mbox series

[0/3] Add getrandom() fallback, cleanup headers

Message ID 20231025194701.456031-1-pvorel@suse.cz (mailing list archive)
Headers show
Series Add getrandom() fallback, cleanup headers | expand

Message

Petr Vorel Oct. 25, 2023, 7:46 p.m. UTC
Hi,

motivation to add this is to allow to compile reexport on systems with
older libc. (getrandom() wrapper is supported on glibc 2.25+ and  musl
1.1.20+, uclibc-ng does
not yet support it).

getrandom() syscall is supported Linux 3.17+ (old enough to bother with
a check).

I also wonder why getrandom() syscall does not called with GRND_NONBLOCK
flag. Is it ok/needed to block?

Kind regards,
Petr

Petr Vorel (3):
  reexport/fsidd.c: Remove unused headers
  support/reexport.c: Remove unused headers
  support/backend_sqlite.c: Add getrandom() fallback

 Makefile.am                       |  1 +
 aclocal/getrandom.m4              | 16 ++++++++++++++++
 configure.ac                      |  3 +++
 support/reexport/backend_sqlite.c | 18 +++++++++++++++++-
 support/reexport/fsidd.c          | 10 ----------
 support/reexport/reexport.c       |  7 -------
 6 files changed, 37 insertions(+), 18 deletions(-)
 create mode 100644 aclocal/getrandom.m4

Comments

Richard Weinberger Oct. 25, 2023, 8:13 p.m. UTC | #1
----- Ursprüngliche Mail -----
> Von: "Petr Vorel" <pvorel@suse.cz>
> I also wonder why getrandom() syscall does not called with GRND_NONBLOCK
> flag. Is it ok/needed to block?

With GRND_NONBLOCK it would return EAGAIN if not enough
randomness is ready. How to handle this then? Aborting the start of the daemon?

Before we other think the whole thing, the sole purpose of the getrandom()
call is seeding libc's PRNG with srand() to give every waiter a different
amount of sleep time upon concurrent database access.
See wait_for_dbaccess() and handling of SQLITE_LOCKED.

I'm pretty sure instead of seeding from getrandom() we can also use the current
time or read a few bytes from /dev/urandom.
Just make sure that every user of sqlite_plug_init() has a different seed.

Thanks,
//richard
Petr Vorel Oct. 25, 2023, 8:54 p.m. UTC | #2
Hi Richard,

> ----- Ursprüngliche Mail -----
> > Von: "Petr Vorel" <pvorel@suse.cz>
> > I also wonder why getrandom() syscall does not called with GRND_NONBLOCK
> > flag. Is it ok/needed to block?

> With GRND_NONBLOCK it would return EAGAIN if not enough
> randomness is ready. How to handle this then? Aborting the start of the daemon?

Well, current code uses /dev/urandom and blocks until pool is ready (man
random(7)), which is probably OK (on VM people may need to use haveged to avoid
blocking, but that's known). But even with blocking mode blocking requests of
any size can be interrupted by a signal handler with errno EINTR. That's
probably the reason why people write more robust code. I'm not sure if it's
really needed to be handled in our case.

Nice example is ul_random_get_bytes() in util-linux [1]:

#ifdef HAVE_GETRANDOM
	while (n > 0) {
		int x;

		errno = 0;
		x = getrandom(cp, n, GRND_NONBLOCK);
		if (x > 0) {			/* success */
		       n -= x;
		       cp += x;
		       lose_counter = 0;
		       errno = 0;
		} else if (errno == ENOSYS) {	/* kernel without getrandom() */
			break;

		} else if (errno == EAGAIN && lose_counter < UL_RAND_READ_ATTEMPTS) {
			xusleep(UL_RAND_READ_DELAY);	/* no entropy, wait and try again */
			lose_counter++;
		} else
			break;
	}

	if (errno == ENOSYS)
#endif

1) sleep on EAGAIN and try again (needed to be handled due GRND_NONBLOCK).

2) It also handles ENOSYS (run on kernel without getrandom() although it was built
with libc support), which would be very rare (IMHO getrandom() is on all
architectures, but looking into drivers/char/random.c, it would be on kernels
without CONFIG_SYSCTL).  Then the code also adds fallback to read
/dev/{u,}random in this case. It could be added to nfs-utils, if anybody really
needs it.

> Before we other think the whole thing, the sole purpose of the getrandom()
> call is seeding libc's PRNG with srand() to give every waiter a different
> amount of sleep time upon concurrent database access.
> See wait_for_dbaccess() and handling of SQLITE_LOCKED.

> I'm pretty sure instead of seeding from getrandom() we can also use the current
> time or read a few bytes from /dev/urandom.

Sure. Current time would work everywhere, but I guess getrandom() with syscall
is good enough. Systems which have /dev/urandom also have getrandom() syscall
(thus will work with my current proposal).

> Just make sure that every user of sqlite_plug_init() has a different seed.

Thanks for info.

Kind regards,
Petr

> Thanks,
> //richard

[1] https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/tree/lib/randutils.c
Petr Vorel Oct. 25, 2023, 8:57 p.m. UTC | #3
Hi all,

> 1) sleep on EAGAIN and try again (needed to be handled due GRND_NONBLOCK).

(man getrandom(2))

Kind regards,
Petr
Steve Dickson Nov. 13, 2023, 4:51 p.m. UTC | #4
On 10/25/23 3:46 PM, Petr Vorel wrote:
> Hi,
> 
> motivation to add this is to allow to compile reexport on systems with
> older libc. (getrandom() wrapper is supported on glibc 2.25+ and  musl
> 1.1.20+, uclibc-ng does
> not yet support it).
> 
> getrandom() syscall is supported Linux 3.17+ (old enough to bother with
> a check).
> 
> I also wonder why getrandom() syscall does not called with GRND_NONBLOCK
> flag. Is it ok/needed to block?
> 
> Kind regards,
> Petr
> 
> Petr Vorel (3):
>    reexport/fsidd.c: Remove unused headers
>    support/reexport.c: Remove unused headers
>    support/backend_sqlite.c: Add getrandom() fallback
> 
>   Makefile.am                       |  1 +
>   aclocal/getrandom.m4              | 16 ++++++++++++++++
>   configure.ac                      |  3 +++
>   support/reexport/backend_sqlite.c | 18 +++++++++++++++++-
>   support/reexport/fsidd.c          | 10 ----------
>   support/reexport/reexport.c       |  7 -------
>   6 files changed, 37 insertions(+), 18 deletions(-)
>   create mode 100644 aclocal/getrandom.m4
> 
Committed... (tag: nfs-utils-2-6-4-rc6)

steved.