This is a note to let you know that I've just added the patch titled random: update comment from copy_to_user() -> copy_to_iter() to the 5.4-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: random-update-comment-from-copy_to_user-copy_to_iter.patch and it can be found in the queue-5.4 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From 63b8ea5e4f1a87dea4d3114293fc8e96a8f193d7 Mon Sep 17 00:00:00 2001 From: "Jason A. Donenfeld" <Jason@xxxxxxxxx> Date: Mon, 20 Jun 2022 11:03:48 +0200 Subject: random: update comment from copy_to_user() -> copy_to_iter() From: Jason A. Donenfeld <Jason@xxxxxxxxx> commit 63b8ea5e4f1a87dea4d3114293fc8e96a8f193d7 upstream. This comment wasn't updated when we moved from read() to read_iter(), so this patch makes the trivial fix. Fixes: 1b388e7765f2 ("random: convert to using fops->read_iter()") Signed-off-by: Jason A. Donenfeld <Jason@xxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- drivers/char/random.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -450,7 +450,7 @@ static ssize_t get_random_bytes_user(str /* * Immediately overwrite the ChaCha key at index 4 with random - * bytes, in case userspace causes copy_to_user() below to sleep + * bytes, in case userspace causes copy_to_iter() below to sleep * forever, so that we still retain forward secrecy in that case. */ crng_make_state(chacha_state, (u8 *)&chacha_state[4], CHACHA_KEY_SIZE); Patches currently in stable-queue which might be from Jason@xxxxxxxxx are queue-5.4/random-schedule-mix_interrupt_randomness-less-often.patch queue-5.4/random-update-comment-from-copy_to_user-copy_to_iter.patch queue-5.4/random-quiet-urandom-warning-ratelimit-suppression-message.patch queue-5.4/powerpc-powernv-wire-up-rng-during-setup_arch.patch