wangmy [Wed, 22 Jun 2022 07:48:47 +0000 (15:48 +0800)]
python3-dbusmock: upgrade 0.27.5 -> 0.28.0
Changelog:
===========
Drop unmaintained and broken accountsservice template
testcase: Throw an error when spawning a well-known name that exists
mockobject: Allow sending signals with extra details
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
wangmy [Wed, 22 Jun 2022 07:37:49 +0000 (15:37 +0800)]
bind: upgrade 9.18.3 -> 9.18.4
Changelog:
==========
[func] Don't try to process DNSSEC-related and ZONEMD records
in catz. [GL #3380]
[func] Add some more dnssec-policy checks to detect weird
policies. [GL #1611]
[test] Add new set of unit test macros and move the unit
tests under single namespace in /tests/. [GL !6243]
[func] Key timing options for 'dnssec-settime' and related
utilities now accept "UNSET" times as printed by
'dnssec-settime -p'. [GL #3361]
[bug] When the fetches-per-server quota was adjusted
because of an authoritative server timing out more
or less frequently, it was incorrectly set to 1
rather than the intended value. This has been
fixed. [GL #3327]
[bug] Only write key files if the dnssec-policy keymgr has
changed the metadata. [GL #3302]
[func] Key timing options for 'dnssec-keygen' and
'dnssec-settime' now accept times as printed by
'dnssec-settime -p'. [GL !2947]
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
wangmy [Wed, 22 Jun 2022 07:37:48 +0000 (15:37 +0800)]
alsa-ucm-conf: upgrade 1.2.7 -> 1.2.7.1
Configuration
- mt8195_demo: fix the HDMI device name
- USB-Audio: ALC1220 - add support for Gigabyte TRX40 Aorus Pro WiFi Rev 1.2
- ucm2: MediaTek: mt8195-demo: Add Initial support
- ucm2: rk3399-gru-sound: Add missing symlink from conf.d tree
- USB-Audio: Optimize regex for realtek-alc4080
- USB-Audio: Add ALC4080 ID for Asus Z690-I Gaming Wifi
- ucm2 profile for MOTU M4 interface
- ucm2: Rockchip/max98090: add symlink to VEYRON-I2S
- ucm2: Rockchip/max98090: add JackControl and PlaybackVolume
- Added basic support for ALC4082 on ASUS ROG Maximus Z690 Hero.
- ucm2: direct profile - allow to override the card name
- ucm2 profile for Behringer Flow8
- Steinberg UR44: fix the direction for steinberg_ur44_mono_in
- Steinberg UR44: fix the Line2 channel mapping (2nd)
- Steinberg UR44: fix the Line2 channel mapping
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
wangmy [Wed, 22 Jun 2022 07:37:46 +0000 (15:37 +0800)]
alsa-lib: upgrade 1.2.7 -> 1.2.7.1
Changelog:
=========
Core
- Release v1.2.7.1
- conf: Use ino64_t to save and compare inode numbers
Control API
- control: eld - fix the decoding for older hw
I/O API
- output: include stdarg.h
PCM API
- pcm: dmix - Add error handler for `fgets`
Use Case Manager API
- ucm: list also hardware configs (hw:X) in uc_mgr_scan_master_configs() fcn
Configuration
- conf: Use ino64_t to save and compare inode numbers
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Commit e1382583cd50 ("perf: sort-pmuevents: don't drop elements") tried
to fix a case where the array terminator elements were dropped from the
sorted list breaking the build, but it only worked for the case where
the terminator is the only element of the array. When the array has other
elements the terminator will still be silently dropped, causing invalid
memory accesses at runtime when the perf utility iterates over the array.
Fix this by treating any unmatched entry as an array terminator and also
add a comment to make it a little more clear how things are ending up at
the right position in the sorted list.
Signed-off-by: Lucas Stach <l.stach@pengutronix.de> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Martin Jansa [Tue, 21 Jun 2022 14:10:10 +0000 (16:10 +0200)]
wic: fix WicError message
* add missing % to print the values instead of:
| INFO: Build artifacts not found, exiting.
| INFO: (Please check that the build artifacts for the machine
| INFO: selected in local.conf actually exist and that they
| INFO: are the correct artifacts for the image (.wks file)).
|
| ERROR: ("The artifact that couldn't be found was %s:\n %s", 'kernel-dir', '/OE/build/deploy/images/qemux86-64')
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Without `--with-gcc-arch=generic` libffi looks up the cpuid to automatically determine
which mtune/march to use. This makes the native sstate-cache unuseable since it's
possible to have a newer cpu building the recipe and the library being pulled from
another older cpu which doesn't have the instruction.
Signed-off-by: Maxime Roussin-Bélanger <maxime.roussinbelanger@gmail.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Muhammad Hamza [Tue, 21 Jun 2022 05:09:37 +0000 (10:09 +0500)]
udev-extraconf/mount.sh: ignore lvm in automount
Failure message is shown in boot logs when trying to
mount lvm as automounter does not handle cases where
lvm is mounted. This simply skips lvm while automounting
to avoid failure message in boot logs.
