random: fix soft lockup when trying to read from an uninitialized blocking pool
authorTheodore Ts'o <tytso@mit.edu>
Wed, 22 May 2019 16:02:16 +0000 (12:02 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 25 Jun 2022 09:46:26 +0000 (11:46 +0200)
commit 58be0106c5306b939b07b4b8bf00669a20593f4b upstream.

Fixes: eb9d1bf079bb: "random: only read from /dev/random after its pool has received 128 bits"
Reported-by: kernel test robot <lkp@intel.com>
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/char/random.c

index 8a71fe53d4334d40f4d169c139d03cd6ccffb4f5..da62bdc9d25d9c2d81773afa4ec242f81d060f27 100644 (file)
@@ -773,8 +773,11 @@ retry:
        if (cmpxchg(&r->entropy_count, orig, entropy_count) != orig)
                goto retry;
 
-       if (has_initialized)
+       if (has_initialized) {
                r->initialized = 1;
+               wake_up_interruptible(&random_read_wait);
+               kill_fasync(&fasync, SIGIO, POLL_IN);
+       }
 
        trace_credit_entropy_bits(r->name, nbits,
                                  entropy_count >> ENTROPY_SHIFT, _RET_IP_);
@@ -790,6 +793,13 @@ retry:
                        entropy_bits = r->entropy_count >> ENTROPY_SHIFT;
                }
 
+               /* initialize the blocking pool if necessary */
+               if (entropy_bits >= random_read_wakeup_bits &&
+                   !other->initialized) {
+                       schedule_work(&other->push_work);
+                       return;
+               }
+
                /* should we wake readers? */
                if (entropy_bits >= random_read_wakeup_bits &&
                    wq_has_sleeper(&random_read_wait)) {
@@ -1939,8 +1949,8 @@ _random_read(int nonblock, char __user *buf, size_t nbytes)
                        return -EAGAIN;
 
                wait_event_interruptible(random_read_wait,
-                       ENTROPY_BITS(&input_pool) >=
-                       random_read_wakeup_bits);
+                   blocking_pool.initialized &&
+                   (ENTROPY_BITS(&input_pool) >= random_read_wakeup_bits));
                if (signal_pending(current))
                        return -ERESTARTSYS;
        }