Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp443393yba; Thu, 16 May 2019 03:32:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqzkT/S6Y04pl36AVtlqZTk/IKQXDmSHIymzSSW8ow5R3UuG6kkqaWg+OQZaqE/NqcTd1m5z X-Received: by 2002:aa7:86c3:: with SMTP id h3mr51551196pfo.169.1558002747659; Thu, 16 May 2019 03:32:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558002747; cv=none; d=google.com; s=arc-20160816; b=QkjTaydThEsSuYWmSyA/DsRhSfli8MRc0kyHnr6clMpUo2276mjLbx3DA6EZDDPUcH jDftA4fKPhPg6EHgql8skV50smVb5aYtBPHsWwp6f1PN9c7zvE+XdqpQmtIhci0jvf5X SgAjcp9yDjJpdgQaCavxHA7qfCkT9Vfi3jldqEVELJOQNbBRHqPgBOkZFE1F12hgpdAT NPNZGUK3cHMvYtZDtDfzdutt0+mTp7xP0LGqihffu7vJMQQbU2rFwzPXWD/IbCm4TiDe SuP7hs8RQ4sKPEKnb+X5x1DlOW8Xz8tSEN7vt/+RIIRNP2TN3A62Sz/CfBYrotvZMeOG vNDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MnHxDH7/gQC7S9Ex4Yrjn2JKssZnvEJdzim34WmQ+q8=; b=dR4sZ4TjlVRsLIFBCKt2FBTcV0BBpHL2DhFGzM5SgjyV3F5pDzWuUWjkA1zEytOpRU GdxmQcWF00ItPzfXZEgWi0tZT9LORUHmTFOE2gNWzS6EwL2f2JVpC28Ky+U7GGUBm7DY 6Hx5DE6xYcy91HaGwSOaZ7YMcvS1lgGQ0S6/Xtwq2jJsv4YZRVGgZPGxjzn5p6lxd6Ov LN3dHVBEaIyOcFSsRsGSe87UZQEI3VggJoOWx6irS1+MkzpPZqRjRFB7c70YoxOUttaC iKb1Gyrn+mj/bXpttW6s342b8QlHeVIZrn1ACApR60+PHL7l3bLsHflf5Uxe+59Gychc CXgA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Q7r9C3C+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t1si4693650pgh.406.2019.05.16.03.32.11; Thu, 16 May 2019 03:32:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Q7r9C3C+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727109AbfEPK27 (ORCPT + 99 others); Thu, 16 May 2019 06:28:59 -0400 Received: from mail-pf1-f195.google.com ([209.85.210.195]:43337 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726980AbfEPK26 (ORCPT ); Thu, 16 May 2019 06:28:58 -0400 Received: by mail-pf1-f195.google.com with SMTP id c6so1611455pfa.10 for ; Thu, 16 May 2019 03:28:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=MnHxDH7/gQC7S9Ex4Yrjn2JKssZnvEJdzim34WmQ+q8=; b=Q7r9C3C+1xp3K+F79f6HS9pMPjdOXBJlhNlNH1sNo8Gf28sq+UxJPIbw2WS+1yYLw6 yZqgEDWASIraQfHYA0liC/dDovipJoQ9hzXfSk4dtix+XDB4gYK6M8Y3wfvVbl2uYTjW uf+2pUVkJmyMR0yFOwkMZUe0h831zzwbPUIRs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=MnHxDH7/gQC7S9Ex4Yrjn2JKssZnvEJdzim34WmQ+q8=; b=FLQfnjak7ZiN5R3y+u8/5CAZZFVEFLrkpZQ+NOtI4n7i3ggrCPHnaYl65i1dKZsabh XSfJCLD3Yrxq0K6X6Z/2L5YuPc6RnqZ68IP1eDx0hCLEP+09xdiQaQ1r45mOWEOuulKi XG7UT+xwjlXL6Eoi6PcUIqJJtdeEI9K18dLsfgkjn0FlTbSgSfLHHxaF1euJRBSsC1wx vJH5WUv4820rkUlEYGPB3us36EWLqrqOeWNeaCYzQgVPpFWgzQWGxeFPgPn1P92Zu8tM Xh+35DstGGXK18RG5aKlUdjFuQyTMSIy4p5kkZ3Fz3SnebV0lazwi/pYQl8ZAXsu8Ry3 HQTg== X-Gm-Message-State: APjAAAWVDIZqujOiJD55vkkrJ/feJKrAGnMcXