Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp2038851ybv; Fri, 14 Feb 2020 10:15:57 -0800 (PST) X-Google-Smtp-Source: APXvYqxmegm7hMTlUdgo2OHdh/T8AdNN3wyvoGeKRFB25I1tKNIti4M8BWGf+uQtn6+LjokUpudm X-Received: by 2002:a9d:12a2:: with SMTP id g31mr3466269otg.283.1581704157077; Fri, 14 Feb 2020 10:15:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581704157; cv=none; d=google.com; s=arc-20160816; b=hLsFJIdkiG/L6srG3+KFV99QRPSaRak9wuaZ2kpzkeh5QUhmp8xWPtL++uVvRX6bzW csvHIwNiRue/i8UlM4pUWdhbiylcqzJQ+RTXi83anxBA1MOa678KXqsepXUQYFuVMk1d 0MnwMd264jwer10PCF+c4cOcpNSU5TLkJf5PDFpZ+Lw210MIWb13OrUOskFWQc9Pi2A0 9MsEV4jqHnxGwwEkkcCtOMAntqKI/2yg3n81QtEC7KwtFq/3REon1ivibNJYPs7uvA93 g8rdYzNtvGh0pun8vBLhSDVtjY5b67Lx6RRckmTAwskLImzDCFwjrUF+qX5JFOus7K8c 9WSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=8xaqocqI7n6rLhfdsAfsTQaAIhwnxm1qjzL1SYx1WFE=; b=vM2fmaIO2XBiglzNyQohnbMVVNL3xchqQAmYivXXIROj5+1GTFW/8peaoQq+UVPXZd V2FvoGWRKd2cE/scpLUHZEe2v8rDWi/InpNu/FfvWRsFeqT+7CUWb+dhWjuGIYjeUXoo rQR/UCaH1e9ALodNqhljzZh9VhAn6jfsvs+GSD4x+W1KQlgDhmuCuKyyFMHGThkx6Y2N QLLCA4Ty9LQu+PAZprkWafXCPSP3LB3O3020/9+eC5KNYv5Cp/bV9C6N0ge7D6wqXAFg KfbdOunzjFpCJhshRcfDg3SeBUVJ+MGPvJKnp7NCAb7aBKUG0vqdjEnFwr1BnujGLzGp 1/Ig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=hj1rflza; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o25si3372272otk.28.2020.02.14.10.15.44; Fri, 14 Feb 2020 10:15:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=hj1rflza; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404519AbgBNSPO (ORCPT + 99 others); Fri, 14 Feb 2020 13:15:14 -0500 Received: from mail-il1-f193.google.com ([209.85.166.193]:44261 "EHLO mail-il1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725838AbgBNSPI (ORCPT ); Fri, 14 Feb 2020 13:15:08 -0500 Received: by mail-il1-f193.google.com with SMTP id s85so8803898ill.11 for ; Fri, 14 Feb 2020 10:15:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8xaqocqI7n6rLhfdsAfsTQaAIhwnxm1qjzL1SYx1WFE=; b=hj1rflza0N0ahI/+Gib5Me4e1hJXe20b4t9CabubbAWx1ea4PGEDoBKz1g/sTDSHVh BkrKDWptx3Iw26vTATPAmfUJDeuVBDraF8++mKvznG20mbE6Pice1TDSOeV6+MqN3YEb 3nbpfkMNy8ZmiUOCpbFFVmtuXK1tpbmsYgTLY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8xaqocqI7n6rLhfdsAfsTQaAIhwnxm1qjzL1SYx1WFE=; b=CW2M8Hbl0GfGcpYbIQ4MpVdIGrfHTTxBmVG45qMOXUSTnEykx1wCSXzNu9HxuP2OO9 5ECQPxmZnWJtApXjfKEMk54Iu6L7/JjvExgBOr74mQiOpw9wD+5YWTzsKT6ET4o+F4OM Q0r48zbNccGszu7FfgHZE1ZoX63A/wYx8UykMF+FcGZo6kYVGcpzU7tQh1N0/9urr7Ar epyiQJ0cso7OGauHHeW4jSJMieCbKdLRbWfe5qo9NdYl6+A7ap3ddkPvJBz84FWBCQOk rsrZd2zxAbxmxxrPCxalSjztmMVBImWMialTf0Ng54qxsIvI8tKcFiqOrlqqQvtggT/Z jMHw== X-Gm-Message-State: APjAAAVA6cVYnSq8Nm7j+41Kdj1F94fpUS+O4RYuz7VsJUvtWT04Swrp 6MejT1j26yS2bcaeleRpfrlgmalf9XAM5rhTBiorsA== X-Received: by 2002:a92:af8e:: with SMTP id v14mr4049827ill.150.1581704108241; Fri, 14 Feb 2020 10:15:08 -0800 (PST) MIME-Version: 1.0 References: <158166060044.9887.549561499483343724.stgit@devnote2> <158166062748.9887.15284887096084339722.stgit@devnote2> In-Reply-To: <158166062748.9887.15284887096084339722.stgit@devnote2> From: Hsin-Yi Wang Date: Sat, 15 Feb 2020 02:14:42 +0800 Message-ID: Subject: Re: [PATCH 2/3] random: rng-seed source is utf-8 To: Masami Hiramatsu Cc: lkml , kernel-team@android.com, Mark Salyzyn , "Theodore Ts'o" , Arnd Bergmann , Greg Kroah-Hartman , Richard Henderson , Mark Brown , Kees Cook , Vasily Gorbik , Andrew Morton , Steven Rostedt , Mike Rapoport , Arvind Sankar , Dominik Brodowski , Thomas Gleixner , Alexander Potapenko , Jonathan Corbet , Mauro Carvalho Chehab , Josh Poimboeuf , Pawan Gupta , Juergen Gross , Rob Herring , linux-doc@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 14, 2020 at 2:10 PM Masami Hiramatsu wrote: > > From: Mark Salyzyn > > commit 428826f5358c922dc378830a1717b682c0823160 > ("fdt: add support for rng-seed") makes the assumption that the data > in rng-seed is binary, when it is typically constructed of utf-8 > characters which has a bitness of roughly 6 to give appropriate > credit due for the entropy. > > Fixes: 428826f5358c ("fdt: add support for rng-seed") > Signed-off-by: Mark Salyzyn > Cc: linux-kernel@vger.kernel.org > Cc: kernel-team@android.com > Cc: Kees Cook > Cc: Theodore Y. Ts'o > --- > drivers/char/random.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/char/random.c b/drivers/char/random.c > index c7f9584de2c8..ee21a6a584b1 100644 > --- a/drivers/char/random.c > +++ b/drivers/char/random.c > @@ -2306,7 +2306,7 @@ EXPORT_SYMBOL_GPL(add_hwgenerator_randomness); > void add_bootloader_randomness(const void *buf, unsigned int size) > { > if (IS_ENABLED(CONFIG_RANDOM_TRUST_BOOTLOADER)) > - add_hwgenerator_randomness(buf, size, size * 8); > + add_hwgenerator_randomness(buf, size, size * 6); Hi, In the next patch, entropy is added by + add_device_randomness(rng_seed, strlen(rng_seed)); + credit_trusted_entropy_bits(strlen(rng_seed) * 6); If the add_bootloader_randomness() function is only used for dt, do we need to shorten the credit bits? In dt-schema[1] we stated that this is a uint8 array, and dt is able to generate this. It doesn't need to avoid using space for parameter splitting. For some device, asking for random number is time consuming. Shorten the credit length makes it have to generate longer seed for dt to meet the CRNG_INIT_CNT_THRESH threshold. [1] https://github.com/devicetree-org/dt-schema/blob/master/schemas/chosen.yaml#L55 Thanks