Jason Cooper
2014-Jul-02 13:00 UTC
[PATCH 1/2 v2] hwrng: Allow drivers to disable reading during probe
Commit d9e7972619334 "hwrng: add randomness to system from rng sources" added a call to rng_get_data() from the hwrng_register() function. However, some rng devices need initialization before data can be read from them. Also, the virtio-rng device does not behave properly when this call is made in its probe() routine - the virtio core sets the DRIVER_OK status bit only on a successful probe, which means the host ignores all communication from the guest, and the guest insmod or boot process just sits there doing nothing. [ jac: Modify the API to allow drivers to disable reading at probe, new patch, copied Amit's commit message. ] CC: Kees Cook <keescook at chromium.org> CC: Jason Cooper <jason at lakedaemon.net> CC: Herbert Xu <herbert at gondor.apana.org.au> CC: <stable at vger.kernel.org> # v3.15+ Signed-off-by: Amit Shah <amit.shah at redhat.com> Signed-off-by: Jason Cooper <jason at lakedaemon.net> --- drivers/char/hw_random/core.c | 8 +++++--- include/linux/hw_random.h | 4 ++++ 2 files changed, 9 insertions(+), 3 deletions(-) diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c index 334601cc81cf..b7b6c48ca682 100644 --- a/drivers/char/hw_random/core.c +++ b/drivers/char/hw_random/core.c @@ -347,9 +347,11 @@ int hwrng_register(struct hwrng *rng) INIT_LIST_HEAD(&rng->list); list_add_tail(&rng->list, &rng_list); - bytes_read = rng_get_data(rng, bytes, sizeof(bytes), 1); - if (bytes_read > 0) - add_device_randomness(bytes, bytes_read); + if (!(rng->flags & HWRNG_NO_READ_AT_PROBE)) { + bytes_read = rng_get_data(rng, bytes, sizeof(bytes), 1); + if (bytes_read > 0) + add_device_randomness(bytes, bytes_read); + } out_unlock: mutex_unlock(&rng_mutex); out: diff --git a/include/linux/hw_random.h b/include/linux/hw_random.h index b4b0eef5fddf..5e358c7f3aae 100644 --- a/include/linux/hw_random.h +++ b/include/linux/hw_random.h @@ -15,6 +15,8 @@ #include <linux/types.h> #include <linux/list.h> +#define HWRNG_NO_READ_AT_PROBE BIT(0) + /** * struct hwrng - Hardware Random Number Generator driver * @name: Unique RNG name. @@ -28,6 +30,7 @@ * Must not be NULL. *OBSOLETE* * @read: New API. drivers can fill up to max bytes of data * into the buffer. The buffer is aligned for any type. + * @flags: per-device properties * @priv: Private data, for use by the RNG driver. */ struct hwrng { @@ -37,6 +40,7 @@ struct hwrng { int (*data_present)(struct hwrng *rng, int wait); int (*data_read)(struct hwrng *rng, u32 *data); int (*read)(struct hwrng *rng, void *data, size_t max, bool wait); + unsigned long flags; unsigned long priv; /* internal. */ -- 2.0.0
Jason Cooper
2014-Jul-02 13:41 UTC
[PATCH 1/2 v2] hwrng: Allow drivers to disable reading during probe
On Wed, Jul 02, 2014 at 06:56:35PM +0530, Amit Shah wrote:> Hi Jason, > > On (Wed) 02 Jul 2014 [13:00:19], Jason Cooper wrote: > > Commit d9e7972619334 "hwrng: add randomness to system from rng sources" > > added a call to rng_get_data() from the hwrng_register() function. > > However, some rng devices need initialization before data can be read > > from them. > > > > Also, the virtio-rng device does not behave properly when this call is > > made in its probe() routine - the virtio core sets the DRIVER_OK status > > bit only on a successful probe, which means the host ignores all > > communication from the guest, and the guest insmod or boot process just > > sits there doing nothing. > > > > [ jac: Modify the API to allow drivers to disable reading at probe, new > > patch, copied Amit's commit message. ] > > > > CC: Kees Cook <keescook at chromium.org> > > CC: Jason Cooper <jason at lakedaemon.net> > > CC: Herbert Xu <herbert at gondor.apana.org.au> > > CC: <stable at vger.kernel.org> # v3.15+ > > Signed-off-by: Amit Shah <amit.shah at redhat.com> > > Signed-off-by: Jason Cooper <jason at lakedaemon.net> > > --- > > drivers/char/hw_random/core.c | 8 +++++--- > > include/linux/hw_random.h | 4 ++++ > > 2 files changed, 9 insertions(+), 3 deletions(-) > > > > diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c > > index 334601cc81cf..b7b6c48ca682 100644 > > --- a/drivers/char/hw_random/core.c > > +++ b/drivers/char/hw_random/core.c > > @@ -347,9 +347,11 @@ int hwrng_register(struct hwrng *rng) > > INIT_LIST_HEAD(&rng->list); > > list_add_tail(&rng->list, &rng_list); > > > > - bytes_read = rng_get_data(rng, bytes, sizeof(bytes), 1); > > - if (bytes_read > 0) > > - add_device_randomness(bytes, bytes_read); > > + if (!(rng->flags & HWRNG_NO_READ_AT_PROBE)) { > > + bytes_read = rng_get_data(rng, bytes, sizeof(bytes), 1); > > + if (bytes_read > 0) > > + add_device_randomness(bytes, bytes_read); > > + } > > But this has the inverse problem: if there are two hwrngs in the > system, one will be initialized and probed. The other will not be > initialized, but still be probed.That's a problem outside the scope of this patch. You're basically saying the ->init() should be called unconditionally for each hwrng. If that's what driver authors assumed, that's not what is happening if there is more than one driver in the system. I think you should be changing the code a few lines up to make sure hwrng_init() is called once for each driver.> My version was more conservative while this one keeps the bug from the > current kernels.Huh? What do you mean by "keeps the bug from the current kernels." ? Besides, you're second patch isn't actually doing any ->init to get the hwrng ready for reading... If you had a real ->init function, and it was always called, would rng_get_data() work at probe time for your driver? confused, Jason.
Reasonably Related Threads
- [PATCH 1/2 v2] hwrng: Allow drivers to disable reading during probe
- [PATCH 1/2 v2] hwrng: Allow drivers to disable reading during probe
- [PATCH 0/2] hwrng: don't fetch data before device init
- [PATCH 0/2] hwrng: don't fetch data before device init
- [PATCH 1/2] hwrng: don't fetch rng from sources without init