Signed-off-by: Ansar Rasool <ansar_rasool@mentor.com> Signed-off-by: Muhammad Hamza <muhammad_hamza@mentor.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Muhammad Hamza [Mon, 20 Jun 2022 13:52:58 +0000 (18:52 +0500)]
udev-extraconf: force systemd-udevd to use shared MountFlags
Automounting does not work cleanly in case systemd as well as
udev rules are being used simultaneously and in most cases
race conditions and unknown behavior can come up.
In case we're running on top of systemd we need to make sure
that systemd-udevd knows that udev is in play as well and
mounting should be done using shared flags. Also as we're
using mount from sources other than systemd-mount in current
scripts this is the most manageable fix to automounting
problems.
Signed-off-by: Awais Belal <awais_belal@mentor.com> Signed-off-by: Muhammad Hamza <muhammad_hamza@mentor.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Muhammad Hamza [Mon, 20 Jun 2022 13:17:56 +0000 (18:17 +0500)]
udev-extraconf/mount.sh: only mount devices on hotplug
fdisk from util-linux (2.31.1) and above allows the user to
manipulate an already mounted device. In order to achieve this
functionality it issues a BLKRRPART (block device re-read part)
ioctl and in response the kernel generates remove/change/add
events if the device is not mounted (manually unmounted etc)
which are caught and processed by udev. This causes our auto-mounter
to remount everything because it does not keep track and things
go out of control.
Differentiating between types of remove events such as the one
described above (generated by BLKRRPART) and one where the device
is physically plugged out is only possible using the DEVPATH variable
which is cleaned up only when the device is actually plugged-out.
This fixes the above anomaly by only mounting a device in add event
which is cleaned up properly (tmp cache deleted) in the remove event
or is not present in the tmp cache while making use of the DEVPATH
variable during the remove action.
Signed-off-by: Awais Belal <awais_belal@mentor.com> Signed-off-by: Muhammad Hamza <muhammad_hamza@mentor.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Muhammad Hamza [Mon, 20 Jun 2022 13:17:55 +0000 (18:17 +0500)]
udev-extraconf/mount.sh: save mount name in our tmp filecache
Doing this will allow to fetch the exact name created by the
auto-mounter during the remove action where depending on the
scenario utilities such as the blkid might not be usable due
to actual device not being present on the system.
Signed-off-by: Awais Belal <awais_belal@mentor.com> Signed-off-by: Muhammad Hamza <muhammad_hamza@mentor.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
The <device-node> appended with LABEL or PARTLABEL makes sure that
the mountpoint is unique, therefore, avoids overlapping mounts.
Signed-off-by: Arsalan H. Awan <Arsalan_Awan@mentor.com> Signed-off-by: Muhammad Hamza <muhammad_hamza@mentor.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com>
Specific provider (ie. RPM or IPK) does "provide" just itself as a
package to the system. This will cause the "-dev" package, which
refers to the generic signing-keys and not the provider specific,
to miss the dependency.
Error case (RPM) when populating sdk:
Error:
Problem: conflicting requests
- nothing provides signing-keys = 1.0-r0 needed by signing-keys-dev-1.0-r0.noarch
(try to add '--skip-broken' to skip uninstallable packages)
Examining signing-keys-rpm packages in PROVIDES we have indeed:
signing-keys-rpm = 1.0-r0
But in signing-keys-dev: in REQUIRES:
signing-keys-1.0-r0
This MR will fix the situation by removing the RDEPENDS for
the -dev package
Peter Bergin [Fri, 17 Jun 2022 12:56:19 +0000 (14:56 +0200)]
systemd: add packageconfig for sysext
Currently the sysext binary is packaged in systemd-utils and
the service systemd-sysext.service in systemd package. Add a
PACKAGECONFIG for sysext to actively choose if it is going to
be installed or not, default off. If installed it will be added
to systemd package.
Signed-off-by: Peter Bergin <peter@berginkonsult.se> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Muhammad Hamza [Fri, 17 Jun 2022 05:50:22 +0000 (10:50 +0500)]
initramfs-framework: move storage mounts to actual rootfs
Operations such as mkfs fail on devices that are not
switched to the actual rootfs before switch_root is
called. The kernel interprets these devices as still
being used even after unmounting and errors such as
below are seen when the target is fully booted
root@v1000:~# umount /dev/sdb1
root@v1000:~# mkfs.ext4 /dev/sdb1
mke2fs 1.43.8 (1-Jan-2018)
/dev/sdb1 contains a ext4 file system
last mounted on Wed Nov 28 07:33:54 2018
Proceed anyway? (y,N) y
/dev/sdb1 is apparently in use by the system; will not make a filesystem here!
