[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220103160002.1068356-1-Jason@zx2c4.com>
Date: Mon, 3 Jan 2022 17:00:02 +0100
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: "Theodore Ts'o" <tytso@....edu>,
"Jason A . Donenfeld" <Jason@...c4.com>
Cc: linux-kernel@...r.kernel.org, Jann Horn <jannh@...gle.com>
Subject: [PATCH] random: reseed in RNDRESEEDCRNG for the !crng_ready() case
Userspace often wants to seed the RNG from disk, without knowing how
much entropy is really in that file. In that case, userspace says
there's no entropy, so none is credited. If this happens in the
crng_init==1 state -- common at early boot time when such seed files are
used -- then that seed file will be written into the pool, but it won't
actually help the quality of /dev/urandom reads. Instead, it'll sit
around until something does credit sufficient amounts of entropy, at
which point, the RNG is seeded and initialized.
Rather than let those seed file bits sit around unused until "sometime
later", userspaces that call RNDRESEEDCRNG can expect, with this commit,
for those seed bits to be put to use *somehow*. This is accomplished by
extracting from the input pool on RNDRESEEDCRNG, xoring 32 bytes into
the current crng state.
Suggested-by: Jann Horn <jannh@...gle.com>
Signed-off-by: Jason A. Donenfeld <Jason@...c4.com>
---
Jann - this is the change I think you were requesting when we discussed
this. Please let me know if it matches what you had in mind.
drivers/char/random.c | 11 ++++++++++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/drivers/char/random.c b/drivers/char/random.c
index 17ec60948795..805e509d9c30 100644
--- a/drivers/char/random.c
+++ b/drivers/char/random.c
@@ -1961,8 +1961,17 @@ static long random_ioctl(struct file *f, unsigned int cmd, unsigned long arg)
case RNDRESEEDCRNG:
if (!capable(CAP_SYS_ADMIN))
return -EPERM;
- if (crng_init < 2)
+ if (!crng_ready()) {
+ unsigned long flags, i;
+ u32 new_key[8];
+ _extract_entropy(&input_pool, new_key, sizeof(new_key), 0);
+ spin_lock_irqsave(&primary_crng.lock, flags);
+ for (i = 0; i < ARRAY_SIZE(new_key); ++i)
+ primary_crng.state[4 + i] ^= new_key[i];
+ spin_unlock_irqrestore(&primary_crng.lock, flags);
+ memzero_explicit(new_key, sizeof(new_key));
return -ENODATA;
+ }
crng_reseed(&primary_crng, &input_pool);
WRITE_ONCE(crng_global_init_time, jiffies - 1);
return 0;
--
2.34.1
Powered by blists - more mailing lists