From e081e04ea0761838c3f6e720dde839ccff0ee37d Mon Sep 17 00:00:00 2001 From: Chanho Park Date: Thu, 20 Jul 2017 19:20:09 +0900 Subject: [PATCH 1/4] Use GRND_NONBLOCK of getrandom call Since the getrandom syscall patch(f356fb56fb9e Detect and support syscall(SYS_getrandom, [..]) as well), some arm machine stuck during systemd boot because the dbus uses the expat library and it hangs inside the writeRandomBytes_getrandom function. Without the GRND_NONBLOCK flag, the kernel will wait until the nonblocking_pool has been initialized(See the getrandom syscall of the linux/drivers/char/random.c). To prevent the blocking, we can add the GRND_NONBLOCK flag and omit the comparison of the EAGAIN return. Signed-off-by: Chanho Park --- expat/lib/xmlparse.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/expat/lib/xmlparse.c b/expat/lib/xmlparse.c index 3201b2a8..64ac7025 100644 --- a/expat/lib/xmlparse.c +++ b/expat/lib/xmlparse.c @@ -43,6 +43,9 @@ # include /* syscall */ # include /* SYS_getrandom */ # endif +# if ! defined(GRND_NONBLOCK) +# define GRND_NONBLOCK 0x0001 +# endif /* defined(GRND_NONBLOCK) */ #endif /* defined(HAVE_GETRANDOM) || defined(HAVE_SYSCALL_GETRANDOM) */ #if defined(HAVE_LIBBSD) \ @@ -754,7 +757,7 @@ static int writeRandomBytes_getrandom(void * target, size_t count) { int success = 0; /* full count bytes written? */ size_t bytesWrittenTotal = 0; - const unsigned int getrandomFlags = 0; + const unsigned int getrandomFlags = GRND_NONBLOCK; do { void * const currentTarget = (void*)((char*)target + bytesWrittenTotal); @@ -772,7 +775,7 @@ writeRandomBytes_getrandom(void * target, size_t count) { if (bytesWrittenTotal >= count) success = 1; } - } while (! success && (errno == EINTR || errno == EAGAIN)); + } while (! success && (errno == EINTR)); return success; } From cfd6b138d60ff7c7a7d3f440da8dee7374795098 Mon Sep 17 00:00:00 2001 From: Sebastian Pipping Date: Thu, 20 Jul 2017 21:51:44 +0200 Subject: [PATCH 2/4] xmlparse.c: Rename writeRandomBytes_getrandom to ..._nonblock .. to better communicate the nature of that function --- expat/lib/xmlparse.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/expat/lib/xmlparse.c b/expat/lib/xmlparse.c index 64ac7025..2b2a15bd 100644 --- a/expat/lib/xmlparse.c +++ b/expat/lib/xmlparse.c @@ -754,7 +754,7 @@ static const XML_Char implicitContext[] = { /* Obtain entropy on Linux 3.17+ */ static int -writeRandomBytes_getrandom(void * target, size_t count) { +writeRandomBytes_getrandom_nonblock(void * target, size_t count) { int success = 0; /* full count bytes written? */ size_t bytesWrittenTotal = 0; const unsigned int getrandomFlags = GRND_NONBLOCK; @@ -901,7 +901,7 @@ generate_hash_secret_salt(XML_Parser parser) return ENTROPY_DEBUG("RtlGenRandom", entropy); } #elif defined(HAVE_GETRANDOM) || defined(HAVE_SYSCALL_GETRANDOM) - if (writeRandomBytes_getrandom((void *)&entropy, sizeof(entropy))) { + if (writeRandomBytes_getrandom_nonblock((void *)&entropy, sizeof(entropy))) { return ENTROPY_DEBUG("getrandom", entropy); } #endif From 55839b633fc96fc951ae9e05fd3cf12629cb5c50 Mon Sep 17 00:00:00 2001 From: Sebastian Pipping Date: Wed, 26 Jul 2017 20:40:55 +0200 Subject: [PATCH 3/4] xmlparse.c: Read /dev/urandom if non-blocking getrandom failed This is in line with what recent Python does: 1) Calling getrandom with GRND_NONBLOCK https://github.com/python/cpython/blob/1abcf6700b4da6207fe859de40c6c1bada6b4fec/Python/bootstrap_hash.c#L594 2) Reading /dev/urandom if getrandom failed https://github.com/python/cpython/blob/1abcf6700b4da6207fe859de40c6c1bada6b4fec/Python/bootstrap_hash.c#L503 --- expat/lib/xmlparse.c | 41 ++++++++++++++++++++++++++++++++++++++++- 1 file changed, 40 insertions(+), 1 deletion(-) diff --git a/expat/lib/xmlparse.c b/expat/lib/xmlparse.c index 2b2a15bd..076a0bf7 100644 --- a/expat/lib/xmlparse.c +++ b/expat/lib/xmlparse.c @@ -21,6 +21,8 @@ #include /* gettimeofday() */ #include /* getpid() */ #include /* getpid() */ +#include /* O_RDONLY */ +#include #endif #define XML_BUILDING_EXPAT 1 @@ -36,7 +38,6 @@ #include "siphash.h" #if defined(HAVE_GETRANDOM) || defined(HAVE_SYSCALL_GETRANDOM) -# include # if defined(HAVE_GETRANDOM) # include /* getrandom */ # else @@ -783,6 +784,39 @@ writeRandomBytes_getrandom_nonblock(void * target, size_t count) { #endif /* defined(HAVE_GETRANDOM) || defined(HAVE_SYSCALL_GETRANDOM) */ +#if ! defined(_WIN32) + +/* Extract entropy from /dev/urandom */ +static int +writeRandomBytes_dev_urandom(void * target, size_t count) { + int success = 0; /* full count bytes written? */ + size_t bytesWrittenTotal = 0; + + const int fd = open("/dev/urandom", O_RDONLY); + if (fd < 0) { + return 0; + } + + do { + void * const currentTarget = (void*)((char*)target + bytesWrittenTotal); + const size_t bytesToWrite = count - bytesWrittenTotal; + + const ssize_t bytesWrittenMore = read(fd, currentTarget, bytesToWrite); + + if (bytesWrittenMore > 0) { + bytesWrittenTotal += bytesWrittenMore; + if (bytesWrittenTotal >= count) + success = 1; + } + } while (! success && (errno == EINTR)); + + close(fd); + return success; +} + +#endif /* ! defined(_WIN32) */ + + #if defined(HAVE_ARC4RANDOM) static void @@ -905,6 +939,11 @@ generate_hash_secret_salt(XML_Parser parser) return ENTROPY_DEBUG("getrandom", entropy); } #endif +#if ! defined(_WIN32) + if (writeRandomBytes_dev_urandom((void *)&entropy, sizeof(entropy))) { + return ENTROPY_DEBUG("/dev/urandom", entropy); + } +#endif /* ! defined(_WIN32) */ /* .. and self-made low quality for backup: */ /* Process ID is 0 bits entropy if attacker has local access */ From e14ac979071adf0e049b104cadafd1074cfd4f74 Mon Sep 17 00:00:00 2001 From: Sebastian Pipping Date: Thu, 20 Jul 2017 21:56:23 +0200 Subject: [PATCH 4/4] Changes: Document changes to call of getrandom --- expat/Changes | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/expat/Changes b/expat/Changes index 9c00608d..1715e780 100644 --- a/expat/Changes +++ b/expat/Changes @@ -12,14 +12,19 @@ Release 2.2.? ???????????????? Other changes: Increase code coverage + #91 Linux: Allow getrandom to fail if nonblocking pool has not + yet been initialized and read /dev/urandom then, instead. + This is in line with what recent Python does. #23 Test suite: Fix memory leaks Rely on macro HAVE_ARC4RANDOM_BUF (rather than __CloudABI__) for CloudABI #100 Fix use of SIPHASH_MAIN in siphash.h Special thanks to: + Chanho Park Pascal Cuoq Rhodri James + Simon McVittie Vadim Zeitlin Viktor Szakats and