random: do not take pool spinlock at boot
authorJason A. Donenfeld <Jason@zx2c4.com>
Sat, 12 Feb 2022 00:26:17 +0000 (01:26 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 30 May 2022 07:29:08 +0000 (09:29 +0200)
commit afba0b80b977b2a8f16234f2acd982f82710ba33 upstream.

Since rand_initialize() is run while interrupts are still off and
nothing else is running, we don't need to repeatedly take and release
the pool spinlock, especially in the RDSEED loop.

Reviewed-by: Eric Biggers <ebiggers@google.com>
Reviewed-by: Dominik Brodowski <linux@dominikbrodowski.net>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/char/random.c

index 8728de2..1d0249e 100644 (file)
@@ -978,10 +978,10 @@ int __init rand_initialize(void)
                        rv = random_get_entropy();
                        arch_init = false;
                }
-               mix_pool_bytes(&rv, sizeof(rv));
+               _mix_pool_bytes(&rv, sizeof(rv));
        }
-       mix_pool_bytes(&now, sizeof(now));
-       mix_pool_bytes(utsname(), sizeof(*(utsname())));
+       _mix_pool_bytes(&now, sizeof(now));
+       _mix_pool_bytes(utsname(), sizeof(*(utsname())));
 
        extract_entropy(base_crng.key, sizeof(base_crng.key));
        ++base_crng.generation;