Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp99723pxb; Wed, 23 Mar 2022 13:57:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxG2Yx5Hk1tzeG/MTHx4oAL6+OdyC8JgyFBKc1NMRAo94jjGo0dnP7OPUQoPqnJZ4PSrbY3 X-Received: by 2002:a05:6a00:1992:b0:4fa:7438:870a with SMTP id d18-20020a056a00199200b004fa7438870amr1571417pfl.48.1648069035463; Wed, 23 Mar 2022 13:57:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648069035; cv=none; d=google.com; s=arc-20160816; b=JBSDi82VwZuKXrJrVDIvdawhoXxvbkwxvqxhaLmjjcR3jzHWSZBAQ8REC7ieWbgKEo 7wKbTbl+RYgYOZ6iKXVh4ezAgI01dvlDF0OgEbA4vJ7hvvApU42LlTpjT0/Y+DfjNm5U WSnxFfySlREy9cVZM9qzgVha2eYZ/X9fiGYsD8lViD8zcgsf9y63H2LuZ5xLXHNgq89K WyY7B2w/gi7tlidAzmSf/tY7qbhLFtaXMFXxkdzuibHP0cEBRDfjngZk39E++wj8Xq+0 Hmz+IZoxGwp7K2IarbUED3eQamxxgj8qRUNgmXyhjmD4QXJslLOtcEk/ELwZzqAhGoNu Zbdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=+7brRiRvYR2VidHiE43DL07dgBdAsSYPqfIk9b4TX/g=; b=WU3GnFcAzSBlu2jffoAqZhBMnEkICZhhV9cg/D48i08ZTwbCfmh/Lvim5n0My0T6TN 6ABAT29T6jzYzrirLOuPBK+e3nLAUmkllU7FXDe1/Wfijy3Iv5BiwsIl2ff/dCSGOrQa UMfhiKhQKSHVk3HtwdqHe+UmueZbUGukPFJtf/HSwl7npxZuCeJww3VPsmw5f9Dzfzd+ Ox/u0dSzjTbpM+EZqBvVtUYuvHI9uLYqzYOtA9+uMJg/Tt1ryc8+a1oSqLHdAOz/MOJ2 SXDxNz8uVvPvYNV6w55VGa83XcHQz2X290jOxpWDG5vnLbrb2uzHH0O8RA+8IKMC7eQY /7vw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@roeck-us.net header.s=default header.b=StQ7WEwT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h7-20020a17090ac38700b001bd14e030a2si6041943pjt.122.2022.03.23.13.56.45; Wed, 23 Mar 2022 13:57:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@roeck-us.net header.s=default header.b=StQ7WEwT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239866AbiCVSWs (ORCPT + 99 others); Tue, 22 Mar 2022 14:22:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35514 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236651AbiCVSWr (ORCPT ); Tue, 22 Mar 2022 14:22:47 -0400 X-Greylist: delayed 1470 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Tue, 22 Mar 2022 11:21:20 PDT Received: from gateway23.websitewelcome.com (gateway23.websitewelcome.com [192.185.47.80]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6384B8A6C2 for ; Tue, 22 Mar 2022 11:21:20 -0700 (PDT) Received: from cm16.websitewelcome.com (cm16.websitewelcome.com [100.42.49.19]) by gateway23.websitewelcome.com (Postfix) with ESMTP id 12DF584F6 for ; Tue, 22 Mar 2022 12:56:49 -0500 (CDT) Received: from 162-215-252-75.unifiedlayer.com ([208.91.199.152]) by cmsmtp with SMTP id WikSn7tYRXvvJWikSnUC54; Tue, 22 Mar 2022 12:56:49 -0500 X-Authority-Reason: nr=8 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=roeck-us.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=+7brRiRvYR2VidHiE43DL07dgBdAsSYPqfIk9b4TX/g=; b=StQ7WEwTCb/rt89VCe+LQ+ERB3 QXWawfzAKDTeBk43IYokD+KpmviLLj48HZ6Hdz6Gtv7W0x9SfXi41CA7r8C9zZ23Pvsjnaxrq96PA Xh5IdeTdXhHHWO3QJNulu9uqk+8kZeiomOeJiD0ZWg6KT4wgh0R12OuxUioWkkDwKTiTnJM7JGJqi +ZM34ZtPX8NXMvyTGRbVqdYCe+rcqabUesJcdWq64y6z4YsvRI4XcveyYK5C6Uds0zKkh0UxczVYc t23ai+O230YiBstGhXLG2gwrDSTpEMCyE7845DZOyf22ZUtOxKleVeCYKKXbK5ah+HB8WeZaLyZTd j2uEbZpQ==; Received: from 108-223-40-66.lightspeed.sntcca.sbcglobal.net ([108.223.40.66]:54402) by bh-25.webhostbox.