Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp6366440ybi; Wed, 29 May 2019 06:53:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqyNYZIjuLRNuY0KWkDvXW3FQSLC6P53r6rDH5NXpU0PzAZQ4DRTBciTTHJnJUcO08Foyb8r X-Received: by 2002:a17:902:7591:: with SMTP id j17mr81724021pll.200.1559137986892; Wed, 29 May 2019 06:53:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559137986; cv=none; d=google.com; s=arc-20160816; b=t9J5oJz1Tor1PthHKWG9lQG4wVQ7jk6IheQanXdgunAkg5SCj3OCv/UIqqf4QA7R9j 2e3ZxOL6EtFUL1kFUKKSe1WsW5pvhCV1D7d8VTsy2kYTVUNMOt0odzESMuNhqHj290Bh Trrq3e9bzvJqS/SDzi1KZUKGwIO63PnaLkzWkpSaHV9OVOoTFAPeIAgKYoHCd9vgPzmj INDNSfEcKrHPYZts0QnJZfEdrnZm3SkT34XqGzqVkynG9Tu/Jk38JWgma8yPqP8IYwjp XJRj/jJiH3t7aCwezCYyupxmPPbfxazkw83M1AEl8G01iH95Kg0h9fjKf4+DYuZVwZMU BmDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from; bh=W9khfcWH2mHTv84Hpvlb9fWnUbO4V5Yed9hbdGNfc0A=; b=KmmHvJ5qbatNR46TiEPicCUG2PEJUzT+MdjSRcPRU4GPisNi4q9i2echotfzda5O0c Cv2/Oua079wv0QTQhds4IIuZ2e1rH2yXZ3tvrNwQzktYIAk61BXKbvYRj2tvboerIQ0i pH77gj19qQfO/Hjkfj6Zw4Q0r+ziY4Z5Hp1bd00U6uwqmX7HO0wtUFtDK+/7MvALczZd /s8V3t35DrpphGtpsc0EJJpx9uj9Xs807koWdmShT4MwI7ZG4qVa/vWUEqZLYJFg5Mtu WyGGW22GFqBg9Memr8EF4dJPNY7GzEXkpOwiNDdVl2eZe2p68NgQw4Icfx/4Ld5trsRP k4SQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v10si26754996pfe.87.2019.05.29.06.52.50; Wed, 29 May 2019 06:53:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727509AbfE2Nvb convert rfc822-to-8bit (ORCPT + 99 others); Wed, 29 May 2019 09:51:31 -0400 Received: from eu-smtp-delivery-151.mimecast.com ([146.101.78.151]:50105 "EHLO eu-smtp-delivery-151.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727086AbfE2Nv2 (ORCPT ); Wed, 29 May 2019 09:51:28 -0400 Received: from AcuMS.aculab.com (156.67.243.126 [156.67.243.126]) (Using TLS) by relay.mimecast.com with ESMTP id uk-mta-141-3F-5HhagN6e9tnQVnk1CeQ-1; Wed, 29 May 2019 14:51:25 +0100 Received: from AcuMS.Aculab.com (fd9f:af1c:a25b:0:43c:695e:880f:8750) by AcuMS.aculab.com (fd9f:af1c:a25b:0:43c:695e:880f:8750) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Wed, 29 May 2019 14:51:24 +0100 Received: from AcuMS.Aculab.com ([fe80::43c:695e:880f:8750]) by AcuMS.aculab.com ([fe80::43c:695e:880f:8750%12]) with mapi id 15.00.1347.000; Wed, 29 May 2019 14:51:24 +0100 From: David Laight To: 'Neil Horman' , "linux-kernel@vger.kernel.org" CC: Steve Grubb , Theodore Ts'o , "Arnd Bergmann" , Greg Kroah-Hartman Subject: RE: [PATCH] Fix xoring of arch_get_random_long into crng->state array Thread-Topic: [PATCH] Fix xoring of arch_get_random_long into crng->state array Thread-Index: AQHVFiSGW6uE5jAIekyknyRep1UK46aCHqcQ Date: Wed, 29 May 2019 13:51:24 +0000 Message-ID: References: <20190402220025.14499-1-nhorman@tuxdriver.com> <20190529134200.GA31099@hmswarspite.think-freely.org> In-Reply-To: <20190529134200.GA31099@hmswarspite.think-freely.org> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.202.205.107] MIME-Version: 1.0 X-MC-Unique: 3F-5HhagN6e9tnQVnk1CeQ-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Neil Horman > Sent: 29 May 2019 14:42 > On Tue, Apr 02, 2019 at 06:00:25PM -0400, Neil Horman wrote: > > When _crng_extract is called, any arch that has a registered > > arch_get_random_long method, attempts to mix an unsigned long value into > > the crng->state buffer, it only mixes in 32 of the 64 bits available, > > because the state buffer is an array of u32 values, even though 2 u32 > > are expected to be filled (owing to the fact that it expects indexes 14 > > and 15 to be filled). > > > > Bring the expected behavior into alignment by casting index 14 to an > > unsignled long pointer, and xoring that in instead. ... > > diff --git a/drivers/char/random.c b/drivers/char/random.c > > index 38c6d1af6d1c..8178618458ac 100644 > > --- a/drivers/char/random.c > > +++ b/drivers/char/random.c > > @@ -975,14 +975,16 @@ static void _extract_crng(struct crng_state *crng, > > __u8 out[CHACHA_BLOCK_SIZE]) > > { > > unsigned long v, flags; > > - > > + unsigned long *archrnd; > > if (crng_ready() && > > (time_after(crng_global_init_time, crng->init_time) || > > time_after(jiffies, crng->init_time + CRNG_RESEED_INTERVAL))) > > crng_reseed(crng, crng == &primary_crng ? &input_pool : NULL); > > spin_lock_irqsave(&crng->lock, flags); > > - if (arch_get_random_long(&v)) > > - crng->state[14] ^= v; > > + if (arch_get_random_long(&v)) { > > + archrnd = (unsigned long *)&crng->state[14]; > > + *archrnd ^= v; > > + } Isn't that likely to generate a misaligned memory access? David - Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK Registration No: 1397386 (Wales)