get resolved properly the first time, sorry
> >
> > On Mon, Jul 18, 2022 at 02:06:52PM -0400, Denys Dmytriyenko wrote:
> > > There's been some rework done around random subsystem lately. It now
> breaks RT
> > > kernel, at least on Aarch64, x86_64, maybe other platforms. Is there a
> quick
> > > fix, or should this update be reverted in Dunfell?
> > >
> > >
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:39:45:
> warning: 'struct random_ready_callback' declared inside parameter list will
> not be visible outside of this definition or declaration
> > > |    39 | extern int add_random_ready_callback(struct
> random_ready_callback *rdy);
> > > |       |
>  ^~~~~~~~~~~~~~~~~~~~~
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:40:46:
> warning: 'struct random_ready_callback' declared inside parameter list will
> not be visible outside of this definition or declaration
> > > |    40 | extern void del_random_ready_callback(struct
> random_ready_callback *rdy);
> > > |       |
> ^~~~~~~~~~~~~~~~~~~~~
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:47:6:
> error: conflicting types for 'get_random_bytes'
> > > |    47 | void get_random_bytes(void *buf, size_t len);
> > > |       |      ^~~~~~~~~~~~~~~~
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:35:13:
> note: previous declaration of 'get_random_bytes' was here
> > > |    35 | extern void get_random_bytes(void *buf, int nbytes);
> > > |       |             ^~~~~~~~~~~~~~~~
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:48:21:
> error: conflicting types for 'get_random_bytes_arch'
> > > |    48 | size_t __must_check get_random_bytes_arch(void *buf, size_t
> len);
> > > |       |                     ^~~~~~~~~~~~~~~~~~~~~
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/include/linux/random.h:41:25:
> note: previous declaration of 'get_random_bytes_arch' was here
> > > |    41 | extern int __must_check get_random_bytes_arch(void *buf, int
> nbytes);
> > > |       |                         ^~~~~~~~~~~~~~~~~~~~~
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/scripts/Makefile.build:99:
> recipe for target 'arch/arm64/kernel/asm-offsets.s' failed
> > > | make[2]: *** [arch/arm64/kernel/asm-offsets.s] Error 1
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:1134:
> recipe for target 'prepare0' failed
> > > | make[1]: *** [prepare0] Error 2
> > > |
> /OE/poky-dunfell/build/tmp/work-shared/qemuarm64/kernel-source/Makefile:179:
> recipe for target 'sub-make' failed
> > > | make: *** [sub-make] Error 2
> > > | ERROR: oe_runmake failed
> > > | WARNING: exit code 1 from a shell command.
> > > | ERROR: Execution of
> '/OE/poky-dunfell/build/tmp/work/qemuarm64-poky-linux/linux-yocto-rt/5.4.203+gitAUTOINC+010ac788e8_fa8536530b-r0/temp/run.do_compile.240410'
> failed with exit code 1
> > > ERROR: Task
> (/OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:do_compile)
> failed with exit code '1'
> > > NOTE: Tasks Summary: Attempted 586 tasks of which 465 didn't need to
> be rerun and 1 failed.
> > >
> > > Summary: 1 task failed:
> > >   /OE/poky-dunfell/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb:
> do_compile
> > > Summary: There were 2 ERROR messages shown, returning a non-zero exit
> code.
> > >
> > >
> > > On Thu, Jul 07, 2022 at 12:38:27PM -0400, Bruce Ashfield wrote:
> > > > From: Bruce Ashfield <bruce.ashfield@gmail.com>
> > > >
> > > > Updating  to the latest korg -stable release that comprises
> > > > the following commits:
> > > >
> > > >     871cbc208bf0 Linux 5.4.203
> > > >     572cc34503d4 crypto: arm/ghash-ce - define fpu before fpu
> registers are referenced
> > > >     3bf992f9d9a8 crypto: arm - use Kconfig based compiler checks for
> crypto opcodes
> > > >     1b43c30cd5d5 ARM: 9029/1: Make iwmmxt.S support Clang's
> integrated assembler
> > > >     9e00e5d195ed ARM: OMAP2+: drop unnecessary adrl
> > > >     3657432a75e3 ARM: 8929/1: use APSR_nzcv instead of r15 as mrc
> operand
> > > >     02c200fdba46 ARM: 8933/1: replace Sun/Solaris style flag on
> section directive
> > > >     54e6ecd5b7ca crypto: arm/sha512-neon - avoid ADRL pseudo
> instruction
> > > >     5e6f80033286 crypto: arm/sha256-neon - avoid ADRL pseudo
> instruction
> > > >     e120403c0e7c ARM: 8971/1: replace the sole use of a symbol with
> its definition
> > > >     0a43679016f0 ARM: 8990/1: use VFP assembler mnemonics in
> register load/store macros
> > > >     472671eec98a ARM: 8989/1: use .fpu assembler directives instead
> of assembler arguments
> > > >     2bfb0d43a47c net: mscc: ocelot: allow unregistered IP multicast
> flooding
> > > >     223d551a6681 kexec_file: drop weak attribute from
> arch_kexec_apply_relocations[_add]
> > > >     ab3ed204a146 powerpc/ftrace: Remove ftrace init tramp once
> kernel init is complete
> > > >     77e2ad091850 drm: remove drm_fb_helper_modinit
> > > >     9ef3ad40a81f Linux 5.4.202
> > > >     ceda71d49f6b powerpc/pseries: wire up rng during setup_arch()
> > > >     ece983890287 kbuild: link vmlinux only once for
> CONFIG_TRIM_UNUSED_KSYMS (2nd attempt)
> > > >     2a81e813141e random: update comment from copy_to_user() ->
> copy_to_iter()
> > > >     80f0038d757e modpost: fix section mismatch check for exported
> init/exit sections
> > > >     d1359e4129ad ARM: cns3xxx: Fix refcount leak in cns3xxx_init
> > > >     29ca9c4efacc ARM: Fix refcount leak in axxia_boot_secondary
> > > >     734a4d15142b soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in
> brcmstb_pm_probe
> > > >     f9b77a529375 ARM: exynos: Fix refcount leak in exynos_map_pmu
> > > >     615907ccc421 ARM: dts: imx6qdl: correct PU regulator ramp delay
> > > >     93e6137d2a5b powerpc/powernv: wire up rng during setup_arch
> > > >     97808c781721 powerpc/rtas: Allow ibm,platform-dump RTAS call
> with null buffer address
> > > >     b6232979320a powerpc: Enable execve syscall exit tracepoint
> > > >     e0701f150b28 parisc: Enable ARCH_HAS_STRICT_MODULE_RWX
> > > >     e5234a9d64a9 xtensa: Fix refcount leak bug in time.c
> > > >     a52972ee706b xtensa: xtfpga: Fix refcount leak bug in setup
> > > >     f0fc7cdf5f19 iio: adc: axp288: Override TS pin bias current for
> some models
> > > >     11c7ea38be91 iio: adc: stm32: fix maximum clock rate for
> stm32mp15x
> > > >     5e39397d60da iio: trigger: sysfs: fix use-after-free on remove
> > > >     6d2e68d02171 iio: gyro: mpu3050: Fix the error handling in
> mpu3050_power_up()
> > > >     1ad6d668543d iio: accel: mma8452: ignore the return value of
> reset operation
> > > >     a391bced8404 iio:accel:mxc4005: rearrange iio trigger get and
> register
> > > >     23c158caa032 iio:accel:bma180: rearrange iio trigger get and
> register
> > > >     8ea16a64aafc iio:chemical:ccs811: rearrange iio trigger get and
> register
> > > >     2333db14d875 usb: chipidea: udc: check request status before
> setting device address
> > > >     47e41b4dabbf xhci: turn off port power in shutdown
> > > >     d62d1c606db0 iio: adc: vf610: fix conversion mode sysfs node name
> > > >     741b6c8363c2 s390/cpumf: Handle events cycles and instructions
> identical
> > > >     4837d1c81223 gpio: winbond: Fix error code in winbond_gpio_get()
> > > >     bb18ad00c0b7 Revert "net/tls: fix tls_sk_proto_close executed
> repeatedly"
> > > >     8c7a32b7c155 virtio_net: fix xdp_rxq_info bug after
> suspend/resume
> > > >     28a78414f21e igb: Make DMA faster when CPU is active on the PCIe
> link
> > > >     a5ed066bc246 regmap-irq: Fix a bug in regmap_irq_enable() for
> type_in_mask chips
> > > >     844168a5dabf ice: ethtool: advertise 1000M speeds properly
> > > >     e3a232e57670 afs: Fix dynamic root getattr
> > > >     cacab1e620e0 MIPS: Remove repetitive increase irq_err_count
> > > >     788c954f194c x86/xen: Remove undefined behavior in
> setup_features()
> > > >     c7bdaad9cbfe udmabuf: add back sanity check
> > > >     05c6c36c7931 net/tls: fix tls_sk_proto_close executed repeatedly
> > > >     02da602bc2f3 erspan: do not assume transport header is always set
> > > >     d1592d3e362c drm/msm/mdp4: Fix refcount leak in
> mdp4_modeset_init_intf
> > > >     f1f9c2a5a3d9 net/sched: sch_netem: Fix arithmetic in
> netem_dump() for 32-bit platforms
> > > >     47d31b97bf47 bonding: ARP monitor spams NETDEV_NOTIFY_PEERS
> notifiers
> > > >     104a59b74577 phy: aquantia: Fix AN when higher speeds than 1G
> are not advertised
> > > >     8ffe2e50e967 bpf: Fix request_sock leak in sk lookup helpers
> > > >     f074ab253988 USB: serial: option: add Quectel RM500K module
> support
> > > >     ea7b23eadebc USB: serial: option: add Quectel EM05-G modem
> > > >     613c849d73df USB: serial: option: add Telit LE910Cx 0x1250
> composition
> > > >     ae183969bd66 random: quiet urandom warning ratelimit suppression
> message
> > > >     06a24ddba93a dm mirror log: clear log bits up to BITS_PER_LONG
> boundary
> > > >     1f350f3cf0c1 dm era: commit metadata in postsuspend after worker
> stops
> > > >     0e75acbe1b76 ata: libata: add qc->flags in
> ata_qc_complete_template tracepoint
> > > >     71c76f56b97c mtd: rawnand: gpmi: Fix setting busy timeout setting
> > > >     c8d37e6ca180 mmc: sdhci-pci-o2micro: Fix card detect by dealing
> with debouncing
> > > >     af28f602df74 net: openvswitch: fix parsing of nw_proto for IPv6
> fragments
> > > >     6fda65dabd3e ALSA: hda/realtek: Add quirk for Clevo PD70PNT
> > > >     5fbad99e76c0 ALSA: hda/realtek - ALC897 headset MIC no sound
> > > >     cf81f367cf81 ALSA: hda/conexant: Fix missing beep setup
> > > >     eca9b5e36e24 ALSA: hda/via: Fix missing beep setup
> > > >     1df5178fdebe random: schedule mix_interrupt_randomness() less
> often
> > > >     c87e851b23e5 vt: drop old FONT ioctls
> > > >     23db944f754e Linux 5.4.201
> > > >     3994d2ee55e2 Revert "hwmon: Make chip parameter for with_info
> API mandatory"
> > > >     7b9c3bfbad25 arm64: mm: Don't invalidate FROM_DEVICE buffers at
> start of DMA transfer
> > > >     2e1591c27b95 tcp: drop the hash_32() part from the index
> calculation
> > > >     c26e1addf157 tcp: increase source port perturb table to 2^16
> > > >     77d29f3b18c4 tcp: dynamically allocate the perturb table used by
