Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp6514451ybi; Wed, 29 May 2019 08:55:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqyudOgXxFzkba5THH5GMotBVxN29OG3OBvf3Sb6nYJafbyYm0zvZsqblCD8FI27Cohrvajo X-Received: by 2002:a63:144e:: with SMTP id 14mr121849013pgu.304.1559145302009; Wed, 29 May 2019 08:55:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559145302; cv=none; d=google.com; s=arc-20160816; b=mLq1rXyJ+1ugdvOcf4M+Km05HgrnM/17JxUIkmzvXxYxstsRJLr1LbF4GPDs0WD+pr 7/Qk+IvJ6lyVq6fA7TryWqpRchTnlIjdNcVS+lXeUN/If3qbQInpNhHVSoeOiq2C+ZZX tKykeRaLd5sDOCzXlOUwZ7OgPPReeaxVAbXah1B98rBsNH0WaHkvMVzaUa2UZ8fyd4TK h1QZSE9EjxGtziJ/fDo5s0lCIvSEW3NBdw6kk02Cm5cI/7jIprXEr/ir6ChOmGZLtMmN n6tWBhbaCXJ7HjotwVnVrQrieoAQGsjkW/9wQjDo5qRHlpoHs1EhU+AB2z/hUP89pEOQ /VMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=NDd9lHzvkIiI9t0nTYm3UXVWOyi7xyVnOqu675WdMVI=; b=mN95J50dkzwOVhE6j+FtgK1R+0Q3cRao2mk+lYtYl2AmfNhxY+3ht4RIE1ff4nQbbc K3tuhsPyvOieyih2NbGErXAsh9lHSTSNLcmawbhRksgvqYuhOMtrReZAZsO943mzrO8w J7ESxALpFd2aqkNA6ZGi9dX4/SIxKwNIcXzhjkG5vq9i9XLhqRX0lYHzyhOee+a7H3zn fHcKjjRn5gMJot6hyK+bT9HYKun2FMQSj615eKIcDZ4R9pIliXL9HsuP2ARwialsO2wL 2bOlkViAg6NPkG7fmIM61LM/cJplxo2tycbxfaTwQKE2iQxikMc0NJ4LjKYPdlA8hC7o I7tw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o184si9207pgo.94.2019.05.29.08.54.44; Wed, 29 May 2019 08:55:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727012AbfE2Pwa (ORCPT + 99 others); Wed, 29 May 2019 11:52:30 -0400 Received: from charlotte.tuxdriver.com ([70.61.120.58]:50140 "EHLO smtp.tuxdriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725936AbfE2Pw3 (ORCPT ); Wed, 29 May 2019 11:52:29 -0400 Received: from cpe-2606-a000-111b-405a-0-0-0-162e.dyn6.twc.com ([2606:a000:111b:405a::162e] helo=localhost) by smtp.tuxdriver.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from ) id 1hW0sJ-0002C0-SU; Wed, 29 May 2019 11:52:25 -0400 Date: Wed, 29 May 2019 11:51:56 -0400 From: Neil Horman To: David Laight Cc: "linux-kernel@vger.kernel.org" , Steve Grubb , Theodore Ts'o , Arnd Bergmann , Greg Kroah-Hartman Subject: Re: [PATCH] Fix xoring of arch_get_random_long into crng->state array Message-ID: <20190529155156.GB31099@hmswarspite.think-freely.org> References: <20190402220025.14499-1-nhorman@tuxdriver.com> <20190529134200.GA31099@hmswarspite.think-freely.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.3 (2019-02-01) X-Spam-Score: -2.9 (--) X-Spam-Status: No Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 29, 2019 at 01:51:24PM +0000, David Laight wrote: > From: Neil Horman > > Sent: 29 May 2019 14:42 > > On Tue, Apr 02, 2019 at 06:00:25PM -0400, Neil Horman wrote: > > > When _crng_extract is called, any arch that has a registered > > > arch_get_random_long method, attempts to mix an unsigned long value into > > > the crng->state buffer, it only mixes in 32 of the 64 bits available, > > > because the state buffer is an array of u32 values, even though 2 u32 > > > are expected to be filled (owing to the fact that it expects indexes 14 > > > and 15 to be filled). > > > > > > Bring the expected behavior into alignment by casting index 14 to an > > > unsignled long pointer, and xoring that in instead. > ... > > > diff --git a/drivers/char/random.c b/drivers/char/random.c > > > index 38c6d1af6d1c..8178618458ac 100644 > > > --- a/drivers/char/random.c > > > +++ b/drivers/char/random.c > > > @@ -975,14 +975,16 @@ static void _extract_crng(struct crng_state *crng, > > > __u8 out[CHACHA_BLOCK_SIZE]) > > > { > > > unsigned long v, flags; > > > - > > > + unsigned long *archrnd; > > > if (crng_ready() && > > > (time_after(crng_global_init_time, crng->init_time) || > > > time_after(jiffies, crng->init_time + CRNG_RESEED_INTERVAL))) > > > crng_reseed(crng, crng == &primary_crng ? &input_pool : NULL); > > > spin_lock_irqsave(&crng->lock, flags); > > > - if (arch_get_random_long(&v)) > > > - crng->state[14] ^= v; > > > + if (arch_get_random_long(&v)) { > > > + archrnd = (unsigned long *)&crng->state[14]; > > > + *archrnd ^= v; > > > + } > > Isn't that likely to generate a misaligned memory access? > I'm not quite sure how it would, crng->state is an array of _u32's, and so every even element should be on a 64 bit boundary. Neil > David > > - > Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK > Registration No: 1397386 (Wales) > >