Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/kern Work around early calls to cprng_strong.
details: https://anonhg.NetBSD.org/src/rev/0d841e379787
branches: trunk
changeset: 971976:0d841e379787
user: riastradh <riastradh%NetBSD.org@localhost>
date: Mon May 11 17:27:48 2020 +0000
description:
Work around early calls to cprng_strong.
The bottleneck here is getting percpu_create to work early enough.
We should really fix that, but for now, this workaround will serve.
Should fix PR port-arm32/55252.
diffstat:
sys/kern/subr_cprng.c | 27 +++++++++++++++++++++++++--
1 files changed, 25 insertions(+), 2 deletions(-)
diffs (62 lines):
diff -r 0e3f23b58a35 -r 0d841e379787 sys/kern/subr_cprng.c
--- a/sys/kern/subr_cprng.c Mon May 11 15:56:15 2020 +0000
+++ b/sys/kern/subr_cprng.c Mon May 11 17:27:48 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: subr_cprng.c,v 1.37 2020/04/30 17:36:06 nia Exp $ */
+/* $NetBSD: subr_cprng.c,v 1.38 2020/05/11 17:27:48 riastradh Exp $ */
/*-
* Copyright (c) 2019 The NetBSD Foundation, Inc.
@@ -52,7 +52,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: subr_cprng.c,v 1.37 2020/04/30 17:36:06 nia Exp $");
+__KERNEL_RCSID(0, "$NetBSD: subr_cprng.c,v 1.38 2020/05/11 17:27:48 riastradh Exp $");
#include <sys/types.h>
#include <sys/cprng.h>
@@ -102,6 +102,7 @@
struct cprng_strong *user_cprng __read_mostly; /* IPL_NONE */
static struct sysctllog *cprng_sysctllog __read_mostly;
+static bool cprng_initialized __read_mostly = false;
void
cprng_init(void)
@@ -128,6 +129,9 @@
CTLFLAG_PERMANENT|CTLFLAG_READONLY, CTLTYPE_INT /*lie*/, "arandom",
SYSCTL_DESCR("Independent uniform random bytes, up to 256 bytes"),
sysctl_kern_arandom, 0, NULL, 0, CTL_KERN, KERN_ARND, CTL_EOL);
+
+ /* Ready to go. */
+ cprng_initialized = true;
}
/*
@@ -274,6 +278,25 @@
int s;
/*
+ * Some device drivers try to use cprng_strong in attach during
+ * autoconf, e.g. to randomly generate MAC addresses, before we
+ * percpu is available -- percpu is not available until after
+ * CPUs have been detected during autoconf. We should make
+ * percpu available sooner, but for now this works around it.
+ */
+ if (__predict_false(!cprng_initialized)) {
+ struct nist_hash_drbg drbg;
+ entropy_extract(seed, sizeof seed, 0);
+ if (__predict_false(nist_hash_drbg_instantiate(&drbg,
+ seed, sizeof seed, NULL, 0, NULL, 0)))
+ panic("nist_hash_drbg_instantiate");
+ if (__predict_false(nist_hash_drbg_generate(&drbg, buf, len,
+ NULL, 0)))
+ panic("nist_hash_drbg_generate");
+ return len;
+ }
+
+ /*
* Verify maximum request length. Caller should really limit
* their requests to 32 bytes to avoid spending much time with
* preemption disabled -- use the 32 bytes to seed a private
Home |
Main Index |
Thread Index |
Old Index