> source ports
> > > >     7c0a777b7dbd tcp: add small random increments to the source port
> > > >     53c5de3092ad tcp: use different parts of the port_offset for
> index and offset
> > > >     95921a3bab76 tcp: add some entropy in __inet_hash_connect()
> > > >     bdcbf2602feb usb: gadget: u_ether: fix regression in setting
> fixed MAC address
> > > >     2577d67a9a8a dm: remove special-casing of bio-based immutable
> singleton target on NVMe
> > > >     4143503b486a s390/mm: use non-quiescing sske for KVM switch to
> keyed guest
> > > >     f0c280af0ec7 Linux 5.4.200
> > > >     ab8dff4b716e powerpc/mm: Switch obsolete dssall to .long
> > > >     1a48a41f1422 riscv: Less inefficient gcc tishift helpers (and
> export their symbols)
> > > >     2464a1c0de53 RISC-V: fix barrier() use in <vdso/processor.h>
> > > >     490a02cd8205 arm64: kprobes: Use BRK instead of single-step when
> executing instructions out-of-line
> > > >     ef6f9ce0a79a net: openvswitch: fix leak of nested actions
> > > >     6bb3c77c74f5 net: openvswitch: fix misuse of the cached
> connection on tuple changes
> > > >     b47319b4aa21 net/sched: act_police: more accurate MTU policing
> > > >     13fbdea1184b virtio-pci: Remove wrong address verification in
> vp_del_vqs()
> > > >     80e4d8a27451 ALSA: hda/realtek: fix right sounds and
> mute/micmute LEDs for HP machine
> > > >     119e0268cc1c ALSA: hda/realtek: fix mute/micmute LEDs for HP 440
> G8
> > > >     fba542891767 ext4: add reserved GDT blocks check
> > > >     4ca0d2f1e04e ext4: make variable "count" signed
> > > >     a6b31616e5af ext4: fix bug_on ext4_mb_use_inode_pa
> > > >     ae4603128751 dm mirror log: round up region bitmap size to
> BITS_PER_LONG
> > > >     64d2df648003 serial: 8250: Store to lsr_save_flags after lsr read
> > > >     b75bddfcc181 usb: gadget: lpc32xx_udc: Fix refcount leak in
> lpc32xx_udc_probe
> > > >     6506aff2dc2f usb: dwc2: Fix memory leak in dwc2_hcd_init
> > > >     940653b51c33 USB: serial: io_ti: add Agilent E5805A support
> > > >     31363b2b868e USB: serial: option: add support for Cinterion MV31
> with new baseline
> > > >     d0c3730f2763 comedi: vmk80xx: fix expression for tx buffer size
> > > >     bf833c484881 i2c: designware: Use standard optional ref clock
> implementation
> > > >     8d884c08eeb8 irqchip/gic-v3: Fix refcount leak in
> gic_populate_ppi_partitions
> > > >     58e67c81e229 irqchip/gic-v3: Fix error handling in
> gic_populate_ppi_partitions
> > > >     56526c3883fc irqchip/gic/realview: Fix refcount leak in
> realview_gic_of_init
> > > >     4695bafabf5b faddr2line: Fix overlapping text section failures,
> the sequel
> > > >     1b34d6a93832 certs/blacklist_hashes.c: fix const confusion in
> certs blacklist
> > > >     fb775ee3cfff arm64: ftrace: fix branch range checks
> > > >     0e21311ba459 net: bgmac: Fix an erroneous kfree() in
> bgmac_remove()
> > > >     c19cdd72b3ec mlxsw: spectrum_cnt: Reorder counter pools
> > > >     c03304dc4234 misc: atmel-ssc: Fix IRQ check in ssc_probe
> > > >     f7183c76d500 tty: goldfish: Fix free_irq() on remove
> > > >     ff6e03fe84bc i40e: Fix call trace in setup_tx_descriptors
> > > >     4b94408e1617 i40e: Fix calculating the number of queue pairs
> > > >     43f65970eeb2 i40e: Fix adding ADQ filter to TC0
> > > >     cff3a7ce6e81 clocksource: hyper-v: unexport __init-annotated
> hv_init_clocksource()
> > > >     11c870c0b532 pNFS: Don't keep retrying if the server replied
> NFS4ERR_LAYOUTUNAVAILABLE
> > > >     e32fe87afcfe random: credit cpu and bootloader seeds by default
> > > >     9e4cab02b7ec net: ethernet: mtk_eth_soc: fix misuse of mem alloc
> interface netdev[napi]_alloc_frag
> > > >     2f42389d270f ipv6: Fix signed integer overflow in
> l2tp_ip6_sendmsg
> > > >     6b4d8b44e716 nfc: nfcmrvl: Fix memory leak in
> nfcmrvl_play_deferred
> > > >     786428a1dec2 virtio-mmio: fix missing put_device() when
> vm_cmdline_parent registration failed
> > > >     aacb264d54c4 ALSA: hda/realtek - Add HW8326 support
> > > >     ff882404dff7 scsi: pmcraid: Fix missing resource cleanup in
> error case
> > > >     c48119223618 scsi: ipr: Fix missing/incorrect resource cleanup
> in error case
> > > >     fe0855944a64 scsi: lpfc: Allow reduced polling rate for
> nvme_admin_async_event cmd completion
> > > >     1f1be79189fd scsi: lpfc: Fix port stuck in bypassed state after
> LIP in PT2PT topology
> > > >     001de3d8ce82 scsi: vmw_pvscsi: Expand vcpuHint to 16 bits
> > > >     9e3a0d3fc71c ASoC: wm_adsp: Fix event generation for
> wm_adsp_fw_put()
> > > >     bc046649c5d6 ASoC: es8328: Fix event generation for deemphasis
> control
> > > >     a81f5a7f7a20 ASoC: wm8962: Fix suspend while playing music
> > > >     253334f84c81 ata: libata-core: fix NULL pointer deref in
> ata_host_alloc_pinfo()
> > > >     052cd621acbf ASoC: cs42l56: Correct typo in minimum level for SX
> volume controls
> > > >     6d180913b3ab ASoC: cs42l52: Correct TLV for Bypass Volume
> > > >     385a031c56a9 ASoC: cs53l30: Correct number of volume levels on
> SX controls
> > > >     675b6a49cf70 ASoC: cs35l36: Update digital volume TLV
> > > >     b00f63dba5b8 ASoC: cs42l52: Fix TLV scales for mixer controls
> > > >     cd8c1e6c01f1 dma-debug: make things less spammy under memory
> pressure
> > > >     a45e19fd6ed8 ASoC: nau8822: Add operation for internal PLL off
> and on
> > > >     348831a9e8aa powerpc/kasan: Silence KASAN warnings in
> __get_wchan()
> > > >     5624055c8f4b random: account for arch randomness in bits
> > > >     c0bf6bfce70a random: mark bootloader randomness code as __init
> > > >     f96250197b43 random: avoid checking crng_ready() twice in
> random_init()
> > > >     072cd87d12a8 crypto: drbg - make reseeding from
> get_random_bytes() synchronous
> > > >     e9eb0c4741a7 crypto: drbg - always try to free Jitter RNG
> instance
> > > >     f284afc3a9ca crypto: drbg - move dynamic ->reseed_threshold
> adjustments to __drbg_seed()
> > > >     babba4bf53a6 crypto: drbg - track whether DRBG was seeded with
> !rng_is_initialized()
> > > >     1b93b302e942 crypto: drbg - prepare for more fine-grained
> tracking of seeding state
> > > >     98e574a73414 crypto: drbg - always seeded with SP800-90B
> compliant noise source
> > > >     61f87ea3f957 Revert "random: use static branch for crng_ready()"
> > > >     3faf33a85650 random: check for signals after page of pool writes
> > > >     2177cef53ec9 random: wire up fops->splice_{read,write}_iter()
> > > >     35db2a073118 random: convert to using fops->write_iter()
> > > >     43e62db84a99 random: convert to using fops->read_iter()
> > > >     c23188facd10 random: unify batched entropy implementations
> > > >     1aeedbe02b5c random: move randomize_page() into mm where it
> belongs
> > > >     ceaf1feefe6e random: move initialization functions out of hot
> pages
> > > >     d3bf98d61fb6 random: make consistent use of buf and len
> > > >     70fce7f105bb random: use proper return types on
> get_random_{int,long}_wait()
> > > >     d05948dc23e6 random: remove extern from functions in header
> > > >     d8b4296417ea random: use static branch for crng_ready()
> > > >     087a14b9cf9b random: credit architectural init the exact amount
> > > >     ac48f7bee198 random: handle latent entropy and command line from
> random_init()
> > > >     736a22645d98 random: use proper jiffies comparison macro
> > > >     3266fba20661 random: remove ratelimiting for in-kernel unseeded
> randomness
> > > >     c5373bd6e4fb random: move initialization out of reseeding hot
> path
> > > >     0747ad152fa1 random: avoid initializing twice in credit race
> > > >     0baeec0effc7 random: use symbolic constants for crng_init states
> > > >     55d64df3ad5b siphash: use one source of truth for siphash
> permutations
> > > >     e4e8a9f8a616 random: help compiler out with fast_mix() by using
> simpler arguments
> > > >     bf3b51eb0f13 random: do not use input pool from hard IRQs
> > > >     6d4203a2cddc random: order timer entropy functions below
> interrupt functions
> > > >     58da574f105a random: do not pretend to handle premature next
> security model
> > > >     e739d5bd1466 random: use first 128 bits of input as fast init
> > > >     c44f8b386376 random: do not use batches when !crng_ready()
> > > >     e247ea8d97bf random: insist on random_get_entropy() existing in
> order to simplify
> > > >     9bfbcb37e5f6 xtensa: use fallback for random_get_entropy()
> instead of zero
> > > >     fa15650b51f6 sparc: use fallback for random_get_entropy()
> instead of zero
> > > >     9dfc14590c5d um: use fallback for random_get_entropy() instead
> of zero
> > > >     0cc41e2c73f7 x86/tsc: Use fallback for random_get_entropy()
> instead of zero
> > > >     f2a6e8727084 nios2: use fallback for random_get_entropy()
> instead of zero
> > > >     db1d13fe4c80 arm: use fallback for random_get_entropy() instead
> of zero
> > > >     6fa912f987fa mips: use fallback for random_get_entropy() instead
> of just c0 random
> > > >     36f38f838c5b m68k: use fallback for random_get_entropy() instead
> of zero
> > > >     a7d04ca9da61 timekeeping: Add raw clock fallback for
> random_get_entropy()
> > > >     eb2f9d72f32a powerpc: define get_cycles macro for arch-override
> > > >     10455a367c33 alpha: define get_cycles macro for arch-override
> > > >     5f0b77ca1978 parisc: define get_cycles macro for arch-override
> > > >     80459abc9fee s390: define get_cycles macro for arch-override
> > > >     73385644490a ia64: define get_cycles macro for arch-override
> > > >     5fac86663976 init: call time_init() before rand_initialize()
> > > >     b88ae87b100c random: fix sysctl documentation nits
> > > >     465425748359 random: document crng_fast_key_erasure()
> destination possibility
> > > >     ec07b3494517 random: make random_get_entropy() return an
> unsigned long
> > > >     fe156368f987 random: allow partial reads if later user copies
> fail
> > > >     70788723da70 random: check for signals every PAGE_SIZE chunk of
> /dev/[u]random
> > > >     2ce859d91fe9 random: check for signal_pending() outside of
> need_resched() check
> > > >     0e8030c9e03d random: do not allow user to keep crng key around