Signed-off-by: Awais Belal <awais_belal@mentor.com> Signed-off-by: Muhammad Hamza <muhammad_hamza@mentor.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
wangmy [Thu, 16 Jun 2022 01:35:54 +0000 (09:35 +0800)]
erofs-utils: upgrade 1.4 -> 1.5
0001-fsck-main.c-add-missing-include.patch
removed since it's included in 1.5.
License-Update: license switch to GPL-2.0+ OR Apache-2.0
for better 3rd-party integration.
Changelog:
==========
* This release includes the following updates:
- (fsck.erofs) support filesystem extraction (Igor Ostapenko);
- support ztailpacking inline feature for compressed files (Yue Hu);
- (dump.erofs) support listing directories;
- more liberofs APIs (including iterate APIs) (me, Kelvin Zhang);
- use mtime to allow more control over the timestamps (David Anderson);
- switch to GPL-2.0+ OR Apache-2.0 dual license for liberofs;
- various bugfixes and cleanups;
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Eliminated the ptest deprecation warnings for the error:
DeprecationWarning: _int_ returned non-int (type SizedInteger).
The ability to return an instance of a strict subclass of int is deprecated,
and may be removed in a future version of Python.
return SizedInteger(value).setBitLength(len(value))
Marta Rybczynska [Wed, 15 Jun 2022 13:20:11 +0000 (15:20 +0200)]
cve-check: add support for Ignored CVEs
Ignored CVEs aren't patched, but do not apply in our configuration
for some reason. Up till now they were only partially supported
and reported as "Patched".
This patch adds separate reporting of Ignored CVEs. The variable
CVE_CHECK_REPORT_PATCHED now manages reporting of both patched
and ignored CVEs.
Signed-off-by: Marta Rybczynska <marta.rybczynska@huawei.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
runqemu auto generating the KERNEL_CMDLINE values and specifying using
-append option to qemu boot command which will lead to override the
kernel_cmdline/bootargs which are specified in DTB when using -dtb option.
Add new macro QB_KERNEL_CMDLINE to specify not to add the runqemu
generated KERNEL_CMDLINE values instead use which are in the DTB if
value defined as 'none'.
Add provision to override bootargs using # runqemu bootparams="root=/dev/ram0"
wangmy [Wed, 15 Jun 2022 08:16:03 +0000 (16:16 +0800)]
musl-obstack: upgrade 1.1 -> 1.2
Changelog:
=========
Use obstack.c and obstack.h from gcc-10.2.0 libiberty.
Add AC_CONFIG_HEADERS to configure.ac and make ./bootstrap.sh create config.h.in.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Paulo Neves [Tue, 14 Jun 2022 15:11:00 +0000 (17:11 +0200)]
gtk-doc: Fix potential shebang overflow on gtkdoc-mkhtml2
A native path can cause a shebang overflow on gtkdoc-mkhtml.
Replace it with /usr/bin/env.
Signed-off-by: Paulo Neves <ptsneves@gmail.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Paulo Neves [Tue, 14 Jun 2022 15:10:59 +0000 (17:10 +0200)]
python: Avoid shebang overflow on python-config.py
The native path may be too big, leading to shebang
overflow. Just use the #!/usr/bin/env python3.
Signed-off-by: Paulo Neves <ptsneves@gmail.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Jose Quaresma [Tue, 14 Jun 2022 16:24:38 +0000 (17:24 +0100)]
archiver: don't use machine variables in shared recipes
When using multiconfig with the same TMP folder we can have
races because the shared recipes like gcc-source run twice.
ARCHIVER_OUTDIR = ${ARCHIVER_TOPDIR}/${TARGET_SYS}/${PF}/
which includes TARGET_SYS and between the two different MACHINE values,
this changes from 'arm-poky-linux-gnueabi' to 'aarch64-poky-linux'.
This leads to the task running twice, once for each multiconfig.
To solve this we need to store the shared output in a common place
for all machines and in this way the stamps will be the same for each
machine so the gcc-source will on run once regardless of the machine used.
Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Tue, 14 Jun 2022 16:24:36 +0000 (17:24 +0100)]
gcc-source: Fix incorrect task dependencies from ${B}
Some tasks may reference ${B} for gcc-source which in general would not exist.
It has dependencies on HOST_SYS and TARGET_SYS which are not appropriate for a
shared recipe like gcc-source. This causes problems for the archiver and
multiconfigs in particlar.
Set B to something else to avoid these task hash issues.
Acked-by: Jose Quaresma <jose.quaresma@foundries.io> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Mingli Yu [Mon, 13 Jun 2022 07:30:56 +0000 (15:30 +0800)]
python3-cryptography: remove test_x509.py
We already have removed --benchmark-disable option to avoid
adding python3-pytest-benchmark rdepends.
