From: Pavel Machek <pavel@ucw.cz> To: Linus Torvalds <torvalds@linux-foundation.org> Cc: Thomas Gleixner <tglx@linutronix.de>, "Ahmed S. Darwish" <darwish.07@gmail.com>, LKML <linux-kernel@vger.kernel.org>, Theodore Ts'o <tytso@mit.edu>, Nicholas Mc Guire <hofrat@opentech.at>, the arch/x86 maintainers <x86@kernel.org>, Andy Lutomirski <luto@kernel.org>, Kees Cook <keescook@chromium.org> Subject: Re: x86/random: Speculation to the rescue Date: Sun, 6 Oct 2019 19:35:02 +0200 [thread overview] Message-ID: <20191006173501.GA31243@amd> (raw) In-Reply-To: <CAHk-=wjvhovO6V4-zT=xEMFnRonYteZvsPo-S0_n_DetSTUk5A@mail.gmail.com> [-- Attachment #1: Type: text/plain, Size: 2236 bytes --] On Sun 2019-10-06 10:26:18, Linus Torvalds wrote: > On Sun, Oct 6, 2019 at 4:41 AM Pavel Machek <pavel@ucw.cz> wrote: > > > > Should we have some kind of notifier chain, so that we could utilize > > better random sources (spinning rust) if we had them? > > The spinning rust will get entropy on its own just thanks to the > regular interrupt stuff. And the kernel tryin gto do IO is a bad > idea. It will not: boot is now halted because systemd wants some entropy. Everything is idle and very little interrupts are happening. We have spinning rust, but it is idle, and thus not generating any interrupts. > Plus I think it's kind of pointless to do anythign at all for things > like spinning rust in this day and age. It's no longer relevant, and > never really was in the area where this was a problem. > > Also, I don't really like the notion of random (sic) notifiers that > different drivers or things could attach to this thing. People will > disagree about how much entropy it has anyway, and I'd rather have > _one_ clear implementation that people can look at and comment on and > try to actually write an academic paper on and suggest improvements > to, than some generic "entropy notifier interface" that then gets > whatever input somebody decides is appropriate. > > We already have interfaces for "I think I have interesting data": > add_interrupt_randomness(), add_device_randomness(), > add_hwgenerator_randomness() are all for different sources of > entropy. I'm not suggesting the notifier would invent some entropy... I agree that kernel doing IO is strange, but I'm suggesting just that: if userspace is blocked waiting for entropy, do some I/O, and let interrupt randomness do its job. It will work great on spinning rust. It will also work somehow on SSDs and SD cards etc, because they have separate CPUs these days. They'll certainly generate some interrupts, and we already assign some randomness to that... It will let the machine boot, and entropy calculation rules do not need to change. Best regards, Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 181 bytes --]
next prev parent reply other threads:[~2019-10-06 17:35 UTC|newest] Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-09-28 22:24 Thomas Gleixner 2019-09-28 23:53 ` Linus Torvalds 2019-09-29 7:40 ` Thomas Gleixner 2019-09-29 8:05 ` Alexander E. Patrakov 2019-09-30 1:16 ` Linus Torvalds 2019-09-30 2:59 ` Linus Torvalds 2019-09-30 6:10 ` Borislav Petkov 2019-09-30 16:06 ` Linus Torvalds 2019-10-01 13:51 ` Borislav Petkov 2019-10-01 17:14 ` Linus Torvalds 2019-10-01 17:50 ` [PATCH] char/random: Add a newline at the end of the file Borislav Petkov 2019-09-30 18:05 ` x86/random: Speculation to the rescue Kees Cook 2019-09-30 3:37 ` Theodore Y. Ts'o 2019-09-30 13:16 ` Theodore Y. Ts'o 2019-09-30 16:15 ` Linus Torvalds 2019-09-30 16:32 ` Peter Zijlstra 2019-09-30 17:03 ` Linus Torvalds 2019-10-01 10:28 ` David Laight 2019-10-15 21:50 ` Thomas Gleixner 2019-10-01 16:15 ` Ahmed S. Darwish 2019-10-01 16:37 ` Kees Cook 2019-10-01 17:18 ` Ahmed S. Darwish 2019-10-01 17:25 ` Linus Torvalds 2019-10-06 12:07 ` Pavel Machek 2019-10-02 12:01 ` Theodore Y. Ts'o 2019-10-06 11:41 ` Pavel Machek 2019-10-06 17:26 ` Linus Torvalds 2019-10-06 17:35 ` Pavel Machek [this message] 2019-10-06 18:06 ` Linus Torvalds 2019-10-06 18:21 ` Pavel Machek 2019-10-06 18:26 ` Linus Torvalds 2019-10-07 11:47 ` Theodore Y. Ts'o 2019-10-07 22:18 ` Pavel Machek 2019-10-08 11:33 ` David Laight 2019-10-09 8:02 ` Pavel Machek 2019-10-09 9:37 ` David Laight 2019-10-01 2:14 hgntkwis
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20191006173501.GA31243@amd \ --to=pavel@ucw.cz \ --cc=darwish.07@gmail.com \ --cc=hofrat@opentech.at \ --cc=keescook@chromium.org \ --cc=linux-kernel@vger.kernel.org \ --cc=luto@kernel.org \ --cc=tglx@linutronix.de \ --cc=torvalds@linux-foundation.org \ --cc=tytso@mit.edu \ --cc=x86@kernel.org \ --subject='Re: x86/random: Speculation to the rescue' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).