Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2434597ioo; Sat, 28 May 2022 13:34:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqJQeQ4kU9M5an9dwCPBHYFe9Urzplesdkb2BTwcaZmyp6dafOqsHBdRK4j9VNdFUIT9jA X-Received: by 2002:a65:6c0a:0:b0:3fa:c20c:cbe7 with SMTP id y10-20020a656c0a000000b003fac20ccbe7mr18560950pgu.611.1653770047914; Sat, 28 May 2022 13:34:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653770047; cv=none; d=google.com; s=arc-20160816; b=MOjhPIJNLmjHAlAbABmOhE/f8h+Oqz8+5EMqhoXvxiaQT5kUl/EbHEuGmaEKvDTbMM s9E8caa+cRMAqrYrTB6KQoZ9YE0KOoQaHOKMiJLJBC0kZC8ucVOOxWS9P5iqydyIa7JF W9AYgXHmbiGvSVCOCZAKntP0CjhooHTlrhF2VTeR8wZ5lHxsNwMJVrBbLX3Q2iDGD+zZ mMP3B9GQj9XYbcX3SpaAmHHpOeCfZdMo6xfwrkTta53mvLd971zUelduuipv0iYlZAaC U4Z4nDMEGuokfz6BAt6WHGnYO6BfljsG0PpQrVaHdOvfTldfhiQ1Wxd4l7WYKtzGH2SN Xc3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fYto85SxadPgSViPi5m6N+EoVQSSNmVshGBnwcJ2mp8=; b=aspUcS7Z1jFRePCDwxcycqUvThERiAVP44mlbKv6RqZk1Um8JEueiDa8corLAhR6Jw g52+uQNOL/ZaDoAQPjaGlH+BVWX7YQ9CAagtaOXxUXds+7/m6RP56WhFRJG7Wp/aYMHm QVucpvO8LVd0DlxWu1jSxBJTW+jyyycMv9dYN/sk66dN4iS3EXazCiEcnkgq91L8Ifxd dIlJ+Rsywwq36h6DOdKAxkVJQ5eiaY383f+BFJ+7HwSmvQyivuTUuYqAlypbXSJCpx80 migMjdbeq5y4ZIEJ/TPnXcdxWKnuEmpnQcLzfB1L9ZxYwS4eL/02zwFvFoh3BdJHrOFB 5YVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ReogK7TO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id a4-20020a17090aa50400b001d5cd19a41esi6718136pjq.38.2022.05.28.13.34.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 13:34:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ReogK7TO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id EBB4919C775; Sat, 28 May 2022 12:35:30 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1353498AbiE0MLd (ORCPT + 99 others); Fri, 27 May 2022 08:11:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57540 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1352887AbiE0Lzo (ORCPT ); Fri, 27 May 2022 07:55:44 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4794314C753; Fri, 27 May 2022 04:49:10 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 63E5DB82466; Fri, 27 May 2022 11:49:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CD658C385A9; Fri, 27 May 2022 11:49:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653652148; bh=S4lomHdt9VVKtYuHtfMgqi4J2P/Uz5hhKmPw0PTyM/0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ReogK7TOXUCgV1xhQPvwvtF4IwjZxSCYxc/aUu/p6lIQORthK4EEHvSgx3JcIjy1V 1yYfCkQ/t2B8/JSi0e7lTPvFcQ0lcfj2TcASl041wmq646Kv2E77fj8p66bPgLmr4m v2QyqQKOEjl3FT4UwAlsWaCznyG55ruZ6kWgnYZ8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dominik Brodowski , "Jason A. Donenfeld" Subject: [PATCH 5.15 091/145] random: skip fast_init if hwrng provides large chunk of entropy Date: Fri, 27 May 2022 10:49:52 +0200 Message-Id: <20220527084901.672555823@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220527084850.364560116@linuxfoundation.org> References: <20220527084850.364560116@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Jason A. Donenfeld" commit af704c856e888fb044b058d731d61b46eeec499d upstream. At boot time, EFI calls add_bootloader_randomness(), which in turn calls add_hwgenerator_randomness(). Currently add_hwgenerator_randomness() feeds the first 64 bytes of randomness to the "fast init" non-crypto-grade phase. But if add_hwgenerator_randomness() gets called with more than POOL_MIN_BITS of entropy, there's no point in passing it off to the "fast init" stage, since that's enough entropy to bootstrap the real RNG. The "fast init" stage is just there to provide _something_ in the case where we don't have enough entropy to properly bootstrap the RNG. But if we do have enough entropy to bootstrap the RNG, the current logic doesn't serve a purpose. So, in the case where we're passed greater than or equal to POOL_MIN_BITS of entropy, this commit makes us skip the "fast init" phase. Cc: Dominik Brodowski Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -1125,7 +1125,7 @@ void rand_initialize_disk(struct gendisk void add_hwgenerator_randomness(const void *buffer, size_t count, size_t entropy) { - if (unlikely(crng_init == 0)) { + if (unlikely(crng_init == 0 && entropy < POOL_MIN_BITS)) { size_t ret = crng_pre_init_inject(buffer, count, true); mix_pool_bytes(buffer, ret); count -= ret;