From owner-freebsd-current@freebsd.org Wed May 8 16:21:24 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 45A8B158C58D for ; Wed, 8 May 2019 16:21:24 +0000 (UTC) (envelope-from ian@freebsd.org) Received: from outbound1a.eu.mailhop.org (outbound1a.eu.mailhop.org [52.58.109.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 34C3F83A89 for ; Wed, 8 May 2019 16:21:23 +0000 (UTC) (envelope-from ian@freebsd.org) ARC-Seal: i=1; a=rsa-sha256; t=1557332475; cv=none; d=outbound.mailhop.org; s=arc-outbound20181012; b=pBsOSkAiXI+TErzh6bslQypyFCG1BmHRfCqr5y6NAZ46Z5+dP83fbbuLbJjwhzEy2+u3yJuOMZnD8 JnDWbGjOcG5cQEArZsV7ReAZ8DAsezCOrmNcYmkJfDRAQ6Hz7U5QoGOCKfqizAIqBdZ3elc5j4Nv79 5SpehHnmQZEdsEuJrq5/lrDyrmC61rH6Li+5SpS0dNpqoN3+tXhBBNFu1xX7k6NuV2nCe1b0GwwOQK i8sPRA2p++Qfwqe78Y84XE7zUXpPAZR5kSj4BaRqovXtsHkUEXc9rLJWZAJzAYyzQ9IBGmXMwdYRGC TANSUugPQKrY7WXm8BJTuUJkKZ38Pxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=arc-outbound20181012; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:to:from:subject:message-id:dkim-signature:from; bh=R5BN7MF/LrIxyhHWkUh0kSFC3a3ZrxcWh4o9TO0Ww+E=; b=LI9MpRop4UwyzOSTITYR8toUJyxO87p5TvhrFNl69SeO9dtZcBwT80KnpLFx0yUoQnTE/hfllGju3 kzaZe7S8aM0DkVr5pI7w2W9Uzk+943usHuvfOnl0tHWF1KyDjSamVPeCyNabL/ZEYvtDpQ+9xrxzQ5 Nnvdc6PedhWiwU0mAB9oqpvTuLsW19oDF3AQQKs1Oy1bVtDt+bi+gCAloRxZclzesziNhNT4SqMRZe IVezIEJju72TeWpqsa68ubjVcT17I5hSR+4j1pWyumLGj9jvmE5KnOvPgeOOE8OEMVgbi6eCf3LDOR MONYaKMB0++73XTdCAI9IAoTw2LguUw== ARC-Authentication-Results: i=1; outbound2.eu.mailhop.org; spf=softfail smtp.mailfrom=freebsd.org smtp.remote-ip=67.177.211.60; dmarc=none header.from=freebsd.org; arc=none header.oldest-pass=0; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=dkim-high; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:to:from:subject:message-id:from; bh=R5BN7MF/LrIxyhHWkUh0kSFC3a3ZrxcWh4o9TO0Ww+E=; b=nHLAoKiykqENoesGTC/RYShAjH2AZybitwoR/f4En2jkknPs3pkjONlKDQkKhza3WfsnnGeetSkOs zf/UKL5EQy1s9yMRaDkfogiZFi2+aTrSISvLf2IokZCtWuFmGwLzX6LI8uB6rprNm63F+cAoU2VN9q RQqFiDpH6M6hN6fSOMNeUUXi8MwYNPzVhTBVJA6KS1H09LGf+qkS906JETRE3qFknzO6nK75XWkbVu so+3falmFApPcRnnj4QeRgigELv6dzu7EKE0TQ5JEH4zLduJveBnDKMGRkshKjvVy7V5+/vgv790+D R6ArEkmrBMd43ErJbehiFUS/h7+uyDA== X-MHO-RoutePath: aGlwcGll X-MHO-User: 4b4f8441-71ad-11e9-803b-31925da7267c X-Report-Abuse-To: https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information X-Originating-IP: 67.177.211.60 X-Mail-Handler: DuoCircle Outbound SMTP Received: from ilsoft.org (unknown [67.177.211.60]) by outbound2.eu.mailhop.org (Halon) with ESMTPSA id 4b4f8441-71ad-11e9-803b-31925da7267c; Wed, 08 May 2019 16:21:13 +0000 (UTC) Received: from rev (rev [172.22.42.240]) by ilsoft.org (8.15.2/8.15.2) with ESMTP id x48GLBoc042940; Wed, 8 May 2019 10:21:11 -0600 (MDT) (envelope-from ian@freebsd.org) Message-ID: <1f637a112609b96cd64ff52b06fc99b2a389fda2.camel@freebsd.org> Subject: Re: random_sources_feed: rs_read for hardware device 'Intel Secure Key RNG' returned no entropy. From: Ian Lepore To: "Andrey V. Elsukov" , freebsd-current Date: Wed, 08 May 2019 10:21:11 -0600 In-Reply-To: <2c1eceb4-08a5-b633-2ce2-c711610db1cb@yandex.ru> References: <2c1eceb4-08a5-b633-2ce2-c711610db1cb@yandex.ru> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 FreeBSD GNOME Team Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 34C3F83A89 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.985,0]; ASN(0.00)[asn:16509, ipnet:52.58.0.0/15, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 May 2019 16:21:24 -0000 On Wed, 2019-05-08 at 19:13 +0300, Andrey V. Elsukov wrote: > Hi, > > today I updated one of my test machines and discovered that message > from > the subject periodically printed in the console. > > FreeBSD 13.0-CURRENT r347327=4f47587(svn_head) GENERIC-NODEBUG amd64 > FreeBSD clang version 8.0.0 (tags/RELEASE_800/final 356365) (based on > LLVM 8.0.0) > VT(vga): resolution 640x480 > CPU: Intel(R) Xeon(R) CPU E5-2660 v4@ 2.00GHz (2000.04-MHz K8-class > CPU) > ... > real memory = 68719476736 (65536 MB) > avail memory = 66722340864 (63631 MB) > Event timer "LAPIC" quality 600 > ACPI APIC Table: > FreeBSD/SMP: Multiprocessor System Detected: 28 CPUs > FreeBSD/SMP: 2 package(s) x 14 core(s) > ... > > % grep -c random /var/run/dmesg.boot > 606 > > % grep random /var/run/dmesg.boot | head -10 > __stack_chk_init: WARNING: Initializing stack protection with non- > random > cookies! > random: entropy device external interface > random: registering fast source Intel Secure Key RNG > random: fast provider: "Intel Secure Key RNG" > arc4random: WARNING: initial seeding bypassed the cryptographic > random > device because it was not yet seeded and the knob > 'bypass_before_seeding' was enabled. > random_sources_feed: rs_read for hardware device 'Intel Secure Key > RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key > RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key > RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key > RNG' > returned no entropy. > random_sources_feed: rs_read for hardware device 'Intel Secure Key > RNG' > returned no entropy. > > % sysctl -a | grep -v random_sources_feed | grep rand > kern.fallback_elf_brand: -1 > device random > device rdrand_rng > kern.randompid: 0 > kern.elf32.fallback_brand: -1 > kern.elf64.fallback_brand: -1 > kern.random.fortuna.minpoolsize: 64 > kern.random.harvest.mask_symbolic: > PURE_RDRAND,[UMA],[FS_ATIME],SWI,INTERRUPT,NET_NG,[NET_ETHER],NET_TUN > ,MOUSE,KEYBOARD,ATTACH,CACHED > kern.random.harvest.mask_bin: 000000010000000111011111 > kern.random.harvest.mask: 66015 > kern.random.use_chacha20_cipher: 0 > kern.random.block_seeded_status: 0 > kern.random.random_sources: 'Intel Secure Key RNG' > kern.random.initial_seeding.disable_bypass_warnings: 0 > kern.random.initial_seeding.arc4random_bypassed_before_seeding: 1 > kern.random.initial_seeding.read_random_bypassed_before_seeding: 0 > kern.random.initial_seeding.bypass_before_seeding: 1 > net.inet.ip.portrange.randomtime: 45 > net.inet.ip.portrange.randomcps: 10 > net.inet.ip.portrange.randomized: 1 > net.inet.ip.random_id_total: 0 > net.inet.ip.random_id_collisions: 0 > net.inet.ip.random_id_period: 0 > net.inet.ip.random_id: 0 > net.key.int_random: 60 > debug.fail_point.status_fill_kinfo_vnode__random_path: off > debug.fail_point.fill_kinfo_vnode__random_path: off > debug.fail_point.status_random_fortuna_pre_read: off > debug.fail_point.random_fortuna_pre_read: off > security.stack_protect.permit_nonrandom_cookies: 1 > Fixed in r347329. --Ian