> on stack
> > > >     95aed891f7be random: do not split fast init input in
> add_hwgenerator_randomness()
> > > >     1d53d5a0973e random: mix build-time latent entropy into pool at
> init
> > > >     0aba75c6173d random: re-add removed comment about
> get_random_{u32,u64} reseeding
> > > >     81ea8a609b48 random: treat bootloader trust toggle the same way
> as cpu trust toggle
> > > >     a08d52a6081b random: skip fast_init if hwrng provides large
> chunk of entropy
> > > >     8320bc665c29 random: check for signal and try earlier when
> generating entropy
> > > >     3a53b818bb0e random: reseed more often immediately after booting
> > > >     905759e0fc17 random: make consistent usage of crng_ready()
> > > >     ad4c6bd98c54 random: use SipHash as interrupt entropy accumulator
> > > >     631503001ccf random: replace custom notifier chain with standard
> one
> > > >     1ae73fb2a635 random: don't let 644 read-only sysctls be written
> to
> > > >     ed409757100b random: give sysctl_random_min_urandom_seed a more
> sensible value
> > > >     75d95c1b5dea random: do crng pre-init loading in worker rather
> than irq
> > > >     219c84fe93e5 random: unify cycles_t and jiffies usage and types
> > > >     673637c4c9e0 random: cleanup UUID handling
> > > >     4d5151cc288a random: only wake up writers after zap if threshold
> was passed
> > > >     ac0081dec7d6 random: round-robin registers as ulong, not u32
> > > >     62cd795e465a random: clear fast pool, crng, and batches in cpuhp
> bring up
> > > >     a7f8f385bb6f random: pull add_hwgenerator_randomness()
> declaration into random.h
> > > >     ff607fc7607d random: check for crng_init == 0 in
> add_device_randomness()
> > > >     20788eb4ce70 random: unify early init crng load accounting
> > > >     49567f947735 random: do not take pool spinlock at boot
> > > >     4a61bf7f9b18 random: defer fast pool mixing to worker
> > > >     944d1bd0e5be random: rewrite header introductory comment
> > > >     c0e35949c736 random: group sysctl functions
> > > >     d946084180ee random: group userspace read/write functions
> > > >     565a66043bdf random: group entropy collection functions
> > > >     f2d587c493fc random: group entropy extraction functions
> > > >     a8786d54762f random: group crng functions
> > > >     c12dfec1aacf random: group initialization wait functions
> > > >     22e3db57ab94 random: remove whitespace and reorder includes
> > > >     cee64be60591 random: remove useless header comment
> > > >     904e6123c400 random: introduce drain_entropy() helper to
> declutter crng_reseed()
> > > >     47c56790d51c random: deobfuscate irq u32/u64 contributions
> > > >     e280b79c3127 random: add proper SPDX header
> > > >     776927dfd4ac random: remove unused tracepoints
> > > >     d68883956d36 random: remove ifdef'd out interrupt bench
> > > >     4a14a5a6969a random: tie batched entropy generation to base_crng
> generation
> > > >     d8a6684950c1 random: fix locking for crng_init in crng_reseed()
> > > >     b1d561138150 random: zero buffer after reading entropy from
> userspace
> > > >     21da00f8cb3a random: remove outdated INT_MAX >> 6 check in
> urandom_read()
> > > >     b530684129b2 random: make more consistent use of integer types
> > > >     3eed6af93ecd random: use hash function for crng_slow_load()
> > > >     cee3c7056900 random: use simpler fast key erasure flow on
> per-cpu keys
> > > >     ea9941fd6e26 random: absorb fast pool into input pool after fast
> load
> > > >     a3562bf4e8c9 random: do not xor RDRAND when writing into
> /dev/random
> > > >     574c8839504b random: ensure early RDSEED goes through mixer on
> init
> > > >     d3d3c1c214c3 random: inline leaves of rand_initialize()
> > > >     817315517af9 random: get rid of secondary crngs
> > > >     c15fc80b7df0 random: use RDSEED instead of RDRAND in entropy
> extraction
> > > >     72db8151c889 random: fix locking in crng_fast_load()
> > > >     7229c6d90a1a random: remove batched entropy locking
> > > >     6c8911579221 random: remove use_input_pool parameter from
> crng_reseed()
> > > >     4ef908fb81d9 random: make credit_entropy_bits() always safe
> > > >     42a9a7e80750 random: always wake up entropy writers after
> extraction
> > > >     373ef51f3e8a random: use linear min-entropy accumulation
> crediting
> > > >     a1a2bae5ef93 random: simplify entropy debiting
> > > >     4e5814bd2e75 random: use computational hash for entropy
> extraction
> > > >     99a0f8e22d4c random: only call crng_finalize_init() for
> primary_crng
> > > >     88609b892fdd random: access primary_pool directly rather than
> through pointer
> > > >     0b9f9b94f1ea random: continually use hwgenerator randomness
> > > >     811e333c4eb2 random: simplify arithmetic function flow in
> account()
> > > >     56de23dcf9d0 random: selectively clang-format where it makes
> sense
> > > >     86eac12b1cf5 random: access input_pool_data directly rather than
> through pointer
> > > >     4f5400ca7fc1 random: cleanup fractional entropy shift constants