Also remove the case test_x509.py which needs benchmark feature
to avoid below failure:
file /usr/lib64/python3-cryptography/ptest/tests/bench/test_x509.py, line 9
def test_aki_public_bytes(benchmark):
> fixture 'benchmark' not found
> available fixtures: backend, cache, capfd, capfdbinary, caplog, capsys, capsysbinary, disable_rsa_checks, doctesty
> use 'pytest --fixtures [testpath]' for help on them.
e2fsprogs: add alternatives handling of lsattr as well
Building busybox with CONFIG_LSATTR=y and installing that in the same
filesystem as e2fsprogs breaks:
ERROR: ... do_rootfs: Postinstall scriptlets of ['busybox'] have failed. If the intention is to defer them to first boot,
then please place them into pkg_postinst_ontarget:${PN} ().
Deferring to first boot via 'exit 1' is no longer supported.
Fix that by also alternatifying lsattr just as chattr already is.
Mingli Yu [Mon, 23 May 2022 12:51:43 +0000 (20:51 +0800)]
oescripts: change compare logic in OEListPackageconfigTests
When multilib enabled and add layers/meta-openembedded/meta-oe in
conf/bblayers.conf, it reports below error when run oe-selftest.
$ oe-selftest -r oescripts
[snip]
[20:36:33-0700] 2022-05-16 03:36:33,494 - oe-selftest - INFO - RESULTS - oescripts.OEListPackageconfigTests.test_packageconfig_flags_option_flags: FAILED (585.37s)
[snip]
It is because the output of "list-packageconfig-flags.py -f" as below:
$ ../scripts/contrib/list-packageconfig-flags.py -f
[snip]
qt lib32-pinentry lib32-wxwidgets nativesdk-pinentry pinentry pinentry-native wxwidgets wxwidgets-native
secret lib32-pinentry nativesdk-pinentry pinentry pinentry-native
[snip]
But the check logic as below:
class OEListPackageconfigTests(OEScriptTests):
#oe-core.scripts.List_all_the_PACKAGECONFIG's_flags
def check_endlines(self, results, expected_endlines):
for line in results.output.splitlines():
for el in expected_endlines:
if line.split() == el.split():
expected_endlines.remove(el)
break
And the test will fail as line.split() doesn't equal el.split() as
line.split() is ['lib32-pinentry', 'lib32-wxwidgets', 'nativesdk-pinentry',
'pinentry', 'pinentry-native', 'wxwidgets', 'wxwidgets-native'] and
el.split() is ['nativesdk-pinentry', 'pinentry', 'pinentry-native'].
Kai Kang [Fri, 10 Jun 2022 06:54:38 +0000 (14:54 +0800)]
xxhash: fix build with gcc 12
It fails to compile xxhash when '-Og' is set in CFLAGS via such as set
DEBUG_BUILD = '1' in local.conf. Check and disable inline when '-Og'
exists.
Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Martin Jansa [Thu, 9 Jun 2022 08:22:32 +0000 (10:22 +0200)]
ltp: use bfd even when gold is used with ld-is-gold
* version 20220527 added KVM test infrastructure which currently fails to build with gold due to
SORT_NONE in linker script which isn't supported by gold:
https://sourceware.org/bugzilla/show_bug.cgi?id=18097
https://github.com/linux-test-project/ltp/commit/3fce2064b54843218d085aae326c8f7ecf3a8c41#diff-39268f0855c634ca48c8993fcd2c95b12a65b79e8d9fa5ccd6b0f5a8785c0dd6R36
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
The xxd tool can be quite handy by itself, and doesn't have anything
to do with vim per se. Make it possible to include the rather tiny xxd
in a rootfs without pulling in the several MB vim binary and
associated data.
For backwards compatibility, add an RDEPENDS from the main package to
the new vim-xxd package.
Current patch removes the uint8_t* cast in src/basic/recurse-dir.c:57
to fix musl build, but it changes the value here as pointer arithmetic
is type-depended in C. This patch corrects the behavior by adding an
extra cast to struct dirent*.
Also changes the patch's Upstream-Status to Inappropriate as it's musl-
specific.
