Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp2937628pxb; Thu, 10 Feb 2022 08:42:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJx2b7WU2/mG998JfNGHEnOHAFWCpM8LTb48rr/FNdK7QJO1WMP+MTegdxh6kMRiSs/s+6x5 X-Received: by 2002:a17:906:da0b:: with SMTP id fi11mr7147634ejb.89.1644511327396; Thu, 10 Feb 2022 08:42:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644511327; cv=none; d=google.com; s=arc-20160816; b=ZSciJUn5O4PPlPyeE46b9UITEo7MsLhKAHc5vPvdStEnXPrrIdRSZI+usDDpnAQ0P/ HW5aenvD487f4RgSX8xLP3tfXFJ40AbongeLQSAl95pVxo/Joedlnhphoq9hiWw0BHWa e14tqrjuMz45CdLy6Ai8MvufGXugJ58ogbrNa0HWFDW77EfVT/dUqnopBp1lM888Q68x vHI+k+RVSuHsYxABjPlShnOTn9JlPwQWqG/l+C2l256JNj+t7Vq/AONS6wwzzrzuf5mk zyoPWsrYYu2teN/Lj6MUTrsfqRYpOJgDAc/+BdP8WF9V7CANxcynJ9IPbZhKc2lvxZ7q /oTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:subject:message-id:date:from:mime-version :dkim-signature; bh=n3tP7J+GjUP9n0pTkqOGo4TBLlmw+yXnfxJFvhpA38Q=; b=qv+CEUK2ak6ga/TuVDRzT+4iYTH3QM7RahRRK353j+h816/on1MyiOEJAuD8HQVfiP B0ozCJ/njNJIITl+FEzW2TyfaUV8+C2p8eeB9pEnDxeTdNXcvJIBGAJGngP5tpCYZi8/ Aj+eHl8yQd33XjJkGNJohtSVVZXf+FM9tXZWvkf1yLTjfzxE8XBBUG4HpWEJfEMSzc+E TFbt9fQAbShESX07BVHsVYJX5kbHqg1TzdHHAjPOsHOiPCEFTNLRPbZDI5qGMsSUt/f8 m3M7hFVlXPBFRWzlGJuGBsiCy6jM2XmSCISy/I1Pjyl4n1mSk+daQQobLPccOjxWSfDy OyJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=kOOHqjU2; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f16si16029674edd.414.2022.02.10.08.41.42; Thu, 10 Feb 2022 08:42:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=kOOHqjU2; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243099AbiBJOo5 (ORCPT + 99 others); Thu, 10 Feb 2022 09:44:57 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:55014 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235171AbiBJOo5 (ORCPT ); Thu, 10 Feb 2022 09:44:57 -0500 Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com [IPv6:2a00:1450:4864:20::631]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DE5FCC4C for ; Thu, 10 Feb 2022 06:44:57 -0800 (PST) Received: by mail-ej1-x631.google.com with SMTP id a8so15886494ejc.8 for ; Thu, 10 Feb 2022 06:44:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:from:date:message-id:subject:to; bh=n3tP7J+GjUP9n0pTkqOGo4TBLlmw+yXnfxJFvhpA38Q=; b=kOOHqjU2sPsPoe93/TCS8P/mwS383UN0KBzObpB8GX/Spw+WN2tXzVIzoeYIK0u9So 6hBKf/1WzBR6yEIxovD80ezzbsWWe1C8j1zrTmNU07RIw686Z20mK9VIatTx6FzSS/Yl g0Jsu/ME5dmxsl6tYhVaxPN5xqFadEYG13O3cE9kqp2+Pt7SVPrNmD6HeYz4pkiWWfsJ iXQiaC1xa0w9f2V2p3cwyimfQLW216EX2PrUdm5EQ19vdGGdIJoEUYLc8VSAC3PU9sYD NySVV/Cp0wE3gYM10DKsTXGImDDufHVJzU+fZXyNAr/Xmg8rKD/W/NpkBV5B7mTHRVaH mvgA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=n3tP7J+GjUP9n0pTkqOGo4TBLlmw+yXnfxJFvhpA38Q=; b=w5PibhL+Tt0HXP/xRqlfpqLKow6+xjqBtRS3e2b0havo5T9zMXgVMFrrp8o1zzSwoX s6hnw2JVpifm9nQ5kgkAkVRib6qSjd4AYyknBiox79bOx0OHwct2myk4zHuBdcKK/8SG +2jqMcR8GKPhwnUcKbEuu8lxxfxMSQbAILaBMU++rTVdC3r/opi1uUhnE3hWASTObs1L r0gberROaQEkjQLBlY0sNyDnJjG3sQMKBfbuhRlO+KuyD9xhbQBBnSXSadoI8mLsOKBt IbZLdw485qLaVFapq45ecjbGl/VU0XBqZWADSMBouR4395u/ovBruAmcu7JnkWKsUv// G1fA== X-Gm-Message-State: AOAM531McyKMcOiR4vSIHVSkXf6512B69QpvUKesPKgggcDMdT1AnAVs x14vjeGpOGj9ZS6u0/3CV9nFWTs+1uYZsq+PNn8ytHCYy6w= X-Received: by 2002:a17:907:a428:: with SMTP id sg40mr2351305ejc.128.1644504296367; Thu, 10 Feb 2022 06:44:56 -0800 (PST) MIME-Version: 1.0 From: Sandy Harris Date: Thu, 10 Feb 2022 22:44:44 +0800 Message-ID: Subject: [PATCH 4/4] random: Apply get_source_long() in several places To: Linux Crypto Mailing List , "Ted Ts'o" , "Jason A. Donenfeld" , Herbert Xu , Greg Kroah-Hartman Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Replace arch_get_random_long()/random_get_entropy() sequences with get_source_long(). Signed-off-by: Sandy Harris --- drivers/char/random.c | 34 +++++++++------------------------- 1 file changed, 9 insertions(+), 25 deletions(-) diff --git a/drivers/char/random.c b/drivers/char/random.c index 6c77fd056f66..20af61a56ec0 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -1140,11 +1140,7 @@ static bool crng_init_try_arch(struct crng_state *crng) unsigned long rv; for (i = 4; i < 16; i++) { - if (!arch_get_random_seed_long(&rv) && - !arch_get_random_long(&rv)) { - rv = random_get_entropy(); - arch_init = false; - } + get_source_long(&rv) ; crng->state[i] ^= rv; } @@ -1158,11 +1154,7 @@ static bool __init crng_init_try_arch_early(void) unsigned long rv; for (i = 4; i < 16; i++) { - if (!arch_get_random_seed_long_early(&rv) && - !arch_get_random_long_early(&rv)) { - rv = random_get_entropy(); - arch_init = false; - } + get_source_long(&rv) ; primary_crng.state[i] ^= rv; } @@ -1341,7 +1333,7 @@ static int crng_slow_load(const u8 *cp, size_t len) static void crng_reseed(struct crng_state *crng, bool use_input_pool) { - unsigned long flags; + unsigned long flags, rv; int i, num; union { u8 block[CHACHA_BLOCK_SIZE]; @@ -1359,10 +1351,7 @@ static void crng_reseed(struct crng_state *crng, bool use_input_pool) } spin_lock_irqsave(&crng->lock, flags); for (i = 0; i < 8; i++) { - unsigned long rv; - if (!arch_get_random_seed_long(&rv) && - !arch_get_random_long(&rv)) - rv = random_get_entropy(); + get_source_long(&rv) ; crng->state[i + 4] ^= buf.key[i] ^ rv; } memzero_explicit(&buf, sizeof(buf)); @@ -1728,6 +1717,7 @@ static void extract_buf(u8 *out) u8 hash[BLAKE2S_HASH_SIZE]; unsigned long *salt; unsigned long flags; + unsigned long v ; blake2s_init(&state, sizeof(hash)); @@ -1737,10 +1727,8 @@ static void extract_buf(u8 *out) */ for (salt = (unsigned long *)&state.h[4]; salt < (unsigned long *)&state.h[8]; ++salt) { - unsigned long v; - if (!arch_get_random_long(&v)) - break; - *salt ^= v; + get_source_long(&v) ; + *salt ^= v ; } /* Generate a hash across the pool */ @@ -2037,9 +2025,7 @@ int __must_check get_random_bytes_arch(void *buf, int nbytes) unsigned long v; int chunk = min_t(int, left, sizeof(unsigned long)); - if (!arch_get_random_long(&v)) - break; - + get_source_long(&v) ; memcpy(p, &v, chunk); p += chunk; left -= chunk; @@ -2064,9 +2050,7 @@ static void __init init_std_data(void) mix_pool_bytes(&now, sizeof(now)); for (i = POOL_BYTES; i > 0; i -= sizeof(rv)) { - if (!arch_get_random_seed_long(&rv) && - !arch_get_random_long(&rv)) - rv = random_get_entropy(); + get_source_long(&rv) ; mix_pool_bytes(&rv, sizeof(rv)); } mix_pool_bytes(utsname(), sizeof(*(utsname()))); -- 2.25.1