> > > >     1b6f1d32a858 random: prepend remaining pool constants with POOL_
> > > >     0fe4a64fd946 random: de-duplicate INPUT_POOL constants
> > > >     e35576c4cb18 random: remove unused OUTPUT_POOL constants
> > > >     74cb3093f2de random: rather than entropy_store abstraction, use
> global
> > > >     14652d864280 random: remove unused extract_entropy() reserved
> argument
> > > >     12f17e3f3a14 random: remove incomplete last_data logic
> > > >     adcbbb44ccc1 random: cleanup integer types
> > > >     4ac4c7f057ff random: cleanup poolinfo abstraction
> > > >     5c3818e3bd7b random: fix typo in comments
> > > >     0a7e65810269 random: don't reset crng_init_cnt on urandom_read()
> > > >     8d7c55563ed0 random: avoid superfluous call to RDRAND in CRNG
> extraction
> > > >     8b4695640bc5 random: early initialization of ChaCha constants
> > > >     cfc69065005e random: initialize ChaCha20 constants with correct
> endianness
> > > >     922d082e3363 random: use IS_ENABLED(CONFIG_NUMA) instead of
> ifdefs
> > > >     565b3af16894 random: harmonize "crng init done" messages
> > > >     346c4a697c29 random: mix bootloader randomness into pool
> > > >     afce74c0c04f random: do not re-init if crng_reseed completes
> before primary init
> > > >     d76758c71209 random: do not sign extend bytes for rotation when
> mixing
> > > >     c2f0a89cd1d5 random: use BLAKE2s instead of SHA1 in extraction
> > > >     6e6ae70c1eac random: remove unused irq_flags argument from
> add_interrupt_randomness()
> > > >     2580b0b3fd5a random: document add_hwgenerator_randomness() with
> other input functions
> > > >     3cc36a4aa1ca crypto: blake2s - adjust include guard naming
> > > >     09342a544c4b crypto: blake2s - include <linux/bug.h> instead of
> <asm/bug.h>
> > > >     f850f3643d6b MAINTAINERS: co-maintain random.c
> > > >     967e3a136f9b random: remove dead code left over from blocking
> pool
> > > >     610f0b439a6b random: avoid arch_get_random_seed_long() when
> collecting IRQ randomness
> > > >     ad3fce669105 random: add arch_get_random_*long_early()
> > > >     41b0d3e86c50 powerpc: Use bool in archrandom.h
> > > >     89533373e11c linux/random.h: Mark CONFIG_ARCH_RANDOM functions
> __must_check
> > > >     0222f9f1d168 linux/random.h: Use false with bool
> > > >     15f93060b718 linux/random.h: Remove arch_has_random,
> arch_has_random_seed
> > > >     a95ed04e21da s390: Remove arch_has_random, arch_has_random_seed
> > > >     aab52172d9f9 powerpc: Remove arch_has_random,
> arch_has_random_seed
> > > >     35e28a05f659 x86: Remove arch_has_random, arch_has_random_seed
> > > >     98f749e29728 random: avoid warnings for !CONFIG_NUMA builds
> > > >     c13b9c3627d8 random: split primary/secondary crng init paths
> > > >     c070b07aaf34 random: remove some dead code of poolinfo
> > > >     898498bb4414 random: fix typo in add_timer_randomness()
> > > >     2c53d6d6a7be random: Add and use pr_fmt()
> > > >     f3375cfe31bc random: convert to ENTROPY_BITS for better code
> readability
> > > >     9f757cad20b7 random: remove unnecessary unlikely()
> > > >     4431c366fe23 random: remove kernel.random.read_wakeup_threshold
> > > >     ec134003cc39 random: delete code to pull data into pools
> > > >     a9564e14c6dd random: remove the blocking pool
> > > >     940cbc47b369 random: make /dev/random be almost like /dev/urandom
> > > >     c4edc1055c11 random: ignore GRND_RANDOM in getentropy(2)
> > > >     7f9f864af021 random: add GRND_INSECURE to return best-effort
> non-cryptographic bytes
> > > >     479d39707ff7 random: Add a urandom_read_nowait() for random APIs
> that don't warn
> > > >     69441ba56f13 random: Don't wake crng_init_wait when crng_init ==
> 1
> > > >     69ef3109d422 random: don't forget compat_ioctl on urandom
> > > >     927fc225af29 compat_ioctl: remove /dev/random commands
> > > >     996fba14fa35 lib/crypto: sha1: re-roll loops to reduce code size
> > > >     c4f48374407b lib/crypto: blake2s: move hmac construction into
> wireguard
> > > >     97126d2f65b3 crypto: blake2s - generic C library implementation
> and selftest
> > > >     76101f1b7f59 nfc: st21nfca: fix incorrect sizing calculations in
> EVT_TRANSACTION
> > > >     e804587ecdcd bpf: Fix incorrect memory charge cost calculation
> in stack_map_alloc()
> > > >     f91da317e6fa 9p: missing chunk of "fs/9p: Don't update file type
> when updating file attributes"
> > > >
> > > > Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
> > > > ---
> > > >  .../linux/linux-yocto-rt_5.4.bb               |  6 ++---
> > > >  .../linux/linux-yocto-tiny_5.4.bb             |  8 +++----
> > > >  meta/recipes-kernel/linux/linux-yocto_5.4.bb  | 22
> +++++++++----------
> > > >  3 files changed, 18 insertions(+), 18 deletions(-)
> > > >
> > > > diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > > > index 2fef4f032d..7fa1b81229 100644
> > > > --- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > > > +++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
> > > > @@ -11,13 +11,13 @@ python () {
> > > >          raise bb.parse.SkipRecipe("Set
> PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
> > > >  }
> > > >
> > > > -SRCREV_machine ?= "d7693f19702e1fa1bb18507260198478cba0d6a2"
> > > > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > > > +SRCREV_machine ?= "fa8536530bdd6a87856aa6fe0af4f9ef4af21fe0"
> > > > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> > > >
> > > >  SRC_URI = "git://
> git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine
> <http://git.yoctoproject.org/linux-yocto.git;branch=$%7BKBRANCH%7D;name=machine>
> \
> > > >             git://
> git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}
> <http://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=$%7BKMETA%7D>
> "
> > > >
> > > > -LINUX_VERSION ?= "5.4.199"
> > > > +LINUX_VERSION ?= "5.4.203"
> > > >
> > > >  LIC_FILES_CHKSUM =
> "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > > >
> > > > diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > > > index 32ff438a57..d08658cf7e 100644
> > > > --- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > > > +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
> > > > @@ -6,7 +6,7 @@ KCONFIG_MODE = "--allnoconfig"
> > > >
> > > >  require recipes-kernel/linux/linux-yocto.inc
> > > >
> > > > -LINUX_VERSION ?= "5.4.199"
> > > > +LINUX_VERSION ?= "5.4.203"
> > > >  LIC_FILES_CHKSUM =
> "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > > >
> > > >  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native',
> '', d)}"
> > > > @@ -15,9 +15,9 @@ DEPENDS += "openssl-native util-linux-native"
> > > >  KMETA = "kernel-meta"
> > > >  KCONF_BSP_AUDIT_LEVEL = "2"
> > > >
> > > > -SRCREV_machine_qemuarm ?= "a117c8494d49f5ab6ec54a69c0f926bad5d55616"
> > > > -SRCREV_machine ?= "fbc1147bd48ea6b51895e8ab9d6422d112cdd58a"
> > > > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > > > +SRCREV_machine_qemuarm ?= "d92cd7d5916772a20105ef776c7f3bf433df55a4"
> > > > +SRCREV_machine ?= "5f7c3e952857eb90a4113a41901bb770150af46b"
> > > > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> > > >
> > > >  PV = "${LINUX_VERSION}+git${SRCPV}"
> > > >
> > > > diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > > > index e2130386b2..545c754c1d 100644
> > > > --- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > > > +++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
> > > > @@ -12,16 +12,16 @@ KBRANCH_qemux86  ?= "v5.4/standard/base"
> > > >  KBRANCH_qemux86-64 ?= "v5.4/standard/base"
> > > >  KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64"
> > > >
> > > > -SRCREV_machine_qemuarm ?= "3bc1fc1cd35bd8f95e80fb49627c2f6977debc84"
> > > > -SRCREV_machine_qemuarm64 ?=
> "c048122124fdbd78d02ac64ef6558503e7536f7b"
> > > > -SRCREV_machine_qemumips ?=
> "19fc003e228a56e30943ddcba0614de6365e2740"
> > > > -SRCREV_machine_qemuppc ?= "ef263615ec81ddfac29c82c5c61f6195dde31944"
> > > > -SRCREV_machine_qemuriscv64 ?=
> "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > > -SRCREV_machine_qemux86 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > > -SRCREV_machine_qemux86-64 ?=
> "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > > -SRCREV_machine_qemumips64 ?=
> "9ee7899b379b865fe676d50be29162845c9a9ee3"
> > > > -SRCREV_machine ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
> > > > -SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
> > > > +SRCREV_machine_qemuarm ?= "bf4029e0d9ff2e65d654909d7e9df50dce294c77"
> > > > +SRCREV_machine_qemuarm64 ?=
> "3e0dab732964f7bbc26671fee05be420fd02890a"
> > > > +SRCREV_machine_qemumips ?=
> "e8bea70e0c6a527383f2351e4f3d189aedf543a3"
> > > > +SRCREV_machine_qemuppc ?= "24cc2a066b8151925fdf86136b70b63cf37cc540"
> > > > +SRCREV_machine_qemuriscv64 ?=
> "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > > +SRCREV_machine_qemux86 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > > +SRCREV_machine_qemux86-64 ?=
> "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > > +SRCREV_machine_qemumips64 ?=
> "5a5e07ef8df0e73b2f318b921f9262b49a6125d5"
> > > > +SRCREV_machine ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
> > > > +SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
> > > >
> > > >  # remap qemuarm to qemuarma15 for the 5.4 kernel
> > > >  # KMACHINE_qemuarm ?= "qemuarma15"
> > > > @@ -30,7 +30,7 @@ SRC_URI = "git://
> git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
> <http://git.yoctoproject.org/linux-yocto.git;name=machine;branch=$%7BKBRA>
> > > >             git://
> git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}
> <http://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=$%7BKMETA%7D>
> "
> > > >
> > > >  LIC_FILES_CHKSUM =
> "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
> > > > -LINUX_VERSION ?= "5.4.199"
> > > > +LINUX_VERSION ?= "5.4.203"
> > > >
> > > >  DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native',
> '', d)}"
> > > >  DEPENDS += "openssl-native util-linux-native"
> > > > --
> > > > 2.19.1
> > > >
>
>
>
> --
> - Thou shalt not follow the NULL pointer, for chaos and madness await
> thee at its end
> - "Use the force Harry" - Gandalf, Star Trek II
>

