Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3339952imm; Tue, 29 May 2018 05:41:10 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpCFOb/DhjN71sLGVBQLctZ3u92x8lnVL6cgC1/xjy/p4CeIwLahYSwAIGagyn+K6yvY322 X-Received: by 2002:a17:902:6b0c:: with SMTP id o12-v6mr17184612plk.159.1527597670596; Tue, 29 May 2018 05:41:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527597670; cv=none; d=google.com; s=arc-20160816; b=u3LSdeNR/UE/53Fpy+/rheHQLtTK1jD6Av2hvtr1wHOwx370jLP4VxX3M6Qx9ug7Xi I6OX9/xqtnCjUydb8VTn1RmP8+4Tr4jTOvgXD4/1HqQuNYb4xK8eVCC6R3cYKIGlCgE4 6Edy3w4ENO5T2GWmXPS/MnOhVXzWZdvlmUyGK1bJXirf1bCkmbDiOLz1YDH2IA1PJRtV BfPmoFh9PyV5f+9iXxDlVmIZdQHfoEJzJgZWSrLlSmS8ABV5PKpmSqBfSaDZLmy0OiIE u/8TpjuwKcFVRHhApVAcLpLfBBnECfprQ8faMdn1rFRCzIwyztX6FMiqm4lnWB1FJmhS A44Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=28PsKiEBGAaBV8tu7A8jItIJ2lK4+DWqFR7H6Rl3g0c=; b=wbdU4ntpZIQJjFVu6vh6Bd3b7Cl/aveDvnJK1R+12f8Js9Nh4TOO2Eaob8RRprdhV2 nzC60nJ0R1VViSsP8hg/kX1kgCAPpzAFrcsSe6MO2T0DHvVFe0c/N8oIU1lbIFxP7NCy VHRZtOE4ekQhh+zDVeM5wsDEPmeaxGhO30LZIPeM1bGaTfSHScSikKsJSIZT590OLMAT +a2eQ1kvG7YLwlXESxoRy2ozZqrZwOEvveft7ONCFCLRWl+vU9bat5tKu6RX+uFtQGFG 8+tOvJo+SFQ1DxfXGRyZQ6IpWiDenoCD9VNjcs8WadVpvTvuT0OfbZN22iNEbgX7kLZa DOiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r5-v6si25628038pgp.379.2018.05.29.05.40.56; Tue, 29 May 2018 05:41:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934218AbeE2MiM (ORCPT + 99 others); Tue, 29 May 2018 08:38:12 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:52360 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933874AbeE2MiL (ORCPT ); Tue, 29 May 2018 08:38:11 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 714EB401EF08; Tue, 29 May 2018 12:38:10 +0000 (UTC) Received: from prarit.bos.redhat.com (prarit-guest.khw.lab.eng.bos.redhat.com [10.16.186.145]) by smtp.corp.redhat.com (Postfix) with ESMTP id 03DB02026988; Tue, 29 May 2018 12:38:08 +0000 (UTC) From: Prarit Bhargava To: linux-kernel@vger.kernel.org Cc: Prarit Bhargava , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, "Theodore Ts'o" , Arnd Bergmann , Greg Kroah-Hartman , Rik van Riel , Andrew Morton , Philippe Ombredanne , Kees Cook , "Jason A. Donenfeld" , Kate Stewart Subject: [PATCH] x86, random: Fix get_random_bytes() warning in x86 start_kernel Date: Tue, 29 May 2018 08:38:00 -0400 Message-Id: <20180529123800.19627-1-prarit@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Tue, 29 May 2018 12:38:10 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Tue, 29 May 2018 12:38:10 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'prarit@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After 43838a23a05f ("random: fix crng_ready() test") early boot calls to get_random_bytes() will warn on each cpu on x86 because the crng is not initialized. For example, random: get_random_bytes called from start_kernel+0x8e/0x587 with crng_init=0 x86 only uses get_random_bytes() for better randomization of the stack canary value so the warning is of no consequence. Export crng_ready() for x86 and test if the crng is initialized before calling get_random_bytes(). Signed-off-by: Prarit Bhargava Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Cc: x86@kernel.org Cc: "Theodore Ts'o" Cc: Arnd Bergmann Cc: Greg Kroah-Hartman Cc: Rik van Riel Cc: Andrew Morton Cc: Philippe Ombredanne Cc: Kees Cook Cc: Prarit Bhargava Cc: "Jason A. Donenfeld" Cc: Kate Stewart --- arch/x86/include/asm/stackprotector.h | 3 ++- drivers/char/random.c | 5 ++++- include/linux/random.h | 1 + 3 files changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/stackprotector.h b/arch/x86/include/asm/stackprotector.h index 371b3a4af000..4e2223aa34fc 100644 --- a/arch/x86/include/asm/stackprotector.h +++ b/arch/x86/include/asm/stackprotector.h @@ -72,7 +72,8 @@ static __always_inline void boot_init_stack_canary(void) * there it already has some randomness on most systems. Later * on during the bootup the random pool has true entropy too. */ - get_random_bytes(&canary, sizeof(canary)); + if (crng_ready()) + get_random_bytes(&canary, sizeof(canary)); tsc = rdtsc(); canary += tsc + (tsc << 32UL); canary &= CANARY_MASK; diff --git a/drivers/char/random.c b/drivers/char/random.c index cd888d4ee605..003091d104bf 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -428,7 +428,10 @@ struct crng_state primary_crng = { * its value (from 0->1->2). */ static int crng_init = 0; -#define crng_ready() (likely(crng_init > 1)) +int crng_ready(void) +{ + return likely(crng_init > 1); +} static int crng_init_cnt = 0; static unsigned long crng_global_init_time = 0; #define CRNG_INIT_CNT_THRESH (2*CHACHA20_KEY_SIZE) diff --git a/include/linux/random.h b/include/linux/random.h index 2ddf13b4281e..45616513abd9 100644 --- a/include/linux/random.h +++ b/include/linux/random.h @@ -196,4 +196,5 @@ static inline u32 next_pseudo_random32(u32 seed) return seed * 1664525 + 1013904223; } +extern int crng_ready(void); #endif /* _LINUX_RANDOM_H */ -- 2.14.3