virtualization.lists.linux-foundation.org archive mirror
 help / color / mirror / Atom feed
From: Alex Xu via Virtualization <virtualization@lists.linux-foundation.org>
To: Theodore Ts'o <tytso@mit.edu>
Cc: Linux Crypto Mailing List <linux-crypto@vger.kernel.org>,
	virtualization@lists.linux-foundation.org
Subject: Re: getrandom waits for a long time when /dev/random is insufficiently read from
Date: Sat, 30 Jul 2016 21:53:46 -0400	[thread overview]
Message-ID: <20160730215346.7a2714a7.alex_y_xu@yahoo.ca> (raw)
In-Reply-To: <20160730220922.GA12853@thunk.org>

On Sat, 30 Jul 2016 18:09:22 -0400
Theodore Ts'o <tytso@mit.edu> wrote as excerpted:
> On Fri, Jul 29, 2016 at 01:31:14PM -0400, Alex Xu wrote:
> > When qemu is started with -object rng-random,filename=/dev/urandom,
> > and immediately (i.e. with no initrd and as the first thing in
> > init):
> > 
> > 1. the guest runs dd if=/dev/random, there is no blocking and tons
> > of data goes to the screen. the data appears to be random.
> > 
> > 2. the guest runs getrandom with any requested amount (tested 1 byte
> > and 16 bytes) and no flags, it blocks for 90-110 seconds while the
> > "non-blocking pool is initialized". the returned data appears to be
> > random.
> > 
> > 3. the guest runs getrandom with GRND_RANDOM with any requested
> > amount, it returns the desired amount or possibly less, but in my
> > experience at least 10 bytes. the returned data appears to be
> > random.
> > 
> > I believe that the difference between cases 1 and 2 is a bug, since
> > based on my previous statement, in this scenario, getrandom should
> > never block.  
> 
> This is correct; and it has been fixed in the patches in v4.8-rc1.
> The patch which fixes this has been marked for backporting to stable
> kernels:
> 
> commit 3371f3da08cff4b75c1f2dce742d460539d6566d
> Author: Theodore Ts'o <tytso@mit.edu>
> Date:   Sun Jun 12 18:11:51 2016 -0400
> 
>     random: initialize the non-blocking pool via
> add_hwgenerator_randomness() 
>     If we have a hardware RNG and are using the in-kernel rngd, we
> should use this to initialize the non-blocking pool so that
> getrandom(2) doesn't block unnecessarily.
>     
>     Cc: stable@kernel.org
>     Signed-off-by: Theodore Ts'o <tytso@mit.edu>
> 
> Basically, the urandom pool (now CSRPNG) wasn't getting initialized
> from the hardware random number generator.  Most people didn't notice
> because very few people actually *use* hardware random number
> generators (although it's much more common in VM's, which is how
> you're using it), and use of getrandom(2) is still relatively rare,
> given that glibc hasn't yet seen fit to support it yet.
> 
> Cheers,
> 
> 					- Ted

Dammit, the one time I track down an actual kernel bug someone's already
fixed it. I'd even bothered to check 4.6 so I figured nobody'd gotten
around to it yet.

Thanks for the excellent explanations though. :)

  reply	other threads:[~2016-07-31  1:53 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20160728180732.12d38880@alex-desktop>
2016-07-29  5:40 ` getrandom waits for a long time when /dev/random is insufficiently read from Stephan Mueller
     [not found] ` <2481163.nONN48TG9I@tauon.atsec.com>
2016-07-29 10:24   ` Nikos Mavrogiannopoulos
     [not found]   ` <CAJU7zaL8G28chcwEEYAquApm2ncPaBjKky4UPaWVy=6B+-rsCA@mail.gmail.com>
2016-07-29 13:03     ` Alex Xu via Virtualization
     [not found]     ` <20160729090345.798c3e6f.alex_y_xu@yahoo.ca>
2016-07-29 13:12       ` Stephan Mueller
     [not found]       ` <2622345.NpnZjxROFX@tauon.atsec.com>
2016-07-29 14:14         ` Alex Xu via Virtualization
     [not found]         ` <20160729101407.03123327.alex_y_xu@yahoo.ca>
2016-07-29 17:03           ` Stephan Mueller
     [not found]           ` <2790164.RXkTBNoHIv@tauon.atsec.com>
2016-07-29 17:31             ` Alex Xu via Virtualization
     [not found]             ` <20160729133114.37ff14ef.alex_y_xu@yahoo.ca>
2016-07-30 22:09               ` Theodore Ts'o
2016-07-31  1:53                 ` Alex Xu via Virtualization [this message]
2016-07-28 22:07 Alex Xu via Virtualization

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20160730215346.7a2714a7.alex_y_xu@yahoo.ca \
    --to=virtualization@lists.linux-foundation.org \
    --cc=alex_y_xu@yahoo.ca \
    --cc=linux-crypto@vger.kernel.org \
    --cc=tytso@mit.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).