Re: [PATCH, RFC] random: introduce getrandom(2) system call
From: Pavel Machek
Date: Wed Jul 30 2014 - 08:50:48 EST
On Wed 2014-07-23 14:10:16, Hannes Frederic Sowa wrote:
>
>
> On Wed, Jul 23, 2014, at 13:52, George Spelvin wrote:
> > I keep wishing for a more general solution. For example, some way to
> > have a "spare" extra fd that could be accessed with a special O_NOFAIL
> > flag.
> >
> > That would allow any number of library functions to not fail, such as
> > logging from nasty corner cases.
> >
> > But you'd have to provide one per thread, and block non-fatal signals
> > while it was open, so you don't get reentrancy problems. Ick.
> >
> >
> > This overly-specialized system call (and worse yet, a blocking
> > system call that you can't put into a poll() loop) just feels ugly
> > to me. Is it *absolutely* necessary?
>
> One point that often came up besides fd exhaustion is missing
> /dev/u?random device nodes in chroot environments.
>From the maillist discussion, it seems you sometimes _want_
/dev/random not to be present.
For example you want to trace exactly the same path through malware
every time.
> > For example, how about simply making getentropy() a library function that
> > aborts if it can't open /dev/urandom? If you're suffering fd exhaustion,
> > you're being DoSed already.
>
> Maybe applications want to mitigate fd exhaustion.
Dunno. Will we add special read_passwd() syscall that reads just
/etc/passwd, to allow uid<->name resolution without available FDs?
I like the library function suggestion, this should not need a new
syscall.
And btw -- compatibility with getentropy() is _not_ going to be easy,
if they have different blocking / partial read / signals policy.
Pavel
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/