Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp624078iog; Mon, 13 Jun 2022 09:21:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzpK+pD3aYpnLXn8EY5ZQKAz/iqgL30A+xkQ/lk1bc0YwSrRM+qiaAE/oN5KOOyF9vY5MHY X-Received: by 2002:a05:6402:195:b0:431:5499:35eb with SMTP id r21-20020a056402019500b00431549935ebmr587505edv.346.1655137281834; Mon, 13 Jun 2022 09:21:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655137281; cv=none; d=google.com; s=arc-20160816; b=LFkxiq1Pfcb4S7ODM6vVnPcAbS4KLKn3wKF5BMs7c014kNLNa4Eh4NIByXWu9a3T7A Ix9Vs1D19/m12POUbb33X/AA20JoznYxBXXCaBG2VWh29CoUB545LYayDxd40jtcXsUU OvR8lQCKG1tbSl//fjEhh0TH042CBKnQ9x/YvH7jdUd8x1Dt2w0+v+U3SAKXoxnAmLQy lU1pZFgIatjUwvcfjFWgVgCfMr7IjvvBp4Tg6azE1AoacKVl3iBr+LA+mAsZUGHwxDC0 b0u1SDhdPzEdi6lgd+3R/5J8U73xgSGskdQVVj+Tznj1Ed11up0702TcdfOLDDVsjRDH os6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=AyQQE2ME6UBWliHMqwW7KWr9/jfslOuDZpr9UfbZe+4=; b=L26Tta8/WYw6X2KRjwBpvmAqiDX6VdJdpzdjjkQUO/LYE6iOeGPOSdv0Earb/VfWAY 0YBhUxdIMw6zYGGP6LwBnoEvjHhdBMxUx/tOnQLA5hb0ROvL+CBrXFLjlLCbg1LdJHSj GJyaxdhO7j7a7cwRJtH/G4oL+nUZWUcKfg/gtYCjOTwwbUY+E08JqnnLMCgKW1iFKnol eh/CD0VSAq94twixR3xMgnxaeu5TB/MJ6D2v3coyAjIRdGUOQEOyIcgf6XkfJBsatt7z daeprhXcYhMVpIiHuZAuz2tLlaUs9VY2N+ReKOH+XLGIFHCllruoMNcXekYJ4sPgLz22 D7SQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qdeYB1m0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a5-20020a509e85000000b0042aaec01a46si8444239edf.462.2022.06.13.09.20.56; Mon, 13 Jun 2022 09:21:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qdeYB1m0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376679AbiFMNWz (ORCPT + 99 others); Mon, 13 Jun 2022 09:22:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60658 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1377262AbiFMNUL (ORCPT ); Mon, 13 Jun 2022 09:20:11 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 889DA6A061; Mon, 13 Jun 2022 04:23:22 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 60907B80EB8; Mon, 13 Jun 2022 11:23:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C8402C34114; Mon, 13 Jun 2022 11:23:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1655119386; bh=Q/l9RUy8/3G1e0MU6hLwrSAVG3LKKEcXIVUIMr1113c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qdeYB1m0VhFCU4iFspC75CANONz+wQk8JdM/ePaJghAJDgn1+7Wu3ZGCQ52pkU3Uf I226fcyOxPAhDgwOyaKPtPWEpf1E1hrkywY2UpjyVp3devRzyM2Hkj3K29C/Lt66qf GwJBpw+Lzqm+1mKPS6m2uJXLNFz2LHvhrHjiBDPE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Jason A. Donenfeld" Subject: [PATCH 5.15 243/247] random: account for arch randomness in bits Date: Mon, 13 Jun 2022 12:12:25 +0200 Message-Id: <20220613094930.316545625@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220613094922.843438024@linuxfoundation.org> References: <20220613094922.843438024@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-8.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Jason A. Donenfeld" commit 77fc95f8c0dc9e1f8e620ec14d2fb65028fb7adc upstream. Rather than accounting in bytes and multiplying (shifting), we can just account in bits and avoid the shift. The main motivation for this is there are other patches in flux that expand this code a bit, and avoiding the duplication of "* 8" everywhere makes things a bit clearer. Cc: stable@vger.kernel.org Fixes: 12e45a2a6308 ("random: credit architectural init the exact amount") Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -813,7 +813,7 @@ early_param("random.trust_bootloader", p int __init random_init(const char *command_line) { ktime_t now = ktime_get_real(); - unsigned int i, arch_bytes; + unsigned int i, arch_bits; unsigned long entropy; #if defined(LATENT_ENTROPY_PLUGIN) @@ -821,12 +821,12 @@ int __init random_init(const char *comma _mix_pool_bytes(compiletime_seed, sizeof(compiletime_seed)); #endif - for (i = 0, arch_bytes = BLAKE2S_BLOCK_SIZE; + for (i = 0, arch_bits = BLAKE2S_BLOCK_SIZE * 8; i < BLAKE2S_BLOCK_SIZE; i += sizeof(entropy)) { if (!arch_get_random_seed_long_early(&entropy) && !arch_get_random_long_early(&entropy)) { entropy = random_get_entropy(); - arch_bytes -= sizeof(entropy); + arch_bits -= sizeof(entropy) * 8; } _mix_pool_bytes(&entropy, sizeof(entropy)); } @@ -838,7 +838,7 @@ int __init random_init(const char *comma if (crng_ready()) crng_reseed(); else if (trust_cpu) - _credit_init_bits(arch_bytes * 8); + _credit_init_bits(arch_bits); return 0; }