Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp4572735ybe; Mon, 16 Sep 2019 14:42:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqwDRQfl4pFW4yNDHH1nTN8HXmnx+Tfu8wBMInTxQI0GhGM29RkSbiwa64Euoi3y+WVsy1Gj X-Received: by 2002:a50:d552:: with SMTP id f18mr1542448edj.36.1568670166075; Mon, 16 Sep 2019 14:42:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568670166; cv=none; d=google.com; s=arc-20160816; b=oPSpgbdQakFfNAQn3CoRe7XzJFClQPlYa6Eop4CLBY5WHGcYTfSJ5k6UpKuznwuTVQ DGA9g0Ck/5ihRnX5RxEOZzb63R7fteKZEZOaWNDd1xr33T4TF1OHz54bO0vHW1Hqqgqg ifDwp8RGrhDRcVA6XMF6ySxY2tcj7w7F4qossPZpFfWZeGCKvg7v9+NaGAKS7RcVkbag AEWy62h779k7EHDk4Aw7As+fnWe7/WChQOAr/V7H3rAgJNk7Gy7z3tfEoqnLVwmglPI3 o6q1vreXGob/ptX18jaIUkieyPBDvv9x8pbYQ3eWqA2EjXKwSKvQq6Vo4E3fKCSglruS fP2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=57aHQ03RabXfmPPnBRnH2eNL8SbbvtkPDz91VTbX6+E=; b=qpLwYNQ4bm1Mv8B2HTiioFL7YM8oxruc2Q58WNPHBNzgMC2E9Jcm73npKwU3zbqU0F XAeG1wdadyEYwlv5NwnsoUYCzAH4VhcJHQucD6SqGealnA8k259rnLU7+YfdG0ILrOAf TIYT0PpcoyGnUOdjJ9FKPf+BvIpwwskROqeN7LzhYNS3ZYlZI3J25Wr7VAL2gOPn5QOm yeXTDxoGOytMxMoOQzC8oLbZzOgLQiJ5nf4cS/Wo9G61ATJbMdVOlkgJEZQsTyzgeruB DW7VP8FYaqA/QN8Fx2i+IGPZuMZaFZtA9vNOHVM/VAHdSe1R6xtYOCi7fTA2HyeGTOBL JaeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b34si214847edb.439.2019.09.16.14.42.21; Mon, 16 Sep 2019 14:42:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390690AbfIPTJ1 (ORCPT + 99 others); Mon, 16 Sep 2019 15:09:27 -0400 Received: from wtarreau.pck.nerim.net ([62.212.114.60]:46279 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390662AbfIPTJ1 (ORCPT ); Mon, 16 Sep 2019 15:09:27 -0400 Received: (from willy@localhost) by pcw.home.local (8.15.2/8.15.2/Submit) id x8GJ8xTE025965; Mon, 16 Sep 2019 21:08:59 +0200 Date: Mon, 16 Sep 2019 21:08:59 +0200 From: Willy Tarreau To: Linus Torvalds Cc: "Theodore Y. Ts'o" , Vito Caputo , "Ahmed S. Darwish" , Lennart Poettering , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , "Alexander E. Patrakov" , zhangjs , linux-ext4@vger.kernel.org, lkml Subject: Re: Linux 5.3-rc8 Message-ID: <20190916190858.GD24547@1wt.eu> References: <20190916014050.GA7002@darwi-home-pc> <20190916014833.cbetw4sqm3lq4x6m@shells.gnugeneration.com> <20190916024904.GA22035@mit.edu> <20190916042952.GB23719@1wt.eu> <20190916061252.GA24002@1wt.eu> <20190916172117.GB15263@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.1 (2016-04-27) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, Sep 16, 2019 at 10:44:31AM -0700, Linus Torvalds wrote: > - add new GRND_SECURE and GRND_INSECURE flags that have the actual > useful behaviors that we currently pretty much lack > > - consider the old 0-3 flag values legacy, deprecated, and unsafe > because they _will_ time out to fix the existing problem we have right > now because of their bad behavior. I think we can keep a flag to work like the current /dev/random and deplete entropy for the very rare cases where it's really desired to run this way (maybe even just for research), but it should require special permissions as it impacts the whole system. I think that your GRND_SECURE above means the current 0 situation, where we wait for initial entropy then not wait anymore, right ? If so it could remain the default setting, because at least it will not betray applications which rely on this reliability. And GRND_INSECURE will be decided on a case by case basis by applications that are caught waiting like sfdisk in initramfs or a MAC address generator for example. In this case it could even be called GRND_PREDICTABLE maybe to enforce its property compared to others. My guess is that we can fix the situation because nobody likes the problems that sporadically hit users. getrandom() was adopted quite quickly to solve issues related to using /dev/*random in chroots, I think the new flags will be adopted by those experiencing issues. Just my two cents, Willy