Signed-off-by: Jiaqing Zhao <jiaqing.zhao@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Tue, 7 Jun 2022 13:59:37 +0000 (09:59 -0400)]
linux-yocto/5.10: update to v5.10.119
Updating to the latest korg -stable release that comprises
the following commits:
56c31ac1d8aa Linux 5.10.119 7c57f2134988 ALSA: ctxfi: Add SB046x PCI ID 514f58734001 random: check for signals after page of pool writes 18c261e9485a random: wire up fops->splice_{read,write}_iter() cf8f8d37586f random: convert to using fops->write_iter() affa1ae52219 random: convert to using fops->read_iter() 4bb374a1183b random: unify batched entropy implementations 552ae8e4841b random: move randomize_page() into mm where it belongs 5f2a040b2fb4 random: move initialization functions out of hot pages 02102b63bd96 random: make consistent use of buf and len 33783ca3556e random: use proper return types on get_random_{int,long}_wait() 1fdd7eef2100 random: remove extern from functions in header 811afd06e0f3 random: use static branch for crng_ready() 04d61b96bd8a random: credit architectural init the exact amount 5123cc61e27d random: handle latent entropy and command line from random_init() 9320e087f2b6 random: use proper jiffies comparison macro 31ac294037be random: remove ratelimiting for in-kernel unseeded randomness b50f2830b3df random: move initialization out of reseeding hot path 4c4110c052e8 random: avoid initializing twice in credit race cef9010b78c4 random: use symbolic constants for crng_init states 30e9f362661c siphash: use one source of truth for siphash permutations 772edeb8c76a random: help compiler out with fast_mix() by using simpler arguments 18413472339b random: do not use input pool from hard IRQs 999b0c9e8a97 random: order timer entropy functions below interrupt functions ce3c4ff38186 random: do not pretend to handle premature next security model 24d327568578 random: use first 128 bits of input as fast init 273aebb50be6 random: do not use batches when !crng_ready() f4c98fe1d100 random: insist on random_get_entropy() existing in order to simplify ffcfdd5de9d0 xtensa: use fallback for random_get_entropy() instead of zero e1ea0e26d3e4 sparc: use fallback for random_get_entropy() instead of zero a5092be129cf um: use fallback for random_get_entropy() instead of zero 25d4fdf1f0f8 x86/tsc: Use fallback for random_get_entropy() instead of zero 0b93f40cbe97 nios2: use fallback for random_get_entropy() instead of zero fdca77508152 arm: use fallback for random_get_entropy() instead of zero d5531246afcf mips: use fallback for random_get_entropy() instead of just c0 random 714def449776 riscv: use fallback for random_get_entropy() instead of zero 84397906a603 m68k: use fallback for random_get_entropy() instead of zero 7690be1adf8a timekeeping: Add raw clock fallback for random_get_entropy() 07b5d0b3e2cc powerpc: define get_cycles macro for arch-override 30ee01bcdc2c alpha: define get_cycles macro for arch-override c55a863c304e parisc: define get_cycles macro for arch-override 641d1fbd9667 s390: define get_cycles macro for arch-override c895438b172c ia64: define get_cycles macro for arch-override 7d9eab78bed9 init: call time_init() before rand_initialize() ec25e386d381 random: fix sysctl documentation nits 9dff512945f1 random: document crng_fast_key_erasure() destination possibility a1b5c849d855 random: make random_get_entropy() return an unsigned long 72a9ec8d7514 random: allow partial reads if later user copies fail 1805d20dfb67 random: check for signals every PAGE_SIZE chunk of /dev/[u]random 9641d9b4303f random: check for signal_pending() outside of need_resched() check 26ee8fa4dfda random: do not allow user to keep crng key around on stack bb515a5beff2 random: do not split fast init input in add_hwgenerator_randomness() be0d4e3e96ad random: mix build-time latent entropy into pool at init bb563d06c5bc random: re-add removed comment about get_random_{u32,u64} reseeding f3bc5eca83d3 random: treat bootloader trust toggle the same way as cpu trust toggle 7cb6782146b8 random: skip fast_init if hwrng provides large chunk of entropy 083ab33951e4 random: check for signal and try earlier when generating entropy 20da9c6079df random: reseed more often immediately after booting 9891211dfe03 random: make consistent usage of crng_ready() 95a1c94a1bd7 random: use SipHash as interrupt entropy accumulator 849e7b744cf2 random: replace custom notifier chain with standard one 66307429b5df random: don't let 644 read-only sysctls be written to 4c74ca006afe random: give sysctl_random_min_urandom_seed a more sensible value 0964a76fd58b random: do crng pre-init loading in worker rather than irq 192d4c6cb3e2 random: unify cycles_t and jiffies usage and types 47f0e89b71e2 random: cleanup UUID handling 9b0e0e27140d random: only wake up writers after zap if threshold was passed c47f215ab36d random: round-robin registers as ulong, not u32 5064550d422d random: clear fast pool, crng, and batches in cpuhp bring up 6e1cb84cc6a0 random: pull add_hwgenerator_randomness() declaration into random.h 32252548b50f random: check for crng_init == 0 in add_device_randomness() 684e9fe92d44 random: unify early init crng load accounting f656bd0011fd random: do not take pool spinlock at boot 