On 2014-04-07 00:01:37 [-0400], Theodore Ts'o wrote: > Yes, ARM sucks for not implement random_get_entropy() on all > platforms. Film at 11. I'm told that Cortex ARM systms are supposed > to have a cycle counter. I'm not sure why it hasn't been wired up, > but it really should be.
I see. > Actually regs should be available nearly all of the time. So the > situation isn't quite as dire as you describe, but agreed, it is > pretty bad. You dropped that part where I suggested to use something like AES+CTR and create the numbers on demand and dropping that attempt to create as much random data with custom functions as possible. You completly dislike that approach? And if so, why? > Still, it would be nice if random_get_entropy() could be wired up on > as many platforms as possible. Yes. Usually there is generic function doing something sane but not as good as it could do with arch specific code. Or the code is completly disabled unless the architecture wires it up. Dropping a new function and hoping everyone will wire it up in no time is, ehm, brave. Nobody implemented random_get_entropy(), everyone falls back to get_cycles. From a quick grep I can see that atleast Hexagon, Cris, Frv, m32r and m68k return 0. I put some of the maintainers Cc, I am curious if they know about the side effects. > This is lacking in subtly, and while I'm sympathetic with your > frustration, and unfortunately, there are a huge number of CPU's/SOC's > that don't implement a cycle counter or some other kind of cheap, high > resolution counter. I'm not against putting in a warning printk, but Cheap? I know there a few platforms running on a 16bit counter. It is enough for a high resolution timer, it overflows quite often, too (i.e. in less than two seconds). However it is the only thing as time base that they have and from clocksource point of view it is enough. > issuing a WARN_ON(1) would be really be too obnoxious. Maybe > something like, "you're running on a crap CPU architecture and so > /dev/random may very well be insecure", but I think that's about as > blunt as we can really afford to be at this point. A backtrace is something you catch during boot up. A single line may get lost in the mass and I think this is important. However, as you wish, here are the changes. > > - Ted > > P.S. Maybe if Intel started a marketing campaign on G+ explaining why > ChromeOS on Intel machines is much more secure than ChromeOS on ARM, > we could finally get some action out of the !@#!?! ARM chip > manufacturers. :-/ Maybe post people are not aware what is going on here. A huge campaing with ballons is one way to get attention. Just drop /dev/random if the missing infrastucture isn't available and it shouldn't need G+ to get the infrastrucure. And the CTR thingy might be a good one because it would require *one* thing to get done and not each arch/subarch. >From 1d2d3ef3c411af7fc6b1beb0db7a2c35c1a72702 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <bige...@linutronix.de> Date: Fri, 4 Apr 2014 18:49:29 +0200 Subject: [PATCH] random: yell if random_get_entropy() returns a constant A few architectures still return 0 (i.e. a constant) if random_get_entropy() is invoked. Make them aware of this so they may fix this. Signed-off-by: Sebastian Andrzej Siewior <bige...@linutronix.de> --- drivers/char/random.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/drivers/char/random.c b/drivers/char/random.c index 429b75b..33508f9 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -241,6 +241,7 @@ #include <linux/major.h> #include <linux/string.h> #include <linux/fcntl.h> +#include <linux/delay.h> #include <linux/slab.h> #include <linux/random.h> #include <linux/poll.h> @@ -1675,3 +1676,22 @@ randomize_range(unsigned long start, unsigned long end, unsigned long len) return 0; return PAGE_ALIGN(get_random_int() % range + start); } + +static int check_random_get_entropy(void) +{ + cycles_t cyc1; + cycles_t cyc2; + + cyc1 = random_get_entropy(); + cyc2 = random_get_entropy(); + if (cyc1 != cyc2) + return 0; + udelay(1); + cyc2 = random_get_entropy(); + if (cyc1 != cyc2) + return 0; + + pr_err("Error: you're running on a crap CPU architecture and so /dev/random may very well be insecure"); + return -EINVAL; +} +late_initcall(check_random_get_entropy); -- 1.9.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/