Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp6093217iog; Thu, 23 Jun 2022 11:10:01 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vXrXFreMrBwgh5FaaDaY6PBeG514fEeaKwcuQc9y98W2ymZEpjq1KgOJm2oHUlTKIF0HmO X-Received: by 2002:a17:906:530e:b0:722:e90c:6bc7 with SMTP id h14-20020a170906530e00b00722e90c6bc7mr9463235ejo.569.1656007801704; Thu, 23 Jun 2022 11:10:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656007801; cv=none; d=google.com; s=arc-20160816; b=hgM9lAG0lOouODiuGjnNwGTKOVATIzOKEQk2KU/YnC4/WpaR2Y+3lcRhpb0rf85JgK kMCHCxsBWJO5yTKeIFycU2tcfwoGChOpiyzBGpAr/HFQgMLpp24MYyLMKRHNc+g86eG1 oBM40mfCnv/7JJdzycRImjVBPoE+BX26Rn78iXU7c14Y9fyfXZUIGDmwmhOXN8Gfu/Z0 c+g5HTbe4xkaDTe4LTx15q/2rAuVCxH+SPe9x2/gMrIwHLzuFIisZR1ErmoiqYI6WgtE oQbQUYB6HvseQlWptOC4vSKb8cE384TW2nAarDksQeI0Jjdmo3pixq4sUL3BJtCQ1LrA ehvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=76eASVNU+K1V0FBPtqqUhQyvN7vN87iBGABPDc5nv5Y=; b=OHeT+CNn6vuY8Ry4X6z8MWJYwjcEVYMEe4NHbjb+Tr6z0OsUsNr334hZm5swpnsOW0 ZxxcpDC6oMI7gHbtNN/1Hh7qfFM9sQiVLl1UMhlhixgCAq39/+1hQnW77wDAV/jDA5DD 1P0TMZUzlc2YYG6ehyyjp+QvbE+NQNUxlYLvxrtwHvmss6rYQDwoAP/UTriCAhoLI1Qs ZX+IsS/4a2JK2NYIMMdbLjAFaOTDfN5S1eRcbSETXXebgcxPyxA6DiLDrVzF2tupPRiY zPJHTctafcBvS3i0UQk9ldARpa+0sE1GDkO9CiRd/VckZXVufaycBQqwbn8CDng+iOjf 8Qcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PvO65BHh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u9-20020aa7db89000000b004356d05bdddsi319016edt.42.2022.06.23.11.09.32; Thu, 23 Jun 2022 11:10:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PvO65BHh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236178AbiFWSHY (ORCPT + 99 others); Thu, 23 Jun 2022 14:07:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45370 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235983AbiFWSGR (ORCPT ); Thu, 23 Jun 2022 14:06:17 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DDCD94F1F8; Thu, 23 Jun 2022 10:18:48 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 88CA6B82490; Thu, 23 Jun 2022 17:18:47 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CA35BC3411B; Thu, 23 Jun 2022 17:18:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1656004726; bh=kLu6oEFnz7kWzqySjKoPppP6306WDVKu2D0M9xJxpzc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PvO65BHhOVoVcgD1J8KAvNoDz/gkeLkRULzLhZugRWXlNRkgbqfnTOn8qVSBLK5Mm 3ds5dJVx98bOGMjHHCzmU0Q0akzX2/2taJHYqB3xAodTwwdjLQbOYZ9tZbyvvmbeqS bpXWxDNhCmlZ+QzJPGslOsFESJNt2eEX5iv8uxnM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dominik Brodowski , "Jason A. Donenfeld" Subject: [PATCH 4.19 123/234] random: skip fast_init if hwrng provides large chunk of entropy Date: Thu, 23 Jun 2022 18:43:10 +0200 Message-Id: <20220623164346.537703214@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220623164343.042598055@linuxfoundation.org> References: <20220623164343.042598055@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Jason A. Donenfeld" commit af704c856e888fb044b058d731d61b46eeec499d upstream. At boot time, EFI calls add_bootloader_randomness(), which in turn calls add_hwgenerator_randomness(). Currently add_hwgenerator_randomness() feeds the first 64 bytes of randomness to the "fast init" non-crypto-grade phase. But if add_hwgenerator_randomness() gets called with more than POOL_MIN_BITS of entropy, there's no point in passing it off to the "fast init" stage, since that's enough entropy to bootstrap the real RNG. The "fast init" stage is just there to provide _something_ in the case where we don't have enough entropy to properly bootstrap the RNG. But if we do have enough entropy to bootstrap the RNG, the current logic doesn't serve a purpose. So, in the case where we're passed greater than or equal to POOL_MIN_BITS of entropy, this commit makes us skip the "fast init" phase. Cc: Dominik Brodowski Signed-off-by: Jason A. Donenfeld Signed-off-by: Greg Kroah-Hartman --- drivers/char/random.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -1120,7 +1120,7 @@ void rand_initialize_disk(struct gendisk void add_hwgenerator_randomness(const void *buffer, size_t count, size_t entropy) { - if (unlikely(crng_init == 0)) { + if (unlikely(crng_init == 0 && entropy < POOL_MIN_BITS)) { size_t ret = crng_pre_init_inject(buffer, count, true); mix_pool_bytes(buffer, ret); count -= ret;