From: Harald Freudenberger <freude@linux.ibm.com>
To: Holger Dengler <dengler@linux.ibm.com>, Jason@zx2c4.com
Cc: Heiko Carstens <hca@linux.ibm.com>,
Vasily Gorbik <gor@linux.ibm.com>,
Alexander Gordeev <agordeev@linux.ibm.com>,
Christian Borntraeger <borntraeger@linux.ibm.com>,
Juergen Christ <jchrist@linux.ibm.com>,
linux-crypto@vger.kernel.org, linux-s390@vger.kernel.org
Subject: Re: [PATCH v1 1/1] s390/arch_random: Buffer true random data
Date: Wed, 06 Jul 2022 18:18:27 +0200 [thread overview]
Message-ID: <7e65130c6e66ce7a9f9eb469eb7e64e0@linux.ibm.com> (raw)
In-Reply-To: <aafbb400-d0cb-99de-8b10-3c39c7b9bae5@linux.ibm.com>
On 2022-07-05 18:27, Holger Dengler wrote:
> Hi Jason,
>
> On 05/07/2022 17:11, Jason A. Donenfeld wrote:
>> Hi Holger,
>>
>> On Tue, Jul 05, 2022 at 04:58:30PM +0200, Holger Dengler wrote:
>>> It is true, that the performance of the instruction is not really
>>> relevant, but only for calls outside of an interrupt context. I did
>>> some ftrace logging for the s390_random_get_seed_long() calls, and -
>>> as you said - there are a few calls per minute. But there was also
>>> some repeating calls in interrupt context. On systems with a huge
>>> interrupt load, this can cause severe performance impacts. I've no
>>
>> It'd be interesting to know more about this. The way you get
>> arch_random_get_seed_long() from irq context is:
>>
>> get_random_{bytes,int,long,u32,u64}()
>> crng_make_state()
>> crng_reseed() <-- Rarely
>> extract_entropy()
>> arch_get_random_seed_long()
>>
>> So if an irq user of get_random_xx() is the unlucky one in the minute
>> span who has to call crng_reseed() then, yea, that'll happen. But I
>> wonder about this luck aspect. What scenarios are you seeing where
>> this
>> happens all the time? Which driver is using random bytes *so* commonly
>> from irq context? Not that, per say, there's anything wrong with that,
>> but it could be eyebrow raising, and might point to de facto solutions
>> that mostly take care of this.
>
> I saw a few calls in interrupt context during my tracing, but I didn't
> look to see which ones they were. Let me figure that out in the next
> few days and provide more information on that.
>
>> One such direction might be making a driver that does such a thing do
>> it
>> a little bit less, somehow. Another direction would be preferring
>> non-irqs to handle crng_reseed(), but not disallowing irqs entirely,
>> with a patch something like the one below. Or maybe there are other
>> ideas.
>
> Reduce the number of trng in interrupt context is a possibility, but -
> in my opinion - only one single trng instruction call in interrupt
> context in one too much.
>
> For the moment, I would propose to drop the buffering but also return
> false, if arch_random_get_seed_long() is called in interrupt context.
>
> diff --git a/arch/s390/include/asm/archrandom.h
> b/arch/s390/include/asm/archrandom.h
> index 2c6e1c6ecbe7..711357bdc464 100644
> --- a/arch/s390/include/asm/archrandom.h
> +++ b/arch/s390/include/asm/archrandom.h
> @@ -32,7 +32,8 @@ static inline bool __must_check
> arch_get_random_int(unsigned int *v)
>
> static inline bool __must_check arch_get_random_seed_long(unsigned
> long *v)
> {
> - if (static_branch_likely(&s390_arch_random_available)) {
> + if (static_branch_likely(&s390_arch_random_available) &&
> + !in_interrupt()) {
> cpacf_trng(NULL, 0, (u8 *)v, sizeof(*v));
> atomic64_add(sizeof(*v), &s390_arch_random_counter);
> return true;
>
> (on-top of your commit, without our buffering patch)
>
>>
>> But all this is to say that having some more of the "mundane" details
>> about this might actually help us.
>>
>> Jason
>>
>> diff --git a/drivers/char/random.c b/drivers/char/random.c
>> index e3dd1dd3dd22..81df8cdf2a62 100644
>> --- a/drivers/char/random.c
>> +++ b/drivers/char/random.c
>> @@ -270,6 +270,9 @@ static bool crng_has_old_seed(void)
>> static bool early_boot = true;
>> unsigned long interval = CRNG_RESEED_INTERVAL;
>>
>> + if (in_hardirq())
>> + interval += HZ * 10;
>> +
>> if (unlikely(READ_ONCE(early_boot))) {
>> time64_t uptime = ktime_get_seconds();
>> if (uptime >= CRNG_RESEED_INTERVAL / HZ * 2)
>>
Hi Holger and Jason
I tried to find out what is the reason of the invocations in interrupt
context.
First I have to admit that there is in fact not much of
arch_get_random_seed_long()
invocation any more in the recent kernel (5.19-rc5). I see about 100
invocations
within 10 minutes with an LPAR running some qperf and dd dumps on dasds
test load.
About half of these invocations is in interrupt context. I
dump_stack()ed some of
these and I always catch the function
kfence_guarded_alloc()
prandom_u32_max()
prandom_u32()
get_random_u32()
_get_random_bytes()
crng_make_state()
crng_reseed()
extract_entropy()
arch_get_random_seed_long()
However, with so few invocations it should not make any harm when there
is a
even very expensive trng() invocation in interrupt context.
But I think we should check, if this is really something to backport to
the older
kernels where arch_get_random_seed_long() is called really frequency.
Harald Freudenberger
next prev parent reply other threads:[~2022-07-06 16:18 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-05 11:27 [PATCH v1 0/1] s390/archrandom: use buffered random data Holger Dengler
2022-07-05 11:27 ` [PATCH v1 1/1] s390/arch_random: Buffer true " Holger Dengler
2022-07-05 13:18 ` Jason A. Donenfeld
2022-07-05 13:42 ` Jason A. Donenfeld
2022-07-05 14:58 ` Holger Dengler
2022-07-05 15:11 ` Jason A. Donenfeld
2022-07-05 16:27 ` Holger Dengler
2022-07-05 16:35 ` Jason A. Donenfeld
2022-07-05 17:47 ` Holger Dengler
2022-07-05 18:19 ` Jason A. Donenfeld
2022-07-05 19:28 ` Holger Dengler
2022-07-06 16:18 ` Harald Freudenberger [this message]
2022-07-06 16:26 ` Jason A. Donenfeld
2022-07-06 18:29 ` Christian Borntraeger
2022-07-06 22:34 ` Jason A. Donenfeld
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7e65130c6e66ce7a9f9eb469eb7e64e0@linux.ibm.com \
--to=freude@linux.ibm.com \
--cc=Jason@zx2c4.com \
--cc=agordeev@linux.ibm.com \
--cc=borntraeger@linux.ibm.com \
--cc=dengler@linux.ibm.com \
--cc=gor@linux.ibm.com \
--cc=hca@linux.ibm.com \
--cc=jchrist@linux.ibm.com \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox