Skip to content

Commit a680b18

Browse files
masneybherbertx
authored andcommitted
crypto: qcom-rng - ensure buffer for generate is completely filled
The generate function in struct rng_alg expects that the destination buffer is completely filled if the function returns 0. qcom_rng_read() can run into a situation where the buffer is partially filled with randomness and the remaining part of the buffer is zeroed since qcom_rng_generate() doesn't check the return value. This issue can be reproduced by running the following from libkcapi: kcapi-rng -b 9000000 > OUTFILE The generated OUTFILE will have three huge sections that contain all zeros, and this is caused by the code where the test 'val & PRNG_STATUS_DATA_AVAIL' fails. Let's fix this issue by ensuring that qcom_rng_read() always returns with a full buffer if the function returns success. Let's also have qcom_rng_generate() return the correct value. Here's some statistics from the ent project (https://www.fourmilab.ch/random/) that shows information about the quality of the generated numbers: $ ent -c qcom-random-before Value Char Occurrences Fraction 0 606748 0.067416 1 33104 0.003678 2 33001 0.003667 ... 253 � 32883 0.003654 254 � 33035 0.003671 255 � 33239 0.003693 Total: 9000000 1.000000 Entropy = 7.811590 bits per byte. Optimum compression would reduce the size of this 9000000 byte file by 2 percent. Chi square distribution for 9000000 samples is 9329962.81, and randomly would exceed this value less than 0.01 percent of the times. Arithmetic mean value of data bytes is 119.3731 (127.5 = random). Monte Carlo value for Pi is 3.197293333 (error 1.77 percent). Serial correlation coefficient is 0.159130 (totally uncorrelated = 0.0). Without this patch, the results of the chi-square test is 0.01%, and the numbers are certainly not random according to ent's project page. The results improve with this patch: $ ent -c qcom-random-after Value Char Occurrences Fraction 0 35432 0.003937 1 35127 0.003903 2 35424 0.003936 ... 253 � 35201 0.003911 254 � 34835 0.003871 255 � 35368 0.003930 Total: 9000000 1.000000 Entropy = 7.999979 bits per byte. Optimum compression would reduce the size of this 9000000 byte file by 0 percent. Chi square distribution for 9000000 samples is 258.77, and randomly would exceed this value 42.24 percent of the times. Arithmetic mean value of data bytes is 127.5006 (127.5 = random). Monte Carlo value for Pi is 3.141277333 (error 0.01 percent). Serial correlation coefficient is 0.000468 (totally uncorrelated = 0.0). This change was tested on a Nexus 5 phone (msm8974 SoC). Signed-off-by: Brian Masney <[email protected]> Fixes: ceec5f5 ("crypto: qcom-rng - Add Qcom prng driver") Cc: [email protected] # 4.19+ Reviewed-by: Bjorn Andersson <[email protected]> Reviewed-by: Andrew Halaney <[email protected]> Signed-off-by: Herbert Xu <[email protected]>
1 parent c6ce9c5 commit a680b18

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

drivers/crypto/qcom-rng.c

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
#include <linux/clk.h>
99
#include <linux/crypto.h>
1010
#include <linux/io.h>
11+
#include <linux/iopoll.h>
1112
#include <linux/module.h>
1213
#include <linux/of.h>
1314
#include <linux/platform_device.h>
@@ -43,16 +44,19 @@ static int qcom_rng_read(struct qcom_rng *rng, u8 *data, unsigned int max)
4344
{
4445
unsigned int currsize = 0;
4546
u32 val;
47+
int ret;
4648

4749
/* read random data from hardware */
4850
do {
49-
val = readl_relaxed(rng->base + PRNG_STATUS);
50-
if (!(val & PRNG_STATUS_DATA_AVAIL))
51-
break;
51+
ret = readl_poll_timeout(rng->base + PRNG_STATUS, val,
52+
val & PRNG_STATUS_DATA_AVAIL,
53+
200, 10000);
54+
if (ret)
55+
return ret;
5256

5357
val = readl_relaxed(rng->base + PRNG_DATA_OUT);
5458
if (!val)
55-
break;
59+
return -EINVAL;
5660

5761
if ((max - currsize) >= WORD_SZ) {
5862
memcpy(data, &val, WORD_SZ);
@@ -61,11 +65,10 @@ static int qcom_rng_read(struct qcom_rng *rng, u8 *data, unsigned int max)
6165
} else {
6266
/* copy only remaining bytes */
6367
memcpy(data, &val, max - currsize);
64-
break;
6568
}
6669
} while (currsize < max);
6770

68-
return currsize;
71+
return 0;
6972
}
7073

7174
static int qcom_rng_generate(struct crypto_rng *tfm,
@@ -87,7 +90,7 @@ static int qcom_rng_generate(struct crypto_rng *tfm,
8790
mutex_unlock(&rng->lock);
8891
clk_disable_unprepare(rng->clk);
8992

90-
return 0;
93+
return ret;
9194
}
9295

9396
static int qcom_rng_seed(struct crypto_rng *tfm, const u8 *seed,

0 commit comments

Comments
 (0)