5d73e69a5dd4 random: defer fast pool mixing to worker 7873321cd88f random: rewrite header introductory comment 6d1671b6d253 random: group sysctl functions 21ae543e3afb random: group userspace read/write functions f04580811d26 random: group entropy collection functions e9ff357860ab random: group entropy extraction functions d7e5b1925a67 random: group crng functions 6b1ffb3b5a08 random: group initialization wait functions 6c9cee15555d random: remove whitespace and reorder includes 7b0f36f7c252 random: remove useless header comment b3901816545e random: introduce drain_entropy() helper to declutter crng_reseed() 0971c1c2fdc6 random: deobfuscate irq u32/u64 contributions ae1b8f19542f random: add proper SPDX header 9342656c013d random: remove unused tracepoints 17ad693cd214 random: remove ifdef'd out interrupt bench 28683a188537 random: tie batched entropy generation to base_crng generation adc32acf23db random: fix locking for crng_init in crng_reseed() bb63851c2557 random: zero buffer after reading entropy from userspace 63c1aae40ac1 random: remove outdated INT_MAX >> 6 check in urandom_read() 07280d2c3f33 random: make more consistent use of integer types 655a69cb41e0 random: use hash function for crng_slow_load() 95026060d809 random: use simpler fast key erasure flow on per-cpu keys 732872aa2c41 random: absorb fast pool into input pool after fast load 7a5b9ca583f9 random: do not xor RDRAND when writing into /dev/random 16a6e4ae71e2 random: ensure early RDSEED goes through mixer on init c521bf08ee69 random: inline leaves of rand_initialize() 70377ee0740c random: get rid of secondary crngs c36e71b5a52e random: use RDSEED instead of RDRAND in entropy extraction 1d1582e5fe52 random: fix locking in crng_fast_load() 0762b7d1f1ad random: remove batched entropy locking 8d07e2a22687 random: remove use_input_pool parameter from crng_reseed() b07fcd9e53fa random: make credit_entropy_bits() always safe 32d1d7ce3aad random: always wake up entropy writers after extraction 985292206167 random: use linear min-entropy accumulation crediting bb9c45cfb97e random: simplify entropy debiting de0727c0c448 random: use computational hash for entropy extraction e0cc561e4758 random: only call crng_finalize_init() for primary_crng 480fd91dcdc7 random: access primary_pool directly rather than through pointer 0b9e36e895bb random: continually use hwgenerator randomness 6d2d29f051be random: simplify arithmetic function flow in account() a0653a9ec15e random: selectively clang-format where it makes sense bccc8d92310d random: access input_pool_data directly rather than through pointer a9db850c219f random: cleanup fractional entropy shift constants edd294052e77 random: prepend remaining pool constants with POOL_ f87f50b843e4 random: de-duplicate INPUT_POOL constants 09ae6b851979 random: remove unused OUTPUT_POOL constants 8cc5260c19da random: rather than entropy_store abstraction, use global 5897e06ac15a random: remove unused extract_entropy() reserved argument ae093ca1256e random: remove incomplete last_data logic 7abbc9809fa0 random: cleanup integer types c9e108e36dc8 random: cleanup poolinfo abstraction 8a3b78f9177c random: fix typo in comments 0ad5d6384d25 random: don't reset crng_init_cnt on urandom_read() 17420c77f04c random: avoid superfluous call to RDRAND in CRNG extraction c245231aecd3 random: early initialization of ChaCha constants efaddd56bc54 random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs 644320410266 random: harmonize "crng init done" messages ca57d51126e4 random: mix bootloader randomness into pool 542d8ebedb4d random: do not re-init if crng_reseed completes before primary init 2bfdf588a811 random: do not sign extend bytes for rotation when mixing 685200b076ff random: use BLAKE2s instead of SHA1 in extraction 33c30bfe4fb4 random: remove unused irq_flags argument from add_interrupt_randomness() b57a88874088 random: document add_hwgenerator_randomness() with other input functions ae33c501e059 lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI 07918ddba3ab lib/crypto: sha1: re-roll loops to reduce code size 5fb6a3ba3af6 lib/crypto: blake2s: move hmac construction into wireguard 62531d446a98 lib/crypto: blake2s: include as built-in aec0878b1d13 crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h> 030d3443aa61 crypto: blake2s - adjust include guard naming fea91e907076 crypto: blake2s - add comment for blake2s_state fields d45ae768b71b crypto: blake2s - optimize blake2s initialization 6c362b7c7764 crypto: blake2s - share the "shash" API boilerplate code 72e5b68f33a1 crypto: blake2s - move update and final logic to internal/blake2s.h e467a55bd006 crypto: blake2s - remove unneeded includes 198a19d7ee95 crypto: x86/blake2s - define shash_alg structs using macros 89f9ee998e36 crypto: blake2s - define shash_alg structs using macros 0f8fcf5b6ed7 crypto: lib/blake2s - Move selftest prototype into header file c3a4645d803e MAINTAINERS: add git tree for random.c c4882c6e1ec9 MAINTAINERS: co-maintain random.c acb198c4d11f random: remove dead code left over from blocking pool 6227458fef95 random: avoid arch_get_random_seed_long() when collecting IRQ randomness 257fbea15ab1 ACPI: sysfs: Fix BERT error region memory mapping 14fa2769ea6c ACPI: sysfs: Make sparse happy about address space in use 0debc69f003b media: vim2m: initialize the media device earlier ed0e71cc3f1e media: vim2m: Register video device after setting up internals a5c68f457fbf secure_seq: use the 64 bits of the siphash for port offset calculation 33f1b4a27abc tcp: change source port randomizarion at connect() time 9b4aa0d80b18 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID 74c6e5d58435 KVM: x86: Properly handle APF vs disabled LAPIC situation c06e5f751a08 staging: rtl8723bs: prevent ->Ssid overflow in rtw_wx_set_scan() a8f4d63142f9 lockdown: also lock down previous kgdb use
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Tue, 7 Jun 2022 13:59:36 +0000 (09:59 -0400)]
linux-yocto/5.15: update to v5.15.44
Updating to the latest korg -stable release that comprises
the following commits:
4e67be407725 Linux 5.15.44 50196b5d73dc ALSA: ctxfi: Add SB046x PCI ID ea5b87349d5a random: check for signals after page of pool writes 3e167570a951 random: wire up fops->splice_{read,write}_iter() 0789c69644c8 random: convert to using fops->write_iter() 7f8cea12a494 random: convert to using fops->read_iter() 6244da28c6b3 random: unify batched entropy implementations 64cb7f01ddd2 random: move randomize_page() into mm where it belongs 55a368c3e850 random: move initialization functions out of hot pages 542a60612d2a random: make consistent use of buf and len 29ed26a33436 random: use proper return types on get_random_{int,long}_wait() 55729575eaa9 random: remove extern from functions in header c6ae9d65bcdb random: use static branch for crng_ready() 4e5e6754a4b6 random: credit architectural init the exact amount 11cce5040c29 random: handle latent entropy and command line from random_init() ac0172992c94 random: use proper jiffies comparison macro 8df752b82ec5 random: remove ratelimiting for in-kernel unseeded randomness 272b79432f66 random: move initialization out of reseeding hot path c4e600154ac0 random: avoid initializing twice in credit race 23a1b984f4b8 random: use symbolic constants for crng_init states f4cb809a90df siphash: use one source of truth for siphash permutations 82caef84092e random: help compiler out with fast_mix() by using simpler arguments 4649394c4749 random: do not use input pool from hard IRQs df4e319ea60f random: order timer entropy functions below interrupt functions baf06217704b random: do not pretend to handle premature next security model 0d24003b5fde random: use first 128 bits of input as fast init 0d79a47b4ae0 random: do not use batches when !crng_ready() 1ab530cf40dc random: insist on random_get_entropy() existing in order to simplify e6bd242523e8 xtensa: use fallback for random_get_entropy() instead of zero b4582cb35167 sparc: use fallback for random_get_entropy() instead of zero d876dca6edf3 um: use fallback for random_get_entropy() instead of zero e017497815f3 x86/tsc: Use fallback for random_get_entropy() instead of zero 38fbfa404da6 nios2: use fallback for random_get_entropy() instead of zero 197d25e068c0 arm: use fallback for random_get_entropy() instead of zero 9e6db825e87a mips: use fallback for random_get_entropy() instead of just c0 random 2ab416043a94 riscv: use fallback for random_get_entropy() instead of zero a1428cd7e194 m68k: use fallback for random_get_entropy() instead of zero 82f182812f17 timekeeping: Add raw clock fallback for random_get_entropy() bc94ccb2904e powerpc: define get_cycles macro for arch-override 8ca78fbdeba0 alpha: define get_cycles macro for arch-override 9bf990cff673 parisc: define get_cycles macro for arch-override e05efd31b9db s390: define get_cycles macro for arch-override 9f174326e35c ia64: define get_cycles macro for arch-override 807ed9c29586 init: call time_init() before rand_initialize() 2814a9e632db random: fix sysctl documentation nits 4179671f496b random: document crng_fast_key_erasure() destination possibility 8b373c113a4c random: make random_get_entropy() return an unsigned long b8078810e44d random: allow partial reads if later user copies fail ccaaff57ed50 random: check for signals every PAGE_SIZE chunk of /dev/[u]random 02c2e2ca3610 random: check for signal_pending() outside of need_resched() check e7e196e1ae26 random: do not allow user to keep crng key around on stack be7561767ce8 random: do not split fast init input in add_hwgenerator_randomness() 636b057e2a1a random: mix build-time latent entropy into pool at init 3967a200367c random: re-add removed comment about get_random_{u32,u64} reseeding 25727cbbe9b4 random: treat bootloader trust toggle the same way as cpu trust toggle a704248b4590 random: skip fast_init if hwrng provides large chunk of entropy 3689ac035180 random: check for signal and try earlier when generating entropy 94c8249efa76 random: reseed more often immediately after booting 99290c6898b2 random: make consistent usage of crng_ready() 0c66c876393b random: use SipHash as interrupt entropy accumulator 6da877d2d46b random: replace custom notifier chain with standard one 39c9e5566ac5 random: don't let 644 read-only sysctls be written to e4e1600a674f random: give sysctl_random_min_urandom_seed a more sensible value 2c60d7f38d64 random: do crng pre-init loading in worker rather than irq 