Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp1097470pxb; Fri, 22 Apr 2022 19:34:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzuUrqLwNb8eQU0C3FLflPEnicbNkvclkKdSY1VUiEuTo1b8PHIoX46USKG4QMzpedCLfYw X-Received: by 2002:a63:450d:0:b0:3a8:f2ed:1aa5 with SMTP id s13-20020a63450d000000b003a8f2ed1aa5mr6362919pga.367.1650681251257; Fri, 22 Apr 2022 19:34:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650681251; cv=none; d=google.com; s=arc-20160816; b=NPxYnYwZo1AnA8tNhb3QGQ8N4FGB1w4xUos+gaNDcbpvhfjnhZ/QnXFjHO6R+k6gy5 ogxf+g0Hd39/e+BWIRx2lpNNvkBAjm/vEh7sALIktAXlhkKkz92JpIY60DcIHIHDh+IU d0WkvWHzMLrWx/S4uGzVbYx6umIak4PgeYh69z0ybHE5uUwdFzNKXFhSHHDy7O+lO6NV kIyZoyhkZw9LvFvuoxHpoTmbr1owPGcnyvm7hAvuAE9rmrU8ckPzB/pZwvRK/tXWox4/ njs53AZJT+glAIUohzogjKnKzGq6UkQvXsM6h3i9v/FRm2U3aNIdRqh0UWI5SswzaEPW y4nw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=qqZdE0u9CYPlQ6MQcqOeN4oZEKzgzl5ZlEVKxJ+FAHk=; b=cnhiHBX1ajVxSrSQIqBpRdAgSoTlNZE6nUcqwkCLvFcgy7W+P9+eothWrk9k9J/PQ/ p2+dCd8AFSpI/8aVQrPQj/feKjccA9z0qqxJ0F2ibFN79KPlk09oEB5G8jm2QH1il3Yy fS2qbGu0sEcjvBTdDHXj6VgLy42oyouPdGBh8ZNs+KA5oneC0TRtPgsjANsOTASnRSAS mwEkEeDwLX8vjYyV1mYLQSDYwlUyIeDjO4g8qhbPFgsiVPo/Mwd2FjVs95FkcvYQZHM9 CS/6JPTdMwRbK341B0UOp68qSF/gH+fOITrgoeIroAT17eEMfiYOUcf/hRux1oL7p8oY lT9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=OE7s3CPe; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n8-20020a170902f60800b00155fc0b4904si9314572plg.234.2022.04.22.19.33.41; Fri, 22 Apr 2022 19:34:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=OE7s3CPe; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232017AbiDWC1T (ORCPT + 99 others); Fri, 22 Apr 2022 22:27:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58860 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231897AbiDWC1S (ORCPT ); Fri, 22 Apr 2022 22:27:18 -0400 Received: from mail-ej1-x62f.google.com (mail-ej1-x62f.google.com [IPv6:2a00:1450:4864:20::62f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B5F61B5302; Fri, 22 Apr 2022 19:24:22 -0700 (PDT) Received: by mail-ej1-x62f.google.com with SMTP id y20so19569047eju.7; Fri, 22 Apr 2022 19:24:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qqZdE0u9CYPlQ6MQcqOeN4oZEKzgzl5ZlEVKxJ+FAHk=; b=OE7s3CPe37nMb1dGmVaIey7JbUtRJ7f6vav2gncQroL5ziOpNrqKAczdsVbRdftZTp lvDGoua7DfR0a3ih2mXvBGp/pr8YIwFWvJ7rYtm1KItJ7lzb7bsnCbr0XO6Al/bLSqmY wShQ3Q4PeDbaGhthAQmvyUaYMWSIREyHdWzLfIHLlO4xqjeROrsWMsY/13vozvUovkD1 TOAKaEV8j7EP/9ImivPEP7f9+9yBUR0jy0QdxfQqm1cDoP57+Iq+yV30nc+nepkuJNn4 1e6bTF9LZV27/+Lsu7KDZ5aSI6QmdhEq2BG3Q9STkKqaymG9HXWUrXc+hO38EBpNkLCd yQnQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qqZdE0u9CYPlQ6MQcqOeN4oZEKzgzl5ZlEVKxJ+FAHk=; b=J6Pp8w0xhTdRSm1ODUYS0bBxI8ISFH88psRrVam2XqS+LkPWGfpXKHd5K2dFAdKd2v 7we1UD+5/mB0Y0CnDS8toO21KkSkeAf1KWLA+r0ydF+7j0I6jV/fkOU1xcAohKxUOLR8 CPLrtNCvLQd2j25PZGF7ueoPm6o0rLNbMaMetKeAjp/O12zgyEnXVDCCdbRIavjSbjyH jE+XTazQlpY5zj4mjOByNFBwJNYyZbWNQBTURnGNi1WqnHnBnKqndcwHXGNN881Jxws6 EmFnKY1rr1cl3vIf7wPqGKodaQlVEekxhjdT8rgKJoh5V00l8z0+egYIfgVP9e6gbxzP nYRQ== X-Gm-Message-State: AOAM530UQbATXHrDDldaYNK8a5OgaaijVwJIaNMuZsFY6LL7IOOZCxpU nbBTIZR01ISWvkCk5lfDMXY8P9mtN4C48XyWud0= X-Received: by 2002:a17:906:d108:b0:6e8:7765:a70b with SMTP id b8-20020a170906d10800b006e87765a70bmr6585155ejz.436.1650680660905; Fri, 22 Apr 2022 19:24:20 -0700 (PDT) MIME-Version: 1.0 References: <20220419111650.1582274-1-Jason@zx2c4.com> <20220419111650.1582274-12-Jason@zx2c4.com> In-Reply-To: <20220419111650.1582274-12-Jason@zx2c4.com> From: Sandy Harris Date: Sat, 23 Apr 2022 10:24:07 +0800 Message-ID: Subject: Re: [PATCH v5 11/11] random: insist on random_get_entropy() existing in order to simplify To: "Jason A. Donenfeld" Cc: LKML , Linux Crypto Mailing List , Thomas Gleixner , Arnd Bergmann , "Theodore Ts'o" , Dominik Brodowski , Russell King , Catalin Marinas , Will Deacon , Geert Uytterhoeven , Thomas Bogendoerfer , Paul Walmsley , Palmer Dabbelt , Albert Ou , "David S . Miller" , Richard Weinberger , Anton Ivanov , Johannes Berg , Ingo Molnar , Borislav Petkov , Dave Hansen , "H . Peter Anvin" , Chris Zankel , Max Filippov , Stephen Boyd , Dinh Nguyen , linux-arm-kernel@lists.infradead.org, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-riscv@lists.infradead.org, sparclinux@vger.kernel.org, linux-um@lists.infradead.org, x86@kernel.org, linux-xtensa@linux-xtensa.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sat, Apr 23, 2022 at 6:37 AM Jason A. Donenfeld wrote: > > All platforms are now guaranteed to provide some value for > random_get_entropy(). In case some bug leads to this not being so, we > print a warning, ... Would it make sense to test at compile time? If there is no hardware RNG nor a cycle counter, then the kernel should be compiled with the gcc latent entropy plugin. Generate a warning suggesting that, or even an error insisting on it.