Patch

diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
index 2fef4f032d..7fa1b81229 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.4.bb
@@ -11,13 +11,13 @@  python () {
         raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
 }
 
-SRCREV_machine ?= "d7693f19702e1fa1bb18507260198478cba0d6a2"
-SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
+SRCREV_machine ?= "fa8536530bdd6a87856aa6fe0af4f9ef4af21fe0"
+SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
 
 SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \
            git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
 
-LINUX_VERSION ?= "5.4.199"
+LINUX_VERSION ?= "5.4.203"
 
 LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
 
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
index 32ff438a57..d08658cf7e 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.4.bb
@@ -6,7 +6,7 @@  KCONFIG_MODE = "--allnoconfig"
 
 require recipes-kernel/linux/linux-yocto.inc
 
-LINUX_VERSION ?= "5.4.199"
+LINUX_VERSION ?= "5.4.203"
 LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
 
 DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -15,9 +15,9 @@  DEPENDS += "openssl-native util-linux-native"
 KMETA = "kernel-meta"
 KCONF_BSP_AUDIT_LEVEL = "2"
 
-SRCREV_machine_qemuarm ?= "a117c8494d49f5ab6ec54a69c0f926bad5d55616"
-SRCREV_machine ?= "fbc1147bd48ea6b51895e8ab9d6422d112cdd58a"
-SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
+SRCREV_machine_qemuarm ?= "d92cd7d5916772a20105ef776c7f3bf433df55a4"
+SRCREV_machine ?= "5f7c3e952857eb90a4113a41901bb770150af46b"
+SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
 
 PV = "${LINUX_VERSION}+git${SRCPV}"
 
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.4.bb b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
index e2130386b2..545c754c1d 100644
--- a/meta/recipes-kernel/linux/linux-yocto_5.4.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_5.4.bb
@@ -12,16 +12,16 @@  KBRANCH_qemux86  ?= "v5.4/standard/base"
 KBRANCH_qemux86-64 ?= "v5.4/standard/base"
 KBRANCH_qemumips64 ?= "v5.4/standard/mti-malta64"
 
-SRCREV_machine_qemuarm ?= "3bc1fc1cd35bd8f95e80fb49627c2f6977debc84"
-SRCREV_machine_qemuarm64 ?= "c048122124fdbd78d02ac64ef6558503e7536f7b"
-SRCREV_machine_qemumips ?= "19fc003e228a56e30943ddcba0614de6365e2740"
-SRCREV_machine_qemuppc ?= "ef263615ec81ddfac29c82c5c61f6195dde31944"
-SRCREV_machine_qemuriscv64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
-SRCREV_machine_qemux86 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
-SRCREV_machine_qemux86-64 ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
-SRCREV_machine_qemumips64 ?= "9ee7899b379b865fe676d50be29162845c9a9ee3"
-SRCREV_machine ?= "ac296ae9753c775eb216fe6c2eb3dbccfc1489f7"
-SRCREV_meta ?= "318db1080fdd1e26567b6ba679310adad84c173a"
+SRCREV_machine_qemuarm ?= "bf4029e0d9ff2e65d654909d7e9df50dce294c77"
+SRCREV_machine_qemuarm64 ?= "3e0dab732964f7bbc26671fee05be420fd02890a"
+SRCREV_machine_qemumips ?= "e8bea70e0c6a527383f2351e4f3d189aedf543a3"
+SRCREV_machine_qemuppc ?= "24cc2a066b8151925fdf86136b70b63cf37cc540"
+SRCREV_machine_qemuriscv64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
+SRCREV_machine_qemux86 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
+SRCREV_machine_qemux86-64 ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
+SRCREV_machine_qemumips64 ?= "5a5e07ef8df0e73b2f318b921f9262b49a6125d5"
+SRCREV_machine ?= "9eab27738de4b3222b1c99cdebf3bde9611ef9fa"
+SRCREV_meta ?= "010ac788e81b6cb6c3fd2367802eee9d8feac34f"
 
 # remap qemuarm to qemuarma15 for the 5.4 kernel
 # KMACHINE_qemuarm ?= "qemuarma15"
@@ -30,7 +30,7 @@  SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
            git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.4;destsuffix=${KMETA}"
 
 LIC_FILES_CHKSUM = "file://COPYING;md5=bbea815ee2795b2f4230826c0c6b8814"
-LINUX_VERSION ?= "5.4.199"
+LINUX_VERSION ?= "5.4.203"
 
 DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
 DEPENDS += "openssl-native util-linux-native"