All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
@ 2019-05-10 13:42 Laurent Vivier
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom` Laurent Vivier
                   ` (3 more replies)
  0 siblings, 4 replies; 18+ messages in thread
From: Laurent Vivier @ 2019-05-10 13:42 UTC (permalink / raw)
  To: qemu-devel
  Cc: Laurent Vivier, Daniel P . Berrangé,
	Kashyap Chamarthy, Michael S. Tsirkin, Richard Henderson,
	Markus Armbruster, Amit Shah, Richard W . M . Jones

Add a new RNG backend using QEMU builtin getrandom function.

This patch applies on top of
    "[PATCH v5 00/24] Add qemu_getrandom and ARMv8.5-RNG etc"
Based-on: 20190510012458.22706-1-richard.henderson@linaro.org

v3: Include Kashyap's patch in the series
    Add a patch to change virtio-rng default backend to rng-builtin

v2: Update qemu-options.hx
    describe the new backend and specify virtio-rng uses the
    rng-random by default

Kashyap Chamarthy (1):
  VirtIO-RNG: Update default entropy source to `/dev/urandom`

Laurent Vivier (2):
  rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
  virtio-rng: change default backend to rng-builtin

 backends/Makefile.objs         |  2 +-
 backends/rng-builtin.c         | 54 ++++++++++++++++++++++++++++++++++
 backends/rng-random.c          |  2 +-
 hw/virtio/virtio-rng.c         |  2 +-
 include/hw/virtio/virtio-rng.h |  4 +--
 include/sysemu/rng-builtin.h   | 17 +++++++++++
 qemu-options.hx                |  9 +++++-
 7 files changed, 84 insertions(+), 6 deletions(-)
 create mode 100644 backends/rng-builtin.c
 create mode 100644 include/sysemu/rng-builtin.h

-- 
2.20.1



^ permalink raw reply	[flat|nested] 18+ messages in thread

* [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 13:42 [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
@ 2019-05-10 13:42 ` Laurent Vivier
  2019-05-10 16:12   ` Michael S. Tsirkin
  2019-05-10 16:18   ` Markus Armbruster
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 2/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
                   ` (2 subsequent siblings)
  3 siblings, 2 replies; 18+ messages in thread
From: Laurent Vivier @ 2019-05-10 13:42 UTC (permalink / raw)
  To: qemu-devel
  Cc: Laurent Vivier, Daniel P . Berrangé,
	Kashyap Chamarthy, Michael S. Tsirkin, Richard Henderson,
	Markus Armbruster, Amit Shah, Richard W . M . Jones,
	Stefan Hajnoczi

From: Kashyap Chamarthy <kchamart@redhat.com>

When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
source of entropy, and that source needs to be "non-blocking", like
`/dev/urandom`.  However, currently QEMU defaults to the problematic
`/dev/random`, which is "blocking" (as in, it waits until sufficient
entropy is available).

Why prefer `/dev/urandom` over `/dev/random`?
---------------------------------------------

The man pages of urandom(4) and random(4) state:

    "The /dev/random device is a legacy interface which dates back to a
    time where the cryptographic primitives used in the implementation
    of /dev/urandom were not widely trusted.  It will return random
    bytes only within the estimated number of bits of fresh noise in the
    entropy pool, blocking if necessary.  /dev/random is suitable for
    applications that need high quality randomness, and can afford
    indeterminate delays."

Further, the "Usage" section of the said man pages state:

    "The /dev/random interface is considered a legacy interface, and
    /dev/urandom is preferred and sufficient in all use cases, with the
    exception of applications which require randomness during early boot
    time; for these applications, getrandom(2) must be used instead,
    because it will block until the entropy pool is initialized.

    "If a seed file is saved across reboots as recommended below (all
    major Linux distributions have done this since 2000 at least), the
    output is cryptographically secure against attackers without local
    root access as soon as it is reloaded in the boot sequence, and
    perfectly adequate for network encryption session keys.  Since reads
    from /dev/random may block, users will usually want to open it in
    nonblocking mode (or perform a read with timeout), and provide some
    sort of user notification if the desired entropy is not immediately
    available."

And refer to random(7) for a comparison of `/dev/random` and
`/dev/urandom`.

    - - -

Given the above, change the entropy source for VirtIO-RNG device to
`/dev/urandom`.

Related discussion in these[1][2] past threads.

[1] https://lists.nongnu.org/archive/html/qemu-devel/2018-06/msg08335.html
    -- "RNG: Any reason QEMU doesn't default to `/dev/urandom`?"
[2] https://lists.nongnu.org/archive/html/qemu-devel/2018-09/msg02724.html
    -- "[RFC] Virtio RNG: Consider changing the default entropy source to
       /dev/urandom"

Signed-off-by: Kashyap Chamarthy <kchamart@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
Signed-off-by: Laurent Vivier <lvivier@redhat.com>
---
 backends/rng-random.c | 2 +-
 qemu-options.hx       | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/backends/rng-random.c b/backends/rng-random.c
index e2a49b0571d7..eff36ef14084 100644
--- a/backends/rng-random.c
+++ b/backends/rng-random.c
@@ -112,7 +112,7 @@ static void rng_random_init(Object *obj)
                             rng_random_set_filename,
                             NULL);
 
-    s->filename = g_strdup("/dev/random");
+    s->filename = g_strdup("/dev/urandom");
     s->fd = -1;
 }
 
diff --git a/qemu-options.hx b/qemu-options.hx
index 0191ef8b1eb7..4df0ea3aed5c 100644
--- a/qemu-options.hx
+++ b/qemu-options.hx
@@ -4286,7 +4286,7 @@ Creates a random number generator backend which obtains entropy from
 a device on the host. The @option{id} parameter is a unique ID that
 will be used to reference this entropy backend from the @option{virtio-rng}
 device. The @option{filename} parameter specifies which file to obtain
-entropy from and if omitted defaults to @option{/dev/random}.
+entropy from and if omitted defaults to @option{/dev/urandom}.
 
 @item -object rng-egd,id=@var{id},chardev=@var{chardevid}
 
-- 
2.20.1



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [Qemu-devel] [PATCH v3 2/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
  2019-05-10 13:42 [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom` Laurent Vivier
@ 2019-05-10 13:42 ` Laurent Vivier
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin Laurent Vivier
  2019-05-12 18:21 ` [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Michael S. Tsirkin
  3 siblings, 0 replies; 18+ messages in thread
From: Laurent Vivier @ 2019-05-10 13:42 UTC (permalink / raw)
  To: qemu-devel
  Cc: Laurent Vivier, Daniel P . Berrangé,
	Kashyap Chamarthy, Michael S. Tsirkin, Richard Henderson,
	Markus Armbruster, Amit Shah, Richard W . M . Jones

Add a new RNG backend using QEMU builtin getrandom function.

It can be created and used with something like:

    ... -object rng-builtin,id=rng0 -device virtio-rng,rng=rng0 ...

Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Laurent Vivier <lvivier@redhat.com>
---
 backends/Makefile.objs |  2 +-
 backends/rng-builtin.c | 56 ++++++++++++++++++++++++++++++++++++++++++
 qemu-options.hx        | 10 +++++++-
 3 files changed, 66 insertions(+), 2 deletions(-)
 create mode 100644 backends/rng-builtin.c

diff --git a/backends/Makefile.objs b/backends/Makefile.objs
index ff619d31b461..8da4a508d97b 100644
--- a/backends/Makefile.objs
+++ b/backends/Makefile.objs
@@ -1,4 +1,4 @@
-common-obj-y += rng.o rng-egd.o
+common-obj-y += rng.o rng-egd.o rng-builtin.o
 common-obj-$(CONFIG_POSIX) += rng-random.o
 
 common-obj-$(CONFIG_TPM) += tpm.o
diff --git a/backends/rng-builtin.c b/backends/rng-builtin.c
new file mode 100644
index 000000000000..b1264b745407
--- /dev/null
+++ b/backends/rng-builtin.c
@@ -0,0 +1,56 @@
+/*
+ * QEMU Builtin Random Number Generator Backend
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
+ * See the COPYING file in the top-level directory.
+ */
+
+#include "qemu/osdep.h"
+#include "sysemu/rng.h"
+#include "qapi/error.h"
+#include "qapi/qmp/qerror.h"
+#include "qemu/main-loop.h"
+#include "qemu/guest-random.h"
+
+#define TYPE_RNG_BUILTIN "rng-builtin"
+#define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN)
+
+typedef struct RngBuiltin {
+    RngBackend parent;
+} RngBuiltin;
+
+static void rng_builtin_request_entropy(RngBackend *b, RngRequest *req)
+{
+    RngBuiltin *s = RNG_BUILTIN(b);
+
+    while (!QSIMPLEQ_EMPTY(&s->parent.requests)) {
+        RngRequest *req = QSIMPLEQ_FIRST(&s->parent.requests);
+
+        qemu_guest_getrandom_nofail(req->data, req->size);
+
+        req->receive_entropy(req->opaque, req->data, req->size);
+
+        rng_backend_finalize_request(&s->parent, req);
+    }
+}
+
+static void rng_builtin_class_init(ObjectClass *klass, void *data)
+{
+    RngBackendClass *rbc = RNG_BACKEND_CLASS(klass);
+
+    rbc->request_entropy = rng_builtin_request_entropy;
+}
+
+static const TypeInfo rng_builtin_info = {
+    .name = TYPE_RNG_BUILTIN,
+    .parent = TYPE_RNG_BACKEND,
+    .instance_size = sizeof(RngBuiltin),
+    .class_init = rng_builtin_class_init,
+};
+
+static void register_types(void)
+{
+    type_register_static(&rng_builtin_info);
+}
+
+type_init(register_types);
diff --git a/qemu-options.hx b/qemu-options.hx
index 4df0ea3aed5c..6ab920f12be4 100644
--- a/qemu-options.hx
+++ b/qemu-options.hx
@@ -4280,13 +4280,21 @@ other options.
 
 The @option{share} boolean option is @var{on} by default with memfd.
 
+@item -object rng-builtin,id=@var{id}
+
+Creates a random number generator backend which obtains entropy from
+QEMU builtin functions. The @option{id} parameter is a unique ID that
+will be used to reference this entropy backend from the @option{virtio-rng}
+device.
+
 @item -object rng-random,id=@var{id},filename=@var{/dev/random}
 
 Creates a random number generator backend which obtains entropy from
 a device on the host. The @option{id} parameter is a unique ID that
 will be used to reference this entropy backend from the @option{virtio-rng}
 device. The @option{filename} parameter specifies which file to obtain
-entropy from and if omitted defaults to @option{/dev/urandom}.
+entropy from and if omitted defaults to @option{/dev/urandom}. By default,
+the @option{virtio-rng} device uses this RNG backend.
 
 @item -object rng-egd,id=@var{id},chardev=@var{chardevid}
 
-- 
2.20.1



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin
  2019-05-10 13:42 [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom` Laurent Vivier
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 2/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
@ 2019-05-10 13:42 ` Laurent Vivier
  2019-05-10 16:36   ` Markus Armbruster
  2019-05-12 18:21 ` [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Michael S. Tsirkin
  3 siblings, 1 reply; 18+ messages in thread
From: Laurent Vivier @ 2019-05-10 13:42 UTC (permalink / raw)
  To: qemu-devel
  Cc: Laurent Vivier, Daniel P . Berrangé,
	Kashyap Chamarthy, Michael S. Tsirkin, Richard Henderson,
	Markus Armbruster, Amit Shah, Richard W . M . Jones

Signed-off-by: Laurent Vivier <lvivier@redhat.com>
---
 backends/rng-builtin.c         |  8 +++-----
 hw/virtio/virtio-rng.c         |  2 +-
 include/hw/virtio/virtio-rng.h |  4 ++--
 include/sysemu/rng-builtin.h   | 17 +++++++++++++++++
 qemu-options.hx                |  5 ++---
 5 files changed, 25 insertions(+), 11 deletions(-)
 create mode 100644 include/sysemu/rng-builtin.h

diff --git a/backends/rng-builtin.c b/backends/rng-builtin.c
index b1264b745407..27675301933b 100644
--- a/backends/rng-builtin.c
+++ b/backends/rng-builtin.c
@@ -7,17 +7,15 @@
 
 #include "qemu/osdep.h"
 #include "sysemu/rng.h"
+#include "sysemu/rng-builtin.h"
 #include "qapi/error.h"
 #include "qapi/qmp/qerror.h"
 #include "qemu/main-loop.h"
 #include "qemu/guest-random.h"
 
-#define TYPE_RNG_BUILTIN "rng-builtin"
-#define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN)
-
-typedef struct RngBuiltin {
+struct RngBuiltin {
     RngBackend parent;
-} RngBuiltin;
+};
 
 static void rng_builtin_request_entropy(RngBackend *b, RngRequest *req)
 {
diff --git a/hw/virtio/virtio-rng.c b/hw/virtio/virtio-rng.c
index 30493a258622..67209f63ddbc 100644
--- a/hw/virtio/virtio-rng.c
+++ b/hw/virtio/virtio-rng.c
@@ -189,7 +189,7 @@ static void virtio_rng_device_realize(DeviceState *dev, Error **errp)
     }
 
     if (vrng->conf.rng == NULL) {
-        vrng->conf.default_backend = RNG_RANDOM(object_new(TYPE_RNG_RANDOM));
+        vrng->conf.default_backend = RNG_BUILTIN(object_new(TYPE_RNG_BUILTIN));
 
         user_creatable_complete(USER_CREATABLE(vrng->conf.default_backend),
                                 &local_err);
diff --git a/include/hw/virtio/virtio-rng.h b/include/hw/virtio/virtio-rng.h
index 922dce7caccf..f9b6339b19a4 100644
--- a/include/hw/virtio/virtio-rng.h
+++ b/include/hw/virtio/virtio-rng.h
@@ -13,7 +13,7 @@
 #define QEMU_VIRTIO_RNG_H
 
 #include "sysemu/rng.h"
-#include "sysemu/rng-random.h"
+#include "sysemu/rng-builtin.h"
 #include "standard-headers/linux/virtio_rng.h"
 
 #define TYPE_VIRTIO_RNG "virtio-rng-device"
@@ -26,7 +26,7 @@ struct VirtIORNGConf {
     RngBackend *rng;
     uint64_t max_bytes;
     uint32_t period_ms;
-    RngRandom *default_backend;
+    RngBuiltin *default_backend;
 };
 
 typedef struct VirtIORNG {
diff --git a/include/sysemu/rng-builtin.h b/include/sysemu/rng-builtin.h
new file mode 100644
index 000000000000..a0f75f97dde8
--- /dev/null
+++ b/include/sysemu/rng-builtin.h
@@ -0,0 +1,17 @@
+/*
+ * QEMU Builtin Random Number Generator Backend
+ *
+ * This work is licensed under the terms of the GNU GPL, version 2 or later.
+ * See the COPYING file in the top-level directory.
+ */
+#ifndef QEMU_RNG_BUILTIN_H
+#define QEMU_RNG_BUILTIN_H
+
+#include "qom/object.h"
+
+#define TYPE_RNG_BUILTIN "rng-builtin"
+#define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN)
+
+typedef struct RngBuiltin RngBuiltin;
+
+#endif
diff --git a/qemu-options.hx b/qemu-options.hx
index 6ab920f12be4..c9784be83cb5 100644
--- a/qemu-options.hx
+++ b/qemu-options.hx
@@ -4285,7 +4285,7 @@ The @option{share} boolean option is @var{on} by default with memfd.
 Creates a random number generator backend which obtains entropy from
 QEMU builtin functions. The @option{id} parameter is a unique ID that
 will be used to reference this entropy backend from the @option{virtio-rng}
-device.
+device. By default, the @option{virtio-rng} device uses this RNG backend.
 
 @item -object rng-random,id=@var{id},filename=@var{/dev/random}
 
@@ -4293,8 +4293,7 @@ Creates a random number generator backend which obtains entropy from
 a device on the host. The @option{id} parameter is a unique ID that
 will be used to reference this entropy backend from the @option{virtio-rng}
 device. The @option{filename} parameter specifies which file to obtain
-entropy from and if omitted defaults to @option{/dev/urandom}. By default,
-the @option{virtio-rng} device uses this RNG backend.
+entropy from and if omitted defaults to @option{/dev/urandom}.
 
 @item -object rng-egd,id=@var{id},chardev=@var{chardevid}
 
-- 
2.20.1



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom` Laurent Vivier
@ 2019-05-10 16:12   ` Michael S. Tsirkin
  2019-05-10 16:16     ` Daniel P. Berrangé
  2019-05-10 16:18   ` Markus Armbruster
  1 sibling, 1 reply; 18+ messages in thread
From: Michael S. Tsirkin @ 2019-05-10 16:12 UTC (permalink / raw)
  To: Laurent Vivier
  Cc: Daniel P . Berrangé,
	Amit Shah, Kashyap Chamarthy, Richard Henderson,
	Markus Armbruster, qemu-devel, Richard W . M . Jones,
	Stefan Hajnoczi

On Fri, May 10, 2019 at 03:42:01PM +0200, Laurent Vivier wrote:
> From: Kashyap Chamarthy <kchamart@redhat.com>
> 
> When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> source of entropy, and that source needs to be "non-blocking", like
> `/dev/urandom`.  However, currently QEMU defaults to the problematic
> `/dev/random`, which is "blocking" (as in, it waits until sufficient
> entropy is available).
> 
> Why prefer `/dev/urandom` over `/dev/random`?
> ---------------------------------------------
> 
> The man pages of urandom(4) and random(4) state:
> 
>     "The /dev/random device is a legacy interface which dates back to a
>     time where the cryptographic primitives used in the implementation
>     of /dev/urandom were not widely trusted.  It will return random
>     bytes only within the estimated number of bits of fresh noise in the
>     entropy pool, blocking if necessary.  /dev/random is suitable for
>     applications that need high quality randomness, and can afford
>     indeterminate delays."
> 
> Further, the "Usage" section of the said man pages state:
> 
>     "The /dev/random interface is considered a legacy interface, and
>     /dev/urandom is preferred and sufficient in all use cases, with the
>     exception of applications which require randomness during early boot
>     time; for these applications, getrandom(2) must be used instead,
>     because it will block until the entropy pool is initialized.

So how about just using getrandom then?

> 
>     "If a seed file is saved across reboots as recommended below (all
>     major Linux distributions have done this since 2000 at least), the
>     output is cryptographically secure against attackers without local
>     root access as soon as it is reloaded in the boot sequence, and
>     perfectly adequate for network encryption session keys.  Since reads
>     from /dev/random may block, users will usually want to open it in
>     nonblocking mode (or perform a read with timeout), and provide some
>     sort of user notification if the desired entropy is not immediately
>     available."
> 
> And refer to random(7) for a comparison of `/dev/random` and
> `/dev/urandom`.
> 
>     - - -
> 
> Given the above, change the entropy source for VirtIO-RNG device to
> `/dev/urandom`.
> 
> Related discussion in these[1][2] past threads.
> 
> [1] https://lists.nongnu.org/archive/html/qemu-devel/2018-06/msg08335.html
>     -- "RNG: Any reason QEMU doesn't default to `/dev/urandom`?"
> [2] https://lists.nongnu.org/archive/html/qemu-devel/2018-09/msg02724.html
>     -- "[RFC] Virtio RNG: Consider changing the default entropy source to
>        /dev/urandom"
> 
> Signed-off-by: Kashyap Chamarthy <kchamart@redhat.com>
> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
> Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
> Signed-off-by: Laurent Vivier <lvivier@redhat.com>
> ---
>  backends/rng-random.c | 2 +-
>  qemu-options.hx       | 2 +-
>  2 files changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/backends/rng-random.c b/backends/rng-random.c
> index e2a49b0571d7..eff36ef14084 100644
> --- a/backends/rng-random.c
> +++ b/backends/rng-random.c
> @@ -112,7 +112,7 @@ static void rng_random_init(Object *obj)
>                              rng_random_set_filename,
>                              NULL);
>  
> -    s->filename = g_strdup("/dev/random");
> +    s->filename = g_strdup("/dev/urandom");
>      s->fd = -1;
>  }
>  
> diff --git a/qemu-options.hx b/qemu-options.hx
> index 0191ef8b1eb7..4df0ea3aed5c 100644
> --- a/qemu-options.hx
> +++ b/qemu-options.hx
> @@ -4286,7 +4286,7 @@ Creates a random number generator backend which obtains entropy from
>  a device on the host. The @option{id} parameter is a unique ID that
>  will be used to reference this entropy backend from the @option{virtio-rng}
>  device. The @option{filename} parameter specifies which file to obtain
> -entropy from and if omitted defaults to @option{/dev/random}.
> +entropy from and if omitted defaults to @option{/dev/urandom}.
>  
>  @item -object rng-egd,id=@var{id},chardev=@var{chardevid}
>  
> -- 
> 2.20.1


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 16:12   ` Michael S. Tsirkin
@ 2019-05-10 16:16     ` Daniel P. Berrangé
  2019-05-10 16:21       ` Michael S. Tsirkin
  0 siblings, 1 reply; 18+ messages in thread
From: Daniel P. Berrangé @ 2019-05-10 16:16 UTC (permalink / raw)
  To: Michael S. Tsirkin
  Cc: Laurent Vivier, Kashyap Chamarthy, Amit Shah, Richard Henderson,
	qemu-devel, Markus Armbruster, Richard W . M . Jones,
	Stefan Hajnoczi

On Fri, May 10, 2019 at 12:12:41PM -0400, Michael S. Tsirkin wrote:
> On Fri, May 10, 2019 at 03:42:01PM +0200, Laurent Vivier wrote:
> > From: Kashyap Chamarthy <kchamart@redhat.com>
> > 
> > When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> > source of entropy, and that source needs to be "non-blocking", like
> > `/dev/urandom`.  However, currently QEMU defaults to the problematic
> > `/dev/random`, which is "blocking" (as in, it waits until sufficient
> > entropy is available).
> > 
> > Why prefer `/dev/urandom` over `/dev/random`?
> > ---------------------------------------------
> > 
> > The man pages of urandom(4) and random(4) state:
> > 
> >     "The /dev/random device is a legacy interface which dates back to a
> >     time where the cryptographic primitives used in the implementation
> >     of /dev/urandom were not widely trusted.  It will return random
> >     bytes only within the estimated number of bits of fresh noise in the
> >     entropy pool, blocking if necessary.  /dev/random is suitable for
> >     applications that need high quality randomness, and can afford
> >     indeterminate delays."
> > 
> > Further, the "Usage" section of the said man pages state:
> > 
> >     "The /dev/random interface is considered a legacy interface, and
> >     /dev/urandom is preferred and sufficient in all use cases, with the
> >     exception of applications which require randomness during early boot
> >     time; for these applications, getrandom(2) must be used instead,
> >     because it will block until the entropy pool is initialized.
> 
> So how about just using getrandom then?

The 3rd patch in this series addresses that.


Regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom` Laurent Vivier
  2019-05-10 16:12   ` Michael S. Tsirkin
@ 2019-05-10 16:18   ` Markus Armbruster
  1 sibling, 0 replies; 18+ messages in thread
From: Markus Armbruster @ 2019-05-10 16:18 UTC (permalink / raw)
  To: Laurent Vivier
  Cc: Daniel P . Berrangé,
	Michael S. Tsirkin, Kashyap Chamarthy, Richard Henderson,
	qemu-devel, Amit Shah, Markus Armbruster, Richard W . M . Jones,
	Stefan Hajnoczi

Laurent Vivier <lvivier@redhat.com> writes:

> From: Kashyap Chamarthy <kchamart@redhat.com>
>
> When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> source of entropy, and that source needs to be "non-blocking", like
> `/dev/urandom`.  However, currently QEMU defaults to the problematic
> `/dev/random`, which is "blocking" (as in, it waits until sufficient
> entropy is available).
>
> Why prefer `/dev/urandom` over `/dev/random`?
> ---------------------------------------------
>
> The man pages of urandom(4) and random(4) state:
>
>     "The /dev/random device is a legacy interface which dates back to a
>     time where the cryptographic primitives used in the implementation
>     of /dev/urandom were not widely trusted.  It will return random
>     bytes only within the estimated number of bits of fresh noise in the
>     entropy pool, blocking if necessary.  /dev/random is suitable for
>     applications that need high quality randomness, and can afford
>     indeterminate delays."
>
> Further, the "Usage" section of the said man pages state:
>
>     "The /dev/random interface is considered a legacy interface, and
>     /dev/urandom is preferred and sufficient in all use cases, with the
>     exception of applications which require randomness during early boot
>     time; for these applications, getrandom(2) must be used instead,
>     because it will block until the entropy pool is initialized.
>
>     "If a seed file is saved across reboots as recommended below (all
>     major Linux distributions have done this since 2000 at least), the
>     output is cryptographically secure against attackers without local
>     root access as soon as it is reloaded in the boot sequence, and
>     perfectly adequate for network encryption session keys.  Since reads
>     from /dev/random may block, users will usually want to open it in
>     nonblocking mode (or perform a read with timeout), and provide some
>     sort of user notification if the desired entropy is not immediately
>     available."
>
> And refer to random(7) for a comparison of `/dev/random` and
> `/dev/urandom`.
>
>     - - -
>
> Given the above, change the entropy source for VirtIO-RNG device to
> `/dev/urandom`.
>
> Related discussion in these[1][2] past threads.
>
> [1] https://lists.nongnu.org/archive/html/qemu-devel/2018-06/msg08335.html
>     -- "RNG: Any reason QEMU doesn't default to `/dev/urandom`?"
> [2] https://lists.nongnu.org/archive/html/qemu-devel/2018-09/msg02724.html
>     -- "[RFC] Virtio RNG: Consider changing the default entropy source to
>        /dev/urandom"
>
> Signed-off-by: Kashyap Chamarthy <kchamart@redhat.com>
> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
> Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
> Signed-off-by: Laurent Vivier <lvivier@redhat.com>

Suggest to work Daniel's analysis into the commit message, like this:

  When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
  source of entropy, and that source needs to be "non-blocking", like
  `/dev/urandom`.  However, currently QEMU defaults to the problematic
  `/dev/random`, which on Linux is "blocking" (as in, it waits until
  sufficient entropy is available).

  Why prefer `/dev/urandom` over `/dev/random` on Linux?
  ------------------------------------------------------
  [...]

  What about other OSes?
  ----------------------

  /dev/urandom exists and works on OS-X, FreeBSD, DragonFlyBSD, NetBSD
  and OpenBSD, which covers all the non-Linux platforms we explicitly
  support, aside from Windows.

  On Windows /dev/random doesn't work either so we don't regress. This
  is actually another argument in favour of using the newly proposed
  rng-builtin backend by default, as that will work on Windows.

      - - -

  Given the above, change the entropy source for VirtIO-RNG device to
  `/dev/urandom`.
  [...]


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 16:16     ` Daniel P. Berrangé
@ 2019-05-10 16:21       ` Michael S. Tsirkin
  2019-05-10 16:25         ` Daniel P. Berrangé
  0 siblings, 1 reply; 18+ messages in thread
From: Michael S. Tsirkin @ 2019-05-10 16:21 UTC (permalink / raw)
  To: Daniel P. Berrangé
  Cc: Laurent Vivier, Kashyap Chamarthy, Amit Shah, Richard Henderson,
	qemu-devel, Markus Armbruster, Richard W . M . Jones,
	Stefan Hajnoczi

On Fri, May 10, 2019 at 05:16:44PM +0100, Daniel P. Berrangé wrote:
> On Fri, May 10, 2019 at 12:12:41PM -0400, Michael S. Tsirkin wrote:
> > On Fri, May 10, 2019 at 03:42:01PM +0200, Laurent Vivier wrote:
> > > From: Kashyap Chamarthy <kchamart@redhat.com>
> > > 
> > > When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> > > source of entropy, and that source needs to be "non-blocking", like
> > > `/dev/urandom`.  However, currently QEMU defaults to the problematic
> > > `/dev/random`, which is "blocking" (as in, it waits until sufficient
> > > entropy is available).
> > > 
> > > Why prefer `/dev/urandom` over `/dev/random`?
> > > ---------------------------------------------
> > > 
> > > The man pages of urandom(4) and random(4) state:
> > > 
> > >     "The /dev/random device is a legacy interface which dates back to a
> > >     time where the cryptographic primitives used in the implementation
> > >     of /dev/urandom were not widely trusted.  It will return random
> > >     bytes only within the estimated number of bits of fresh noise in the
> > >     entropy pool, blocking if necessary.  /dev/random is suitable for
> > >     applications that need high quality randomness, and can afford
> > >     indeterminate delays."
> > > 
> > > Further, the "Usage" section of the said man pages state:
> > > 
> > >     "The /dev/random interface is considered a legacy interface, and
> > >     /dev/urandom is preferred and sufficient in all use cases, with the
> > >     exception of applications which require randomness during early boot
> > >     time; for these applications, getrandom(2) must be used instead,
> > >     because it will block until the entropy pool is initialized.
> > 
> > So how about just using getrandom then?
> 
> The 3rd patch in this series addresses that.

It seems to use qemu_guest_getrandom which in turn
with patch 1 calls /dev/urandom...
Did I miss something?

> 
> Regards,
> Daniel
> -- 
> |: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
> |: https://libvirt.org         -o-            https://fstop138.berrange.com :|
> |: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 16:21       ` Michael S. Tsirkin
@ 2019-05-10 16:25         ` Daniel P. Berrangé
  2019-05-10 16:55           ` Michael S. Tsirkin
  0 siblings, 1 reply; 18+ messages in thread
From: Daniel P. Berrangé @ 2019-05-10 16:25 UTC (permalink / raw)
  To: Michael S. Tsirkin
  Cc: Laurent Vivier, Kashyap Chamarthy, Amit Shah, Richard Henderson,
	qemu-devel, Markus Armbruster, Richard W . M . Jones,
	Stefan Hajnoczi

On Fri, May 10, 2019 at 12:21:19PM -0400, Michael S. Tsirkin wrote:
> On Fri, May 10, 2019 at 05:16:44PM +0100, Daniel P. Berrangé wrote:
> > On Fri, May 10, 2019 at 12:12:41PM -0400, Michael S. Tsirkin wrote:
> > > On Fri, May 10, 2019 at 03:42:01PM +0200, Laurent Vivier wrote:
> > > > From: Kashyap Chamarthy <kchamart@redhat.com>
> > > > 
> > > > When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> > > > source of entropy, and that source needs to be "non-blocking", like
> > > > `/dev/urandom`.  However, currently QEMU defaults to the problematic
> > > > `/dev/random`, which is "blocking" (as in, it waits until sufficient
> > > > entropy is available).
> > > > 
> > > > Why prefer `/dev/urandom` over `/dev/random`?
> > > > ---------------------------------------------
> > > > 
> > > > The man pages of urandom(4) and random(4) state:
> > > > 
> > > >     "The /dev/random device is a legacy interface which dates back to a
> > > >     time where the cryptographic primitives used in the implementation
> > > >     of /dev/urandom were not widely trusted.  It will return random
> > > >     bytes only within the estimated number of bits of fresh noise in the
> > > >     entropy pool, blocking if necessary.  /dev/random is suitable for
> > > >     applications that need high quality randomness, and can afford
> > > >     indeterminate delays."
> > > > 
> > > > Further, the "Usage" section of the said man pages state:
> > > > 
> > > >     "The /dev/random interface is considered a legacy interface, and
> > > >     /dev/urandom is preferred and sufficient in all use cases, with the
> > > >     exception of applications which require randomness during early boot
> > > >     time; for these applications, getrandom(2) must be used instead,
> > > >     because it will block until the entropy pool is initialized.
> > > 
> > > So how about just using getrandom then?
> > 
> > The 3rd patch in this series addresses that.
> 
> It seems to use qemu_guest_getrandom which in turn
> with patch 1 calls /dev/urandom...
> Did I miss something?

qemu_guest_getrandom will preferentially use the crypto library random
APIs (gnutls, or gcrypt). If both are compiled out that it will use
getrandom() if supported by the C library and current kernel. If that
fails then it will try /dev/urandom if it exists, finally /dev/random. 
On Windows it uses their native crypto API. See this dependant series:

https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg02237.html

Regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin Laurent Vivier
@ 2019-05-10 16:36   ` Markus Armbruster
  2019-05-13 10:26     ` Laurent Vivier
  0 siblings, 1 reply; 18+ messages in thread
From: Markus Armbruster @ 2019-05-10 16:36 UTC (permalink / raw)
  To: Laurent Vivier
  Cc: Daniel P . Berrangé,
	Michael S. Tsirkin, Amit Shah, Richard Henderson, qemu-devel,
	Richard W . M . Jones, Kashyap Chamarthy

Laurent Vivier <lvivier@redhat.com> writes:

> Signed-off-by: Laurent Vivier <lvivier@redhat.com>
> ---
>  backends/rng-builtin.c         |  8 +++-----
>  hw/virtio/virtio-rng.c         |  2 +-
>  include/hw/virtio/virtio-rng.h |  4 ++--
>  include/sysemu/rng-builtin.h   | 17 +++++++++++++++++
>  qemu-options.hx                |  5 ++---
>  5 files changed, 25 insertions(+), 11 deletions(-)
>  create mode 100644 include/sysemu/rng-builtin.h
>
> diff --git a/backends/rng-builtin.c b/backends/rng-builtin.c
> index b1264b745407..27675301933b 100644
> --- a/backends/rng-builtin.c
> +++ b/backends/rng-builtin.c
> @@ -7,17 +7,15 @@
>  
>  #include "qemu/osdep.h"
>  #include "sysemu/rng.h"
> +#include "sysemu/rng-builtin.h"
>  #include "qapi/error.h"
>  #include "qapi/qmp/qerror.h"
>  #include "qemu/main-loop.h"
>  #include "qemu/guest-random.h"
>  
> -#define TYPE_RNG_BUILTIN "rng-builtin"
> -#define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN)
> -
> -typedef struct RngBuiltin {
> +struct RngBuiltin {
>      RngBackend parent;
> -} RngBuiltin;
> +};
>  
>  static void rng_builtin_request_entropy(RngBackend *b, RngRequest *req)
>  {
> diff --git a/hw/virtio/virtio-rng.c b/hw/virtio/virtio-rng.c
> index 30493a258622..67209f63ddbc 100644
> --- a/hw/virtio/virtio-rng.c
> +++ b/hw/virtio/virtio-rng.c
> @@ -189,7 +189,7 @@ static void virtio_rng_device_realize(DeviceState *dev, Error **errp)
>      }
>  
>      if (vrng->conf.rng == NULL) {
> -        vrng->conf.default_backend = RNG_RANDOM(object_new(TYPE_RNG_RANDOM));
> +        vrng->conf.default_backend = RNG_BUILTIN(object_new(TYPE_RNG_BUILTIN));
>  
>          user_creatable_complete(USER_CREATABLE(vrng->conf.default_backend),
>                                  &local_err);
           if (local_err) {
               error_propagate(errp, local_err);
               object_unref(OBJECT(vrng->conf.default_backend));
               return;
           }

           object_property_add_child(OBJECT(dev),
                                     "default-backend",
                                     OBJECT(vrng->conf.default_backend),
                                     NULL);

           /* The child property took a reference, we can safely drop ours now */
           object_unref(OBJECT(vrng->conf.default_backend));

           object_property_set_link(OBJECT(dev),
                                    OBJECT(vrng->conf.default_backend),
                                    "rng", NULL);
       }
> diff --git a/include/hw/virtio/virtio-rng.h b/include/hw/virtio/virtio-rng.h
> index 922dce7caccf..f9b6339b19a4 100644
> --- a/include/hw/virtio/virtio-rng.h
> +++ b/include/hw/virtio/virtio-rng.h
> @@ -13,7 +13,7 @@
>  #define QEMU_VIRTIO_RNG_H
>  
>  #include "sysemu/rng.h"
> -#include "sysemu/rng-random.h"
> +#include "sysemu/rng-builtin.h"
>  #include "standard-headers/linux/virtio_rng.h"
>  
>  #define TYPE_VIRTIO_RNG "virtio-rng-device"
> @@ -26,7 +26,7 @@ struct VirtIORNGConf {
>      RngBackend *rng;
>      uint64_t max_bytes;
>      uint32_t period_ms;
> -    RngRandom *default_backend;
> +    RngBuiltin *default_backend;

This member appears to be superfluous.  As far as I can tell, it's only
used in the part of virtio-rng.c visible above.  If you replace it by a
local variable there (in a separate patch, perhaps), this patch will
become simpler.  In particular, you won't need to create rng-builtin.h.

>  };
>  
>  typedef struct VirtIORNG {
> diff --git a/include/sysemu/rng-builtin.h b/include/sysemu/rng-builtin.h
> new file mode 100644
> index 000000000000..a0f75f97dde8
> --- /dev/null
> +++ b/include/sysemu/rng-builtin.h
> @@ -0,0 +1,17 @@
> +/*
> + * QEMU Builtin Random Number Generator Backend
> + *
> + * This work is licensed under the terms of the GNU GPL, version 2 or later.
> + * See the COPYING file in the top-level directory.
> + */
> +#ifndef QEMU_RNG_BUILTIN_H
> +#define QEMU_RNG_BUILTIN_H
> +
> +#include "qom/object.h"
> +
> +#define TYPE_RNG_BUILTIN "rng-builtin"
> +#define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN)
> +
> +typedef struct RngBuiltin RngBuiltin;
> +
> +#endif
> diff --git a/qemu-options.hx b/qemu-options.hx
> index 6ab920f12be4..c9784be83cb5 100644
> --- a/qemu-options.hx
> +++ b/qemu-options.hx
> @@ -4285,7 +4285,7 @@ The @option{share} boolean option is @var{on} by default with memfd.
>  Creates a random number generator backend which obtains entropy from
>  QEMU builtin functions. The @option{id} parameter is a unique ID that
>  will be used to reference this entropy backend from the @option{virtio-rng}
> -device.
> +device. By default, the @option{virtio-rng} device uses this RNG backend.

Aside: this piece of information should ideally go into virtio-rng
documentation.  If only it existed; -device virtio-rng,help is all we
got.  So you keep it here.  Fair enough.

>  
>  @item -object rng-random,id=@var{id},filename=@var{/dev/random}
>  
> @@ -4293,8 +4293,7 @@ Creates a random number generator backend which obtains entropy from
>  a device on the host. The @option{id} parameter is a unique ID that
>  will be used to reference this entropy backend from the @option{virtio-rng}
>  device. The @option{filename} parameter specifies which file to obtain
> -entropy from and if omitted defaults to @option{/dev/urandom}. By default,
> -the @option{virtio-rng} device uses this RNG backend.
> +entropy from and if omitted defaults to @option{/dev/urandom}.
>  
>  @item -object rng-egd,id=@var{id},chardev=@var{chardevid}


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 16:25         ` Daniel P. Berrangé
@ 2019-05-10 16:55           ` Michael S. Tsirkin
  2019-05-10 17:11             ` Daniel P. Berrangé
  0 siblings, 1 reply; 18+ messages in thread
From: Michael S. Tsirkin @ 2019-05-10 16:55 UTC (permalink / raw)
  To: Daniel P. Berrangé
  Cc: Laurent Vivier, Kashyap Chamarthy, Amit Shah, Richard Henderson,
	qemu-devel, Markus Armbruster, Richard W . M . Jones,
	Stefan Hajnoczi

On Fri, May 10, 2019 at 05:25:54PM +0100, Daniel P. Berrangé wrote:
> On Fri, May 10, 2019 at 12:21:19PM -0400, Michael S. Tsirkin wrote:
> > On Fri, May 10, 2019 at 05:16:44PM +0100, Daniel P. Berrangé wrote:
> > > On Fri, May 10, 2019 at 12:12:41PM -0400, Michael S. Tsirkin wrote:
> > > > On Fri, May 10, 2019 at 03:42:01PM +0200, Laurent Vivier wrote:
> > > > > From: Kashyap Chamarthy <kchamart@redhat.com>
> > > > > 
> > > > > When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> > > > > source of entropy, and that source needs to be "non-blocking", like
> > > > > `/dev/urandom`.  However, currently QEMU defaults to the problematic
> > > > > `/dev/random`, which is "blocking" (as in, it waits until sufficient
> > > > > entropy is available).
> > > > > 
> > > > > Why prefer `/dev/urandom` over `/dev/random`?
> > > > > ---------------------------------------------
> > > > > 
> > > > > The man pages of urandom(4) and random(4) state:
> > > > > 
> > > > >     "The /dev/random device is a legacy interface which dates back to a
> > > > >     time where the cryptographic primitives used in the implementation
> > > > >     of /dev/urandom were not widely trusted.  It will return random
> > > > >     bytes only within the estimated number of bits of fresh noise in the
> > > > >     entropy pool, blocking if necessary.  /dev/random is suitable for
> > > > >     applications that need high quality randomness, and can afford
> > > > >     indeterminate delays."
> > > > > 
> > > > > Further, the "Usage" section of the said man pages state:
> > > > > 
> > > > >     "The /dev/random interface is considered a legacy interface, and
> > > > >     /dev/urandom is preferred and sufficient in all use cases, with the
> > > > >     exception of applications which require randomness during early boot
> > > > >     time; for these applications, getrandom(2) must be used instead,
> > > > >     because it will block until the entropy pool is initialized.
> > > > 
> > > > So how about just using getrandom then?
> > > 
> > > The 3rd patch in this series addresses that.
> > 
> > It seems to use qemu_guest_getrandom which in turn
> > with patch 1 calls /dev/urandom...
> > Did I miss something?
> 
> qemu_guest_getrandom will preferentially use the crypto library random
> APIs (gnutls, or gcrypt). If both are compiled out that it will use
> getrandom() if supported by the C library and current kernel. If that
> fails then it will try /dev/urandom if it exists, finally /dev/random. 
> On Windows it uses their native crypto API. See this dependant series:
> 
> https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg02237.html
> 
> Regards,
> Daniel

In particular

https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg02238.html


maybe clarify this is just for systems without getrandom then.




> -- 
> |: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
> |: https://libvirt.org         -o-            https://fstop138.berrange.com :|
> |: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom`
  2019-05-10 16:55           ` Michael S. Tsirkin
@ 2019-05-10 17:11             ` Daniel P. Berrangé
  0 siblings, 0 replies; 18+ messages in thread
From: Daniel P. Berrangé @ 2019-05-10 17:11 UTC (permalink / raw)
  To: Michael S. Tsirkin
  Cc: Laurent Vivier, Kashyap Chamarthy, Amit Shah, Richard Henderson,
	qemu-devel, Markus Armbruster, Richard W . M . Jones,
	Stefan Hajnoczi

On Fri, May 10, 2019 at 12:55:18PM -0400, Michael S. Tsirkin wrote:
> On Fri, May 10, 2019 at 05:25:54PM +0100, Daniel P. Berrangé wrote:
> > On Fri, May 10, 2019 at 12:21:19PM -0400, Michael S. Tsirkin wrote:
> > > On Fri, May 10, 2019 at 05:16:44PM +0100, Daniel P. Berrangé wrote:
> > > > On Fri, May 10, 2019 at 12:12:41PM -0400, Michael S. Tsirkin wrote:
> > > > > On Fri, May 10, 2019 at 03:42:01PM +0200, Laurent Vivier wrote:
> > > > > > From: Kashyap Chamarthy <kchamart@redhat.com>
> > > > > > 
> > > > > > When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
> > > > > > source of entropy, and that source needs to be "non-blocking", like
> > > > > > `/dev/urandom`.  However, currently QEMU defaults to the problematic
> > > > > > `/dev/random`, which is "blocking" (as in, it waits until sufficient
> > > > > > entropy is available).
> > > > > > 
> > > > > > Why prefer `/dev/urandom` over `/dev/random`?
> > > > > > ---------------------------------------------
> > > > > > 
> > > > > > The man pages of urandom(4) and random(4) state:
> > > > > > 
> > > > > >     "The /dev/random device is a legacy interface which dates back to a
> > > > > >     time where the cryptographic primitives used in the implementation
> > > > > >     of /dev/urandom were not widely trusted.  It will return random
> > > > > >     bytes only within the estimated number of bits of fresh noise in the
> > > > > >     entropy pool, blocking if necessary.  /dev/random is suitable for
> > > > > >     applications that need high quality randomness, and can afford
> > > > > >     indeterminate delays."
> > > > > > 
> > > > > > Further, the "Usage" section of the said man pages state:
> > > > > > 
> > > > > >     "The /dev/random interface is considered a legacy interface, and
> > > > > >     /dev/urandom is preferred and sufficient in all use cases, with the
> > > > > >     exception of applications which require randomness during early boot
> > > > > >     time; for these applications, getrandom(2) must be used instead,
> > > > > >     because it will block until the entropy pool is initialized.
> > > > > 
> > > > > So how about just using getrandom then?
> > > > 
> > > > The 3rd patch in this series addresses that.
> > > 
> > > It seems to use qemu_guest_getrandom which in turn
> > > with patch 1 calls /dev/urandom...
> > > Did I miss something?
> > 
> > qemu_guest_getrandom will preferentially use the crypto library random
> > APIs (gnutls, or gcrypt). If both are compiled out that it will use
> > getrandom() if supported by the C library and current kernel. If that
> > fails then it will try /dev/urandom if it exists, finally /dev/random. 
> > On Windows it uses their native crypto API. See this dependant series:
> > 
> > https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg02237.html
> 
> In particular
> 
> https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg02238.html
> 
> maybe clarify this is just for systems without getrandom then.

I'm not sure I see what the problem is. That patch is implementing the
fallback behaviour I describe above, with the crypto library preferred,
falling back to getrandom, then /dev/urandom, finally /dev/random.

Regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
  2019-05-10 13:42 [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
                   ` (2 preceding siblings ...)
  2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin Laurent Vivier
@ 2019-05-12 18:21 ` Michael S. Tsirkin
  2019-05-13  6:36   ` Laurent Vivier
  3 siblings, 1 reply; 18+ messages in thread
From: Michael S. Tsirkin @ 2019-05-12 18:21 UTC (permalink / raw)
  To: Laurent Vivier
  Cc: Daniel P . Berrangé,
	Amit Shah, Kashyap Chamarthy, Richard Henderson,
	Markus Armbruster, qemu-devel, Richard W . M . Jones

On Fri, May 10, 2019 at 03:42:00PM +0200, Laurent Vivier wrote:
> Add a new RNG backend using QEMU builtin getrandom function.
> 
> This patch applies on top of
>     "[PATCH v5 00/24] Add qemu_getrandom and ARMv8.5-RNG etc"
> Based-on: 20190510012458.22706-1-richard.henderson@linaro.org
> 
> v3: Include Kashyap's patch in the series
>     Add a patch to change virtio-rng default backend to rng-builtin
> 
> v2: Update qemu-options.hx
>     describe the new backend and specify virtio-rng uses the
>     rng-random by default
> 
> Kashyap Chamarthy (1):
>   VirtIO-RNG: Update default entropy source to `/dev/urandom`
> 
> Laurent Vivier (2):
>   rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
>   virtio-rng: change default backend to rng-builtin


OK pls address Marku's comment on commit msg and I will merge.

>  backends/Makefile.objs         |  2 +-
>  backends/rng-builtin.c         | 54 ++++++++++++++++++++++++++++++++++
>  backends/rng-random.c          |  2 +-
>  hw/virtio/virtio-rng.c         |  2 +-
>  include/hw/virtio/virtio-rng.h |  4 +--
>  include/sysemu/rng-builtin.h   | 17 +++++++++++
>  qemu-options.hx                |  9 +++++-
>  7 files changed, 84 insertions(+), 6 deletions(-)
>  create mode 100644 backends/rng-builtin.c
>  create mode 100644 include/sysemu/rng-builtin.h
> 
> -- 
> 2.20.1


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
  2019-05-12 18:21 ` [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Michael S. Tsirkin
@ 2019-05-13  6:36   ` Laurent Vivier
  2019-05-13  8:49     ` Kashyap Chamarthy
  0 siblings, 1 reply; 18+ messages in thread
From: Laurent Vivier @ 2019-05-13  6:36 UTC (permalink / raw)
  To: Michael S. Tsirkin, Kashyap Chamarthy
  Cc: Daniel P. Berrangé,
	Amit Shah, Richard Henderson, Markus Armbruster, qemu-devel,
	Richard W . M . Jones

On 12/05/2019 20:21, Michael S. Tsirkin wrote:
> On Fri, May 10, 2019 at 03:42:00PM +0200, Laurent Vivier wrote:
>> Add a new RNG backend using QEMU builtin getrandom function.
>>
>> This patch applies on top of
>>      "[PATCH v5 00/24] Add qemu_getrandom and ARMv8.5-RNG etc"
>> Based-on: 20190510012458.22706-1-richard.henderson@linaro.org
>>
>> v3: Include Kashyap's patch in the series
>>      Add a patch to change virtio-rng default backend to rng-builtin
>>
>> v2: Update qemu-options.hx
>>      describe the new backend and specify virtio-rng uses the
>>      rng-random by default
>>
>> Kashyap Chamarthy (1):
>>    VirtIO-RNG: Update default entropy source to `/dev/urandom`
>>
>> Laurent Vivier (2):
>>    rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
>>    virtio-rng: change default backend to rng-builtin
> 
> 
> OK pls address Marku's comment on commit msg and I will merge.

Kashyap,

as this patch is from you, do you agree?

If so, I can update the message and send a new version of the series (or 
you canr esend your patch alone if you prefer).

Thanks,
Laurent


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
  2019-05-13  6:36   ` Laurent Vivier
@ 2019-05-13  8:49     ` Kashyap Chamarthy
  2019-05-13 12:13       ` Markus Armbruster
  0 siblings, 1 reply; 18+ messages in thread
From: Kashyap Chamarthy @ 2019-05-13  8:49 UTC (permalink / raw)
  To: Laurent Vivier
  Cc: Daniel P. Berrangé,
	Amit Shah, qemu-devel, Michael S. Tsirkin, Richard Henderson,
	Markus Armbruster, Richard W . M . Jones

On Mon, May 13, 2019 at 08:36:23AM +0200, Laurent Vivier wrote:
> On 12/05/2019 20:21, Michael S. Tsirkin wrote:

[...]

> > > Kashyap Chamarthy (1):
> > >    VirtIO-RNG: Update default entropy source to `/dev/urandom`
> > > 
> > > Laurent Vivier (2):
> > >    rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
> > >    virtio-rng: change default backend to rng-builtin
> > 
> > 
> > OK pls address Marku's comment on commit msg and I will merge.
> 
> Kashyap,
> 
> as this patch is from you, do you agree?

Yes.

> If so, I can update the message and send a new version of the series
> (or you canr esend your patch alone if you prefer).

Please go ahead and add it, the below is the text (from Dan/Markus):

    What about other OSes?
    ----------------------
    
    `/dev/urandom` exists and works on OS-X, FreeBSD, DragonFlyBSD, NetBSD
    and OpenBSD, which cover all the non-Linux platforms we explicitly
    support, aside from Windows.
    
    On Windows `/dev/random` doesn't work either so we don't regress.
    This is actually another argument in favour of using the newly
    proposed 'rng-builtin' backend by default, as that will work on
    Windows.

Thanks!

[...]

-- 
/kashyap


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin
  2019-05-10 16:36   ` Markus Armbruster
@ 2019-05-13 10:26     ` Laurent Vivier
  2019-05-14 14:39       ` Markus Armbruster
  0 siblings, 1 reply; 18+ messages in thread
From: Laurent Vivier @ 2019-05-13 10:26 UTC (permalink / raw)
  To: Markus Armbruster
  Cc: Daniel P.Berrangé,
	Michael S. Tsirkin, Amit Shah, Richard Henderson, qemu-devel,
	Richard W . M . Jones, Kashyap Chamarthy

On 10/05/2019 18:36, Markus Armbruster wrote:
> Laurent Vivier <lvivier@redhat.com> writes:
> 
>> Signed-off-by: Laurent Vivier <lvivier@redhat.com>
>> ---
>>   backends/rng-builtin.c         |  8 +++-----
>>   hw/virtio/virtio-rng.c         |  2 +-
>>   include/hw/virtio/virtio-rng.h |  4 ++--
>>   include/sysemu/rng-builtin.h   | 17 +++++++++++++++++
>>   qemu-options.hx                |  5 ++---
>>   5 files changed, 25 insertions(+), 11 deletions(-)
>>   create mode 100644 include/sysemu/rng-builtin.h
...
>> diff --git a/include/hw/virtio/virtio-rng.h b/include/hw/virtio/virtio-rng.h
>> index 922dce7caccf..f9b6339b19a4 100644
>> --- a/include/hw/virtio/virtio-rng.h
>> +++ b/include/hw/virtio/virtio-rng.h
...
>>   #define TYPE_VIRTIO_RNG "virtio-rng-device"
>> @@ -26,7 +26,7 @@ struct VirtIORNGConf {
>>       RngBackend *rng;
>>       uint64_t max_bytes;
>>       uint32_t period_ms;
>> -    RngRandom *default_backend;
>> +    RngBuiltin *default_backend;
> 
> This member appears to be superfluous.  As far as I can tell, it's only
> used in the part of virtio-rng.c visible above.  If you replace it by a
> local variable there (in a separate patch, perhaps), this patch will
> become simpler.  In particular, you won't need to create rng-builtin.h.
> 

I don't understand how we can remove the rng-builtin.h as we need its 
macros for "RNG_BUILTIN(object_new(TYPE_RNG_BUILTIN))". Could you explain?

Thanks,
Laurent


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
  2019-05-13  8:49     ` Kashyap Chamarthy
@ 2019-05-13 12:13       ` Markus Armbruster
  0 siblings, 0 replies; 18+ messages in thread
From: Markus Armbruster @ 2019-05-13 12:13 UTC (permalink / raw)
  To: Kashyap Chamarthy
  Cc: Laurent Vivier, Daniel P. Berrangé,
	Michael S. Tsirkin, Amit Shah, Richard Henderson, qemu-devel,
	Richard W . M . Jones

Kashyap Chamarthy <kchamart@redhat.com> writes:

> On Mon, May 13, 2019 at 08:36:23AM +0200, Laurent Vivier wrote:
>> On 12/05/2019 20:21, Michael S. Tsirkin wrote:
>
> [...]
>
>> > > Kashyap Chamarthy (1):
>> > >    VirtIO-RNG: Update default entropy source to `/dev/urandom`
>> > > 
>> > > Laurent Vivier (2):
>> > >    rng-builtin: add an RNG backend that uses qemu_guest_getrandom()
>> > >    virtio-rng: change default backend to rng-builtin
>> > 
>> > 
>> > OK pls address Marku's comment on commit msg and I will merge.
>> 
>> Kashyap,
>> 
>> as this patch is from you, do you agree?
>
> Yes.
>
>> If so, I can update the message and send a new version of the series
>> (or you canr esend your patch alone if you prefer).
>
> Please go ahead and add it, the below is the text (from Dan/Markus):
>
>     What about other OSes?
>     ----------------------
>     
>     `/dev/urandom` exists and works on OS-X, FreeBSD, DragonFlyBSD, NetBSD
>     and OpenBSD, which cover all the non-Linux platforms we explicitly
>     support, aside from Windows.
>     
>     On Windows `/dev/random` doesn't work either so we don't regress.
>     This is actually another argument in favour of using the newly
>     proposed 'rng-builtin' backend by default, as that will work on
>     Windows.

Additionally, please insert "on Linux" into the first paragraph, like
this:

  When QEMU exposes a VirtIO-RNG device to the guest, that device needs a
  source of entropy, and that source needs to be "non-blocking", like
  `/dev/urandom`.  However, currently QEMU defaults to the problematic
  `/dev/random`, which on Linux is "blocking" (as in, it waits until
  sufficient entropy is available).


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin
  2019-05-13 10:26     ` Laurent Vivier
@ 2019-05-14 14:39       ` Markus Armbruster
  0 siblings, 0 replies; 18+ messages in thread
From: Markus Armbruster @ 2019-05-14 14:39 UTC (permalink / raw)
  To: Laurent Vivier
  Cc: Daniel P.Berrangé,
	Amit Shah, Michael S. Tsirkin, Richard Henderson,
	Richard W . M . Jones, qemu-devel, Kashyap Chamarthy

Laurent Vivier <lvivier@redhat.com> writes:

> On 10/05/2019 18:36, Markus Armbruster wrote:
>> Laurent Vivier <lvivier@redhat.com> writes:
>>
>>> Signed-off-by: Laurent Vivier <lvivier@redhat.com>
>>> ---
>>>   backends/rng-builtin.c         |  8 +++-----
>>>   hw/virtio/virtio-rng.c         |  2 +-
>>>   include/hw/virtio/virtio-rng.h |  4 ++--
>>>   include/sysemu/rng-builtin.h   | 17 +++++++++++++++++
>>>   qemu-options.hx                |  5 ++---
>>>   5 files changed, 25 insertions(+), 11 deletions(-)
>>>   create mode 100644 include/sysemu/rng-builtin.h
> ...
>>> diff --git a/include/hw/virtio/virtio-rng.h b/include/hw/virtio/virtio-rng.h
>>> index 922dce7caccf..f9b6339b19a4 100644
>>> --- a/include/hw/virtio/virtio-rng.h
>>> +++ b/include/hw/virtio/virtio-rng.h
> ...
>>>   #define TYPE_VIRTIO_RNG "virtio-rng-device"
>>> @@ -26,7 +26,7 @@ struct VirtIORNGConf {
>>>       RngBackend *rng;
>>>       uint64_t max_bytes;
>>>       uint32_t period_ms;
>>> -    RngRandom *default_backend;
>>> +    RngBuiltin *default_backend;
>>
>> This member appears to be superfluous.  As far as I can tell, it's only
>> used in the part of virtio-rng.c visible above.  If you replace it by a
>> local variable there (in a separate patch, perhaps), this patch will
>> become simpler.  In particular, you won't need to create rng-builtin.h.
>>
>
> I don't understand how we can remove the rng-builtin.h as we need its
> macros for "RNG_BUILTIN(object_new(TYPE_RNG_BUILTIN))". Could you
> explain?

You're right, you'll still need TYPE_RNG_BUILTIN.  You don't actually
need RNG_BUILTIN(), because you can make the local variable Object *.
Bonus: saves a couple of OBJECT().

If nothing but TYPE_RNG_BUILTIN is left in rng-builtin.h, I'd stick it
into rng.h instead.


^ permalink raw reply	[flat|nested] 18+ messages in thread

end of thread, other threads:[~2019-05-14 14:40 UTC | newest]

Thread overview: 18+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-05-10 13:42 [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 1/3] VirtIO-RNG: Update default entropy source to `/dev/urandom` Laurent Vivier
2019-05-10 16:12   ` Michael S. Tsirkin
2019-05-10 16:16     ` Daniel P. Berrangé
2019-05-10 16:21       ` Michael S. Tsirkin
2019-05-10 16:25         ` Daniel P. Berrangé
2019-05-10 16:55           ` Michael S. Tsirkin
2019-05-10 17:11             ` Daniel P. Berrangé
2019-05-10 16:18   ` Markus Armbruster
2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 2/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Laurent Vivier
2019-05-10 13:42 ` [Qemu-devel] [PATCH v3 3/3] virtio-rng: change default backend to rng-builtin Laurent Vivier
2019-05-10 16:36   ` Markus Armbruster
2019-05-13 10:26     ` Laurent Vivier
2019-05-14 14:39       ` Markus Armbruster
2019-05-12 18:21 ` [Qemu-devel] [PATCH v3 0/3] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() Michael S. Tsirkin
2019-05-13  6:36   ` Laurent Vivier
2019-05-13  8:49     ` Kashyap Chamarthy
2019-05-13 12:13       ` Markus Armbruster

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.