random: clamp credited irq bits to maximum mixed
commit e78a802a7b4febf53f2a92842f494b01062d85a8 upstream. Since the most that's mixed into the pool is sizeof(long)*2, don't credit more than that many bytes of entropy. Fixes: e3e33fc2ea7f ("random: do not use input pool from hard IRQs") Cc: stable@vger.kernel.org Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
194f59391d
commit
e5d25a3bfd
@ -976,7 +976,7 @@ static void mix_interrupt_randomness(struct work_struct *work)
|
|||||||
local_irq_enable();
|
local_irq_enable();
|
||||||
|
|
||||||
mix_pool_bytes(pool, sizeof(pool));
|
mix_pool_bytes(pool, sizeof(pool));
|
||||||
credit_init_bits(max(1u, (count & U16_MAX) / 64));
|
credit_init_bits(clamp_t(unsigned int, (count & U16_MAX) / 64, 1, sizeof(pool) * 8));
|
||||||
|
|
||||||
memzero_explicit(pool, sizeof(pool));
|
memzero_explicit(pool, sizeof(pool));
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user