1523ec5324e9 random: unify cycles_t and jiffies usage and types fdb1e54472c3 random: cleanup UUID handling c169e7a09cd4 random: only wake up writers after zap if threshold was passed e400ba11a241 random: round-robin registers as ulong, not u32 144c1e7ecf00 random: clear fast pool, crng, and batches in cpuhp bring up 80c1f7f8f3cd random: pull add_hwgenerator_randomness() declaration into random.h 98d6def672fd random: check for crng_init == 0 in add_device_randomness() 9df4a56fad32 random: unify early init crng load accounting d386b087056a random: do not take pool spinlock at boot 3c48a2da32ef random: defer fast pool mixing to worker 9489e36e2150 random: rewrite header introductory comment 9385681af846 random: group sysctl functions 96340f035df6 random: group userspace read/write functions 74b704245f31 random: group entropy collection functions 43e87e6f3317 random: group entropy extraction functions 019e057db9b1 random: group crng functions 81e62ff1f650 random: group initialization wait functions d3a2510216b4 random: remove whitespace and reorder includes 30c52e99db0d random: remove useless header comment 95f85a01584e random: introduce drain_entropy() helper to declutter crng_reseed() c807eca035c3 random: deobfuscate irq u32/u64 contributions f641f9495d6f random: add proper SPDX header ce951e9672df random: remove unused tracepoints 4509941f75ac random: remove ifdef'd out interrupt bench ad5d17d0faf9 random: tie batched entropy generation to base_crng generation 86ab60616ec6 random: fix locking for crng_init in crng_reseed() d2d1ad9430b1 random: zero buffer after reading entropy from userspace eda555356b39 random: remove outdated INT_MAX >> 6 check in urandom_read() 5dd066ade820 random: make more consistent use of integer types ba789caa17a0 random: use hash function for crng_slow_load() b27bd09d0544 random: use simpler fast key erasure flow on per-cpu keys 1aab83f96663 random: absorb fast pool into input pool after fast load 4a18db164cbb random: do not xor RDRAND when writing into /dev/random b51caadb18a7 random: ensure early RDSEED goes through mixer on init fd6eb2800589 random: inline leaves of rand_initialize() 5e4fab6fefb1 random: get rid of secondary crngs ded4cc806d0d random: use RDSEED instead of RDRAND in entropy extraction 704c76e08804 random: fix locking in crng_fast_load() 67fdda9af773 random: remove batched entropy locking ad86aa8ec90f random: remove use_input_pool parameter from crng_reseed() 1bc9db59b24c random: make credit_entropy_bits() always safe 3730490111ca random: always wake up entropy writers after extraction cb65ac300816 random: use linear min-entropy accumulation crediting a6beb8155b9c random: simplify entropy debiting a5e2c8a4574a random: use computational hash for entropy extraction add92df1cb37 random: only call crng_finalize_init() for primary_crng 07e015230415 random: access primary_pool directly rather than through pointer b53c9666e714 random: continually use hwgenerator randomness c1dc53d781fd random: simplify arithmetic function flow in account() 2f0e83e8326b random: selectively clang-format where it makes sense db7a0a9171ed random: access input_pool_data directly rather than through pointer c25c7e29be27 random: cleanup fractional entropy shift constants 68512942c0d7 random: prepend remaining pool constants with POOL_ 2772ba4d5223 random: de-duplicate INPUT_POOL constants da80b44cf9cf random: remove unused OUTPUT_POOL constants f9efa1a98831 random: rather than entropy_store abstraction, use global b6d849d0e2f8 random: remove unused extract_entropy() reserved argument 578fbb760064 random: remove incomplete last_data logic 8aa9ddc4db29 random: cleanup integer types 4330c485f92c random: cleanup poolinfo abstraction 250bda5d0505 random: fix typo in comments 15a1a3baf14f random: don't reset crng_init_cnt on urandom_read() d47579fb283a random: avoid superfluous call to RDRAND in CRNG extraction 0c3910447110 random: early initialization of ChaCha constants 5822fad8d3dc random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs 69bb5f0917f9 random: harmonize "crng init done" messages c4c9081184e9 random: mix bootloader randomness into pool 1b1258b91757 random: do not re-init if crng_reseed completes before primary init 08040365d0b7 random: do not sign extend bytes for rotation when mixing 2e827d53343a random: use BLAKE2s instead of SHA1 in extraction c5a7694fa802 random: remove unused irq_flags argument from add_interrupt_randomness() 40af1df8034a random: document add_hwgenerator_randomness() with other input functions 45626449eb25 lib/crypto: blake2s: avoid indirect calls to compression function for Clang CFI b0cdd9ec8445 lib/crypto: sha1: re-roll loops to reduce code size cba2195416d4 lib/crypto: blake2s: move hmac construction into wireguard caba66ec322e lib/crypto: blake2s: include as built-in 830ecbae41a7 MAINTAINERS: add git tree for random.c 12d7163380a2 MAINTAINERS: co-maintain random.c 0da5349e2254 ACPI: sysfs: Fix BERT error region memory mapping bf5a3c51e9f7 ice: fix crash at allocation failure acd12d165281 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID f82ccfa4835b HID: amd_sfh: Add support for sensor discovery
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>