[LTP] [PATCH] syscalls/getrandom02: lower bufsize if low on entropy

Jan Stancek jstancek@redhat.com
Wed Feb 5 15:32:11 CET 2020



----- Original Message -----
> >
> > @@ -37,11 +39,17 @@ static int check_content(unsigned char *buf, int nb)
> >  static void verify_getrandom(unsigned int n)
> >  {
> >         unsigned char buf[256];
> > +       int bufsize = 64, entropy_avail;
> >
> 
> I'm not sure why here initialize bufsize as 64? can you explain more?

That would be the default, unless we know we have enough entropy.

I picked 64 as it matches 'random_read_wakeup_bits'. Assuming we can get
1bit/s entropy, then potentially worst case of waiting 4x for 64bit,
it should still fit within default 300 seconds.

But it's also rule of thumb, because it's smaller.

> 
> 
> >
> > -       memset(buf, 0, sizeof(buf));
> > +       if (access(PROC_ENTROPY_AVAIL, F_OK) == 0) {
> > +               SAFE_FILE_SCANF(PROC_ENTROPY_AVAIL, "%d", &entropy_avail);
> > +               if (entropy_avail > 256)
> > +                       bufsize = sizeof(buf);
> > +       }
> >
> > +       memset(buf, 0, sizeof(buf));
> >         do {
> > -               TEST(tst_syscall(__NR_getrandom, buf, sizeof(buf),
> > modes[n]));
> > +               TEST(tst_syscall(__NR_getrandom, buf, bufsize, modes[n]));
> >         } while ((modes[n] & GRND_NONBLOCK) && TST_RET == -1
> >                   && TST_ERR == EAGAIN);
> >
> > --
> > 2.18.1
> >
> >
> > --
> > Mailing list info: https://lists.linux.it/listinfo/ltp
> >
> >
> 
> --
> Regards,
> Li Wang
> 



More information about the ltp mailing list