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1nWikR-002XCh-MU; Tue, 22 Mar 2022 17:56:47 +0000 Message-ID: Date: Tue, 22 Mar 2022 10:56:44 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH v1] random: block in /dev/urandom Content-Language: en-US To: "Jason A. Donenfeld" Cc: linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, linux-arch@vger.kernel.org, Dinh Nguyen , Nick Hu , Max Filippov , Palmer Dabbelt , "David S . Miller" , Yoshinori Sato , Michal Simek , Borislav Petkov , Guo Ren , Geert Uytterhoeven , Joshua Kinard , David Laight , Dominik Brodowski , Eric Biggers , Ard Biesheuvel , Arnd Bergmann , Thomas Gleixner , Andy Lutomirski , Kees Cook , Lennart Poettering , Konstantin Ryabitsev , Linus Torvalds , Greg Kroah-Hartman , Theodore Ts'o References: <20220217162848.303601-1-Jason@zx2c4.com> <20220322155820.GA1745955@roeck-us.net> From: Guenter Roeck In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - roeck-us.net X-BWhitelist: no X-Source-IP: 108.223.40.66 X-Source-L: No X-Exim-ID: 1nWikR-002XCh-MU X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: 108-223-40-66.lightspeed.sntcca.sbcglobal.net [108.223.40.66]:54402 X-Source-Auth: linux@roeck-us.net X-Email-Count: 32 X-Source-Cap: cm9lY2s7YWN0aXZzdG07YmgtMjUud2ViaG9zdGJveC5uZXQ= X-Local-Domain: yes X-Spam-Status: No, score=-1.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_PASS,SPF_SOFTFAIL,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 3/22/22 10:09, Jason A. Donenfeld wrote: > Hey Guenter, > > On Tue, Mar 22, 2022 at 08:58:20AM -0700, Guenter Roeck wrote: >> On Thu, Feb 17, 2022 at 05:28:48PM +0100, Jason A. Donenfeld wrote: >>> This topic has come up countless times, and usually doesn't go anywhere. >>> This time I thought I'd bring it up with a slightly narrower focus, >>> updated for some developments over the last three years: we finally can >>> make /dev/urandom always secure, in light of the fact that our RNG is >>> now always seeded. >>> >> >> [ ... ] >> >> This patch (or a later version of it) made it into mainline and causes a >> large number of qemu boot test failures for various architectures (arm, >> m68k, microblaze, sparc32, xtensa are the ones I observed). Common >> denominator is that boot hangs at "Saving random seed:". A sample bisect >> log is attached. Reverting this patch fixes the problem. > > As Linus said, it was worth a try, but I guess it just didn't work. For > my own curiosity, though, do you have a link to those QEMU VMs you could > share? I'd sort of like to poke around, and if we do ever reattempt this > sometime down the road, it seems like understanding everything about why > the previous time failed might be a good idea. > Everything - including the various root file systems - is at git@github.com:groeck/linux-build-test.git. Look into rootfs/ for the various boot tests. I'll be happy to provide some qemu command lines if needed. Guenter