mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 04:18:39 +08:00
random: vDSO: don't use 64-bit atomics on 32-bit architectures
Performing SMP atomic operations on u64 fails on powerpc32: CC drivers/char/random.o In file included from <command-line>: drivers/char/random.c: In function 'crng_reseed': ././include/linux/compiler_types.h:510:45: error: call to '__compiletime_assert_391' declared with attribute error: Need native word sized stores/loads for atomicity. 510 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__) | ^ ././include/linux/compiler_types.h:491:25: note: in definition of macro '__compiletime_assert' 491 | prefix ## suffix(); \ | ^~~~~~ ././include/linux/compiler_types.h:510:9: note: in expansion of macro '_compiletime_assert' 510 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__) | ^~~~~~~~~~~~~~~~~~~ ././include/linux/compiler_types.h:513:9: note: in expansion of macro 'compiletime_assert' 513 | compiletime_assert(__native_word(t), \ | ^~~~~~~~~~~~~~~~~~ ./arch/powerpc/include/asm/barrier.h:74:9: note: in expansion of macro 'compiletime_assert_atomic_type' 74 | compiletime_assert_atomic_type(*p); \ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ./include/asm-generic/barrier.h:172:55: note: in expansion of macro '__smp_store_release' 172 | #define smp_store_release(p, v) do { kcsan_release(); __smp_store_release(p, v); } while (0) | ^~~~~~~~~~~~~~~~~~~ drivers/char/random.c:286:9: note: in expansion of macro 'smp_store_release' 286 | smp_store_release(&__arch_get_k_vdso_rng_data()->generation, next_gen + 1); | ^~~~~~~~~~~~~~~~~ The kernel-side generation counter in the random driver is handled as an unsigned long, not as a u64, in base_crng and struct crng. But on the vDSO side, it needs to be an u64, not just an unsigned long, in order to support a 32-bit vDSO atop a 64-bit kernel. On kernel side, however, it is an unsigned long, hence a 32-bit value on 32-bit architectures, so just cast it to unsigned long for the smp_store_release(). A side effect is that on big endian architectures the store will be performed in the upper 32 bits. It is not an issue on its own because the vDSO site doesn't mind the value, as it only checks differences. Just make sure that the vDSO side checks the full 64 bits. For that, the local current_generation has to be u64 as well. Signed-off-by: Christophe Leroy <christophe.leroy@csgroup.eu> Suggested-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
parent
7fe5b3e4e7
commit
81c6896049
@ -281,8 +281,15 @@ static void crng_reseed(struct work_struct *work)
|
||||
* former to arrive at the latter. Use smp_store_release so that this
|
||||
* is ordered with the write above to base_crng.generation. Pairs with
|
||||
* the smp_rmb() before the syscall in the vDSO code.
|
||||
*
|
||||
* Cast to unsigned long for 32-bit architectures, since atomic 64-bit
|
||||
* operations are not supported on those architectures. This is safe
|
||||
* because base_crng.generation is a 32-bit value. On big-endian
|
||||
* architectures it will be stored in the upper 32 bits, but that's okay
|
||||
* because the vDSO side only checks whether the value changed, without
|
||||
* actually using or interpreting the value.
|
||||
*/
|
||||
smp_store_release(&_vdso_rng_data.generation, next_gen + 1);
|
||||
smp_store_release((unsigned long *)&_vdso_rng_data.generation, next_gen + 1);
|
||||
#endif
|
||||
if (!static_branch_likely(&crng_is_ready))
|
||||
crng_init = CRNG_READY;
|
||||
|
@ -68,8 +68,8 @@ __cvdso_getrandom_data(const struct vdso_rng_data *rng_info, void *buffer, size_
|
||||
struct vgetrandom_state *state = opaque_state;
|
||||
size_t batch_len, nblocks, orig_len = len;
|
||||
bool in_use, have_retried = false;
|
||||
unsigned long current_generation;
|
||||
void *orig_buffer = buffer;
|
||||
u64 current_generation;
|
||||
u32 counter[2] = { 0 };
|
||||
|
||||
if (unlikely(opaque_len == ~0UL && !buffer && !len && !flags)) {
|
||||
|
Loading…
Reference in New Issue
Block a user