From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.0 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE, SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B5C2FC33CA2 for ; Fri, 10 Jan 2020 12:24:25 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 6AB872077C for ; Fri, 10 Jan 2020 12:24:25 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="bvzHgG6B" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6AB872077C Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=G5VSFrT0L4j0I1MI2SXUvjM24+npXcUpKgaMa2DStPs=; b=bvzHgG6BdTw+J1 VYQUV5BwJl2fuh7X/Vl6QKXF/QAOKE/ProxoC4858B5+JRz8pugYkU4acYtQ1jH82YlW3MqmAi7a5 8LJTCSir4PEVU8Mo8iDK+U9vAR26JZ16tFf45SsAKkWgC9/RhJ3E0EXvC82UzwB2RxY1crWk2y1ne +qDHtJqp1RoWpGB7xeu+4nhQ9Ge43QG5aI6wca8AZZmHYiaLNl4wx9X3VigEqU2fayxI9fIIgo/q5 SCwZd64vLROeQJNmTCH37KgdUMj4fimfjT51KsOUJJsPZ4jLmDihLRCQcW9VfiCfEiEBz+f3yPOeG sqirG+znI72PYjCGdUvQ==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1iptKr-0006dO-V1; Fri, 10 Jan 2020 12:24:17 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1iptKP-0006FN-Lz for linux-arm-kernel@lists.infradead.org; Fri, 10 Jan 2020 12:23:51 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 260661396; Fri, 10 Jan 2020 04:23:49 -0800 (PST) Received: from localhost (unknown [10.37.6.21]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3DEA13F534; Fri, 10 Jan 2020 04:23:48 -0800 (PST) From: Mark Brown To: Will Deacon , Catalin Marinas Subject: [PATCH v10 2/3] arm64: random: Add data to pool from setup_arch() Date: Fri, 10 Jan 2020 12:23:40 +0000 Message-Id: <20200110122341.8445-3-broonie@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200110122341.8445-1-broonie@kernel.org> References: <20200110122341.8445-1-broonie@kernel.org> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200110_042349_834292_FD8ED2B0 X-CRM114-Status: GOOD ( 18.90 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Mark Brown , Richard Henderson , linux-arm-kernel@lists.infradead.org, Ard Biesheuvel Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org Since the arm64 ARCH_RANDOM implementation is not available until cpufeature has determined the system capabilities it can't be used by the generic random code to initialize the entropy pool for early use. Instead explicitly add some data to the pool from setup_arch() if the boot CPU supports v8.5-RNG, this is the point recommended by the generic code. Note that we are only adding data here, it will be mixed into the pool but won't be credited as entropy. There are currently no suitable interfaces for that at present - extending the random code to provide those will be done as a future step. Providing data is better than not doing so as it will still provide an increase in variation in the output from the random code and there will be no impact on the rate at which entropy is credited compared to what we have without this patch. Signed-off-by: Mark Brown --- arch/arm64/include/asm/archrandom.h | 30 +++++++++++++++++++++++++++++ arch/arm64/kernel/setup.c | 2 ++ 2 files changed, 32 insertions(+) diff --git a/arch/arm64/include/asm/archrandom.h b/arch/arm64/include/asm/archrandom.h index 5ea5a1ce5a5f..2eb1db1f0bdf 100644 --- a/arch/arm64/include/asm/archrandom.h +++ b/arch/arm64/include/asm/archrandom.h @@ -59,9 +59,39 @@ static inline bool __must_check arch_get_random_seed_int(unsigned int *v) return ok; } +static inline bool __init __early_cpu_has_rndr(void) +{ + /* Open code as we run prior to the first call to cpufeature. */ + unsigned long ftr = read_sysreg_s(SYS_ID_AA64ISAR0_EL1); + return (ftr >> ID_AA64ISAR0_RNDR_SHIFT) & 0xf; +} + +/* + * Our ARCH_RANDOM implementation does not function until relatively + * late in the boot when cpufeature has detertmined system + * capabilities so the core code can't use arch_get_random*() to + * initialize, instead we call this function to inject data from + * setup_arch() if the boot CPU supports v8.5-RNG. + */ +static inline void __init arm64_add_early_rndr_entropy(void) +{ + unsigned long val; + int i; + + if (!__early_cpu_has_rndr()) + return; + + /* Add multiple values to mirror the generic code. */ + for (i = 0; i < 16; i++) + if (__arm64_rndr(&val)) + add_device_randomness(&val, sizeof(val)); +} + #else static inline bool __arm64_rndr(unsigned long *v) { return false; } +static inline bool __init __early_cpu_has_rndr(void) { return false; } +static inline void __init arm64_add_early_rndr_entropy(void) { } #endif /* CONFIG_ARCH_RANDOM */ #endif /* _ASM_ARCHRANDOM_H */ diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c index 56f664561754..170842965a32 100644 --- a/arch/arm64/kernel/setup.c +++ b/arch/arm64/kernel/setup.c @@ -344,6 +344,8 @@ void __init setup_arch(char **cmdline_p) /* Init percpu seeds for random tags after cpus are set up. */ kasan_init_tags(); + arm64_add_early_rndr_entropy(); + #ifdef CONFIG_ARM64_SW_TTBR0_PAN /* * Make sure init_thread_info.ttbr0 always generates translation -- 2.20.1 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel