Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/sys/kern Fix two mistakes in entropy accounting.



details:   https://anonhg.NetBSD.org/src/rev/9429c4ebf650
branches:  trunk
changeset: 932411:9429c4ebf650
user:      riastradh <riastradh%NetBSD.org@localhost>
date:      Thu May 07 00:55:13 2020 +0000

description:
Fix two mistakes in entropy accounting.

1. When consolidating entropy from per-CPU pools, drop the amount
   pending to zero; otherwise the entropy consolidation thread might
   keep consolidating every second.

This uncovered a feedback loop with kern.entropy.depletion=1 and
on-demand entropy sources, which is that depleting the pool and then
requesting more from it causes the on-demand entropy sources to
trigger reseed, which causes cprng_fast/strong to request more which
depletes the pool again which causes on-demand entropy sources to
trigger reseed, and so on.

To work around this:

2. Set a rate limit on reseeding (advancing the entropy epoch) when
   kern.entropy.depletion=1; otherwise reseeding gets into a feedback
   loop when there are on-demand entropy sources like RDRAND/RDSEED.

(By default, kern.entropy.depletion=0, so this mainly only affects
systems where you're simulating what happens when /dev/random blocks
for testing.)

diffstat:

 sys/kern/kern_entropy.c |  20 +++++++++++++-------
 1 files changed, 13 insertions(+), 7 deletions(-)

diffs (56 lines):

diff -r 47e09e71280d -r 9429c4ebf650 sys/kern/kern_entropy.c
--- a/sys/kern/kern_entropy.c   Wed May 06 20:40:33 2020 +0000
+++ b/sys/kern/kern_entropy.c   Thu May 07 00:55:13 2020 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: kern_entropy.c,v 1.11 2020/05/06 18:31:05 riastradh Exp $      */
+/*     $NetBSD: kern_entropy.c,v 1.12 2020/05/07 00:55:13 riastradh Exp $      */
 
 /*-
  * Copyright (c) 2019 The NetBSD Foundation, Inc.
@@ -77,7 +77,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: kern_entropy.c,v 1.11 2020/05/06 18:31:05 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: kern_entropy.c,v 1.12 2020/05/07 00:55:13 riastradh Exp $");
 
 #include <sys/param.h>
 #include <sys/types.h>
@@ -1067,8 +1067,9 @@
        __insn_barrier();
        extra[i++] = entropy_timer();
 
-       /* Extract the data.  */
+       /* Extract the data and count it no longer pending.  */
        entpool_extract(ec->ec_pool, buf, sizeof buf);
+       atomic_store_relaxed(&ec->ec_pending, 0);
        extra[i++] = entropy_timer();
 
        /* Release the per-CPU state.  */
@@ -1108,6 +1109,8 @@
 static void
 entropy_notify(void)
 {
+       static const struct timeval interval = {.tv_sec = 60, .tv_usec = 0};
+       static struct timeval lasttime; /* serialized by E->lock */
        unsigned epoch;
 
        KASSERT(E->stage == ENTROPY_COLD || mutex_owned(&E->lock));
@@ -1122,10 +1125,13 @@
 
        /* Set the epoch; roll over from UINTMAX-1 to 1.  */
        rnd_initial_entropy = 1; /* XXX legacy */
-       epoch = E->epoch + 1;
-       if (epoch == 0 || epoch == (unsigned)-1)
-               epoch = 1;
-       atomic_store_relaxed(&E->epoch, epoch);
+       if (__predict_true(!atomic_load_relaxed(&entropy_depletion)) ||
+           ratecheck(&lasttime, &interval)) {
+               epoch = E->epoch + 1;
+               if (epoch == 0 || epoch == (unsigned)-1)
+                       epoch = 1;
+               atomic_store_relaxed(&E->epoch, epoch);
+       }
 
        /* Notify waiters.  */
        if (E->stage >= ENTROPY_WARM) {



Home | Main Index | Thread Index | Old Index