Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp2002893lfo; Sat, 28 May 2022 13:29:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwdZtfxOM10FygVnkWzpoSygf5cy4Xtx5Kop79OIMfQv89acWOHguysQP9Wj5DbMYaFZW20 X-Received: by 2002:a17:90b:1b08:b0:1df:f11a:7d51 with SMTP id nu8-20020a17090b1b0800b001dff11a7d51mr15190332pjb.190.1653769750627; Sat, 28 May 2022 13:29:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653769750; cv=none; d=google.com; s=arc-20160816; b=aVzqUweur1imlw16ap4YjsoeT3fEPqBNUmWHmSo9cY7S3Xj894b1EyQho30wfYI4oS EU8W5ajXR1mcQTuU3hSlM/sl8jikQ9iDlA6HvwALirONoRew9yB+du66rlE1zQ1TRQsA XuTHi4Gzb3YIs2fAL4XsTeXY/HuTJS23WlcV/LKhtcmKH5k1PbW5E8kGJ6KuW4W9YYtf HCboaFDWSAodry4+Aj3ib63LcPvx0dwh8xbstCFo765nC3ikDjmPy6OnDuYR9vavwOer OMKfduXueMiz63N9u7s8QoBPtiNWBMCwVf6vVAiNchQTM8dzfWHCjCZt8KGuvrZqa38h NdxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=M3LsdXPaud4MEERXmOWd8YF3viNRkC9vYg+HBh7EaDE=; b=D70nKEZtIQIzadyiweXNx4132DsTIHDFi2V8CwcPivDhTeeV8HmFsb9IbKlEejA+wn RWK0vfA8dysvjB5SRh28u83xJ3ldcgOOguvDer1bYqRK4LTznp9KpSyy7SvZQgBsbcWY ClBFsR+ZXksaUNm5Pv4s2SCA7Id4YY+HCfaJdjJxzbmpZDaaYVyIEubtY04OXAdtnQkc 4bEW7ZLU/sC/v/uyd4C1JW50VNaxr5Py75FOYXKIdxjdi3tpsnV+wJu1KsOUlr3pE+OD ILHPpmbHJopZYf3TFY3xklNcx7hGGeYKMuQ1Almu0fCR6p9tLfjaBzR2d3MoSW/1stqv 9RiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="w3hyO/5s"; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id 18-20020a621712000000b00505b770f007si8716097pfx.249.2022.05.28.13.29.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 13:29:10 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="w3hyO/5s"; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 089113C4B4; Sat, 28 May 2022 12:38:54 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240327AbiE0LlY (ORCPT + 99 others); Fri, 27 May 2022 07:41:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45714 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351778AbiE0LkF (ORCPT ); Fri, 27 May 2022 07:40:05 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 745C5111BA6; Fri, 27 May 2022 04:39:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id D82D961CB7; Fri, 27 May 2022 11:39:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E75EFC385A9; Fri, 27 May 2022 11:39:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653651557; bh=zeCNXD/6mPqe80gmC393S7dCSxWXSaOLreAdBp1vAWM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=w3hyO/5s3HTX2+ezbV1IxPIfyaIvgQh0jWUkx6xnbj3mv0vwBPMQX6iA4sxzrx+Hl hee6BzldFU8/rKFmOEG9OzeYormZu9C8NwuAQMti0JfHGvd3to4YjgvYFFvy1hYHAf +qV5J3OehherNOeq7JTmCGFboBszrNZIWJe2wfZw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dominik Brodowski , "Jason A. Donenfeld" Subject: [PATCH 5.15 016/145] random: mix bootloader randomness into pool Date: Fri, 27 May 2022 10:48:37 +0200 Message-Id: <20220527084852.955822975@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220527084850.364560116@linuxfoundation.org> References: <20220527084850.364560116@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Jason A. Donenfeld" commit 57826feeedb63b091f807ba8325d736775d39afd upstream. If we're trusting bootloader randomness, crng_fast_load() is called by add_hwgenerator_randomness(), which sets us to crng_init==1. However, usually it is only called once for an initial 64-byte push, so bootloader entropy will not mix any bytes into the input pool. So it's conceivable that crng_init==1 when crng_initialize_primary() is called later, but then the input pool is empty. When that happens, the crng state key will be overwritten with extracted output from the empty input pool. That's bad. In contrast, if we're not trusting bootloader randomness, we call crng_slow_load() *and* we call mix_pool_bytes(), so that later crng_initialize_primary() isn't drawing on nothing. In order to prevent crng_initialize_primary() from extracting an empty pool, have the trusted bootloader case mirror that of the untrusted bootloader case, mixing the input into the pool. [linux@dominikbrodowski.net: rewrite commit message] Signed-off-by: Dominik Brodowski Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -2301,6 +2301,7 @@ void add_hwgenerator_randomness(const ch if (unlikely(crng_init == 0)) { size_t ret = crng_fast_load(buffer, count); + mix_pool_bytes(poolp, buffer, ret); count -= ret; buffer += ret; if (!count || crng_init == 0)