Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp794397rwb; Thu, 6 Oct 2022 04:46:00 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5oQU0TDyo9cKruS3eoCjDPf2sx8SM/k2cvO5wth7V537+AdqqRCR9li33/JrsuSfgB3ixl X-Received: by 2002:a63:461c:0:b0:44b:f2f:3362 with SMTP id t28-20020a63461c000000b0044b0f2f3362mr4206454pga.357.1665056760595; Thu, 06 Oct 2022 04:46:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665056760; cv=none; d=google.com; s=arc-20160816; b=jcWspQukSyI3I3hqcriQeRRiUtLqcEtk3tPMcwwaZ7S5gYs6s71X1ur7fgjzmx9r5N u2WVMZzcG+WqurApc07YxfckB8gwsVBqr0L6E7gGs/G4CI3vAa9CfPTElBvoZP9ebAC6 pmJLkfwijt0cwoMzhn2MWjlH1io6sVhfzmoSKXDdsGixQSUvVfDALElPNU9+nJhNWwSv UY9M9JlL31eJ2pXsa6lrArSFDHg/8BRmqG/VP5SbzDfL+kDoqkWLviSce6uhMIOam0Oe +qFeRk9L1Hyo7ML+ITgRo+rcf+f1R3lK6DRNmx75LqgLnWJc4P9myQyzeVVOVUxARrhF 6DIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=pmVwP88BbyiccxwgFsL5G+0jWvM/e0TmyMG64Wo7BA8=; b=sJXe2fGRkckQ5uPpnLWKE6Hcu9bkRA//tY1bQfc1oKF7RotBNIATkLfMf4UOYi7gUC jSkCZ7ufdfA64JMME6btfQXUvLOwhTHQN3uvNA1SbiAqDbaPDzEu4JlZRf9sbgCrMYaM XyvcREosATEFQWbM3forbqXfh6euNYFb+MmxuyHGIwzuVu2A7tiOcegHFyCHwxVVU9eN vQgG2xp5BKZ5BY3kfnd5pkTb/JVmJOvB5Rmy/kStIC148nmm2XLxG23LGUd8W2uLTQFv igHx5GJUuDG4SnxDWcrB8UUXh+j5vpsI3AD11BpsRILUEKXmtEFEtaQDFeVFE0G1KhFR GjWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fungible.com header.s=google header.b=NJokJKPn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fungible.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c4-20020a655a84000000b0043a20d57b46si21137724pgt.826.2022.10.06.04.45.47; Thu, 06 Oct 2022 04:46:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@fungible.com header.s=google header.b=NJokJKPn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fungible.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230317AbiJFL22 (ORCPT + 99 others); Thu, 6 Oct 2022 07:28:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41280 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230421AbiJFL20 (ORCPT ); Thu, 6 Oct 2022 07:28:26 -0400 Received: from mail-pl1-x633.google.com (mail-pl1-x633.google.com [IPv6:2607:f8b0:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6758E9C7FF for ; Thu, 6 Oct 2022 04:28:25 -0700 (PDT) Received: by mail-pl1-x633.google.com with SMTP id 10so1510271pli.0 for ; Thu, 06 Oct 2022 04:28:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fungible.com; s=google; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=pmVwP88BbyiccxwgFsL5G+0jWvM/e0TmyMG64Wo7BA8=; b=NJokJKPnOKKKA9kH8j2MszCemK9PRZ9JjSwT4Mxs6rD4eH/Bk8qbNj76qigyS5a0Mw IY6rRh0xEQno+rG5LZn+ZjWV118yaMdXNXcKBvrWhKarWFSQgdl1S02V4yukMO8u8i4H Sz/SdFPQPeJj8epYAz+mTXTDjy4T2PqZmmblU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=pmVwP88BbyiccxwgFsL5G+0jWvM/e0TmyMG64Wo7BA8=; b=vvC/mFkRH+0YN0WC6CEv0CV8vKqN+EeHDgJjanM8yKApTKSU5w4KJlJiko3vDcfba+ ZDnXDkD03DDuhH5lhALMuGvYWeduOOb/Z/zrXh/eEk84al0wB2b3UZjoQyVuIFleHJ27 NjtZWLGUyvuHIZ3aJYjhClykEP8p9G7jvdEWJs5fqlcB11SJAHyffoEb5dWTvaFBG1F/ W3p+ujamVtsD3MqIHWYyN47VS5ZaRQob7qEOm11InC0rwfm0yFWKwkGgaF++Sz/Ka7Se gdU/zrHm2bhXrDgYgjCZ7f85IyNDKgtSxHqCSZOEOZHrJ6gBPzABhjUUUF58EmU2owqM LLCA== X-Gm-Message-State: ACrzQf1i5QyKeZLFkFl8dRJ/czpib7fKSjicmXuXcWbVM7LdynUPk0yb wiejqCaFfO7Lh6CAKYlHXJ+p7cJoMMzFWh5g X-Received: by 2002:a17:90b:17c4:b0:20a:7f07:d878 with SMTP id me4-20020a17090b17c400b0020a7f07d878mr10274547pjb.7.1665055704968; Thu, 06 Oct 2022 04:28:24 -0700 (PDT) Received: from [192.168.1.115] ([185.126.107.38]) by smtp.gmail.com with ESMTPSA id a16-20020aa78e90000000b005385e2e86eesm4816584pfr.18.2022.10.06.04.28.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 06 Oct 2022 04:28:24 -0700 (PDT) Message-ID: Date: Thu, 6 Oct 2022 13:28:20 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.13.1 Subject: Re: [PATCH] mips: allow firmware to pass RNG seed to kernel Content-Language: en-US To: "Jason A. Donenfeld" Cc: Thomas Bogendoerfer , "open list:BROADCOM NVRAM DRIVER" , open list References: <20220930140138.575751-1-Jason@zx2c4.com> From: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/10/22 00:30, Jason A. Donenfeld wrote: > Hi Philippe, > > On Tue, Oct 4, 2022 at 12:07 AM Philippe Mathieu-Daudé wrote: >>> + add_bootloader_randomness(rng_seed, len); >> >> So we call char/random code with len=0. Is it safe? >> Maybe simply safer to check len before calling hex2bin? > > add_bootloader_randomness() is safe for all input sizes, and is > written to be callable with len=0 and have no effect. So this function > should be good as-is; there's no need to special case an unlikely > instance that's already handled by add_bootloader_randomness(). OK, thanks for the clarification. Phil.