From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B3054C33CA2 for ; Fri, 10 Jan 2020 12:23:55 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 81B122077C for ; Fri, 10 Jan 2020 12:23:55 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="s91dseio" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 81B122077C Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:To :From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=nPJEvdu82u3TIZ1vQ0XXbkMu4Zpoe4PConkzqweNhNM=; b=s91dseioUWuiIH qhsjuo4gLD2Kb+shvbBaA+ToZMFGyeUKBK8NGWvadeg/OEslFRT8jvwyyUBKxvKqcOHu5sa5F7e0F nCdTXXZjQBX6/vp4CLoPnMuVS9KXO3kMp2s1iME7RE7d6tJRStpndS7l+n3ylYClhgJ82bu375nVb RVHSLIPIe8wirg9nkoMSbZIPkHCp66P3872uiqli1n0ohqQqAUpW7hjSTayEg9+1/M7ONB1ooi9G1 2zafOgZOrGCZ/63EQBfFNkyh8UtB2K4ix0umFWKj3bTxpc+hGOCyBUg+KmcLvt+2EYcCnIg6K/nmR ALHHOP9qDujbDPystIcA==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1iptKN-0006CV-Do; Fri, 10 Jan 2020 12:23:47 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1iptKK-0006Bx-V7 for linux-arm-kernel@lists.infradead.org; Fri, 10 Jan 2020 12:23:46 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 854041063; Fri, 10 Jan 2020 04:23:44 -0800 (PST) Received: from localhost (unknown [10.37.6.21]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 0F2343F534; Fri, 10 Jan 2020 04:23:43 -0800 (PST) From: Mark Brown To: Will Deacon , Catalin Marinas Subject: [PATCH v10 0/3] ARMv8.5-RNG support Date: Fri, 10 Jan 2020 12:23:38 +0000 Message-Id: <20200110122341.8445-1-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-Mailer: git-send-email 2.20.1 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200110_042345_046778_F6399EAC X-CRM114-Status: GOOD ( 11.27 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Mark Brown , Richard Henderson , linux-arm-kernel@lists.infradead.org, Ard Biesheuvel Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org This series is based on Richard Henderson's previous v7, it addresses review comments from that version by splitting the boot and runtime interaction with the core random code so that they are completely separate and adds a new change that uses the v8.5-RNG extension to seed KASLR when ARCH_RANDOM is enabled. v10: - Spell out that we're adding data not entropy from setup_arch() in the commit message for patch 2. v9: - Make another static inline helper for early feature checks. - Add init annotations. - Use xor to add RNDR output to seed for KASLR. Mark Brown (2): arm64: random: Add data to pool from setup_arch() arm64: Use v8.5-RNG entropy for KASLR seed Richard Henderson (1): arm64: Implement archrandom.h for ARMv8.5-RNG Documentation/arm64/cpu-feature-registers.rst | 2 + arch/arm64/Kconfig | 12 +++ arch/arm64/include/asm/archrandom.h | 97 +++++++++++++++++++ arch/arm64/include/asm/cpucaps.h | 3 +- arch/arm64/include/asm/sysreg.h | 4 + arch/arm64/kernel/cpufeature.c | 13 +++ arch/arm64/kernel/kaslr.c | 11 +++ arch/arm64/kernel/setup.c | 2 + 8 files changed, 143 insertions(+), 1 deletion(-) create mode 100644 arch/arm64/include/asm/archrandom.h -- 2.20.1 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel