Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

entropy adjustments: check return value of rdrand/rdseed (and retry up to 10 times), cope with AMD ryzen 3000 bug #17

Merged
merged 4 commits into from
Feb 27, 2020
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 20 additions & 8 deletions entropy/mirage_crypto_entropy.ml
Original file line number Diff line number Diff line change
Expand Up @@ -29,10 +29,11 @@

module Cpu_native = struct

external cycles : unit -> int = "caml_cycle_counter" [@@noalloc]
external random : unit -> int = "caml_cpu_random" [@@noalloc]
external rng_type : unit -> int = "caml_cpu_rng_type" [@@noalloc]
external detect : unit -> unit = "caml_entropy_detect"
external cycles : unit -> int = "caml_cycle_counter" [@@noalloc]
external unchecked_random : unit -> int = "caml_cpu_unchecked_random" [@@noalloc]
external checked_random : unit -> int = "caml_cpu_checked_random" [@@noalloc]
external rng_type : unit -> int = "caml_cpu_rng_type" [@@noalloc]
external detect : unit -> unit = "caml_entropy_detect"

let () = detect ()

Expand Down Expand Up @@ -74,7 +75,7 @@ let sources () =
* See Whirlwind RNG:
* http://www.ieee-security.org/TC/SP2014/papers/Not-So-RandomNumbersinVirtualizedLinuxandtheWhirlwindRNG.pdf
*)
let bootstrap f =
let whirlwind_bootstrap f =
let outer = 100
and inner_max = 1024
and a = ref 0
Expand All @@ -98,7 +99,7 @@ let interrupt_hook () =
| Some _ ->
let buf = Cstruct.create 12 in fun () ->
let a = Cpu_native.cycles ()
and b = Cpu_native.random () in
and b = Cpu_native.unchecked_random () in
Cstruct.LE.set_uint32 buf 0 (Int32.of_int a) ;
Cstruct.LE.set_uint64 buf 4 (Int64.of_int b) ;
buf
Expand All @@ -111,7 +112,18 @@ let interrupt_hook () =
*
* Compile-time entropy. A function returning it could go into `t.inits`.
*)
let bootstrap_functions = [ bootstrap ]

let checked_rdrand_rdseed f =
let cs = Cstruct.create 8 in
let random = Cpu_native.checked_random () in
Cstruct.LE.set_uint64 cs 0 (Int64.of_int random);
f cs;
Lwt.return_unit

let bootstrap_functions () =
match Cpu_native.cpu_rng with
| None -> [ whirlwind_bootstrap ; whirlwind_bootstrap ; whirlwind_bootstrap ]
| Some _ -> [ checked_rdrand_rdseed ; checked_rdrand_rdseed ; whirlwind_bootstrap ; checked_rdrand_rdseed ; checked_rdrand_rdseed ]

let running = ref false

Expand All @@ -125,7 +137,7 @@ let initialize (type a) ?g (rng : a Mirage_crypto_rng.generator) =
let `Acc handler = Mirage_crypto_rng.accumulate (Some rng) in
Lwt_list.iteri_p
(fun i boot -> boot (handler ~source:i))
bootstrap_functions >|= fun () ->
(bootstrap_functions ()) >|= fun () ->
let hook = interrupt_hook () in
Mirage_runtime.at_enter_iter (fun () ->
let e = hook () in
Expand Down
62 changes: 51 additions & 11 deletions src/native/entropy_cpu_stubs.c
Original file line number Diff line number Diff line change
Expand Up @@ -72,17 +72,24 @@ static void detect () {

if (sig == signature_INTEL_ebx || sig == signature_AMD_ebx) {
__cpuid (1, eax, ebx, ecx, edx);
if (ecx & bit_RDRND) {
/* AMD Ryzen 3000 bug where RDRAND always returns 0xFFFFFFFF */
if (ecx & bit_RDRND)
/* AMD Ryzen 3000 bug where RDRAND always returns -1
https://arstechnica.com/gadgets/2019/10/how-a-months-old-amd-microcode-bug-destroyed-my-weekend/ */
for (int i = 0; i < RETRIES; i++)
if (_rdrand_step(&r) == 1 && r != (random_t) (-1)) {
__cpu_rng = RNG_RDRAND;
break;
}
}
if (max > 7) {
__cpuid_count (7, 0, eax, ebx, ecx, edx);
if (ebx & bit_RDSEED) __cpu_rng = RNG_RDSEED;
if (ebx & bit_RDSEED)
/* RDSEED could return -1 as well, thus we test it here as well
https://www.reddit.com/r/Amd/comments/cmza34/agesa_1003_abb_fixes_rdrandrdseed/ */
for (int i = 0; i < RETRIES; i++)
if (_rdseed_step(&r) == 1 && r != (random_t) (-1)) {
__cpu_rng = RNG_RDSEED;
break;
}
}
}
#endif
Expand All @@ -98,17 +105,50 @@ CAMLprim value caml_cycle_counter (value __unused(unit)) {
#endif
}

CAMLprim value caml_cpu_random (value __unused(unit)) {
CAMLprim value caml_cpu_checked_random (value __unused(unit)) {
#if defined (__x86__)
random_t r = 0;
for (int i = 0; i < RETRIES; i++) {
if (__cpu_rng == RNG_RDSEED) {
if (_rdseed_step (&r) == 1) return Val_long (r);
} else if (__cpu_rng == RNG_RDRAND) {
if (_rdrand_step (&r) == 1) return Val_long (r);
}
int ok = 0;
int i = RETRIES;
switch (__cpu_rng) {
case RNG_RDSEED:
do { ok = _rdseed_step (&r); } while ( !(ok | !--i) );
break;
case RNG_RDRAND:
do { ok = _rdrand_step (&r); } while ( !(ok | !--i) );
break;
case RNG_NONE:
break;
}
return Val_long(r);
#else
/* ARM: CPU-assisted randomness here. */
cfcs marked this conversation as resolved.
Show resolved Hide resolved
return Val_long (0);
#endif
}

CAMLprim value caml_cpu_unchecked_random (value __unused(unit)) {
#if defined (__x86__)
random_t r = 0;
/* rdrand/rdseed may fail (and return CR = 0) if insufficient entropy is
available (or the hardware DRNG is in the middle of reseeding).

we could handle these by retrying in a loop - which would be
computationally expensive, but since this code is run whenever the Lwt
event loop is entered, and only used to feed entropy into the pool, it is
fine to add not-so-random entropy.
*/
switch (__cpu_rng) {
case RNG_RDSEED:
_rdseed_step (&r);
break;
case RNG_RDRAND:
_rdrand_step (&r);
break;
case RNG_NONE:
break;
}
return Val_long (r);
#else
hannesm marked this conversation as resolved.
Show resolved Hide resolved
/* ARM: CPU-assisted randomness here. */
return Val_long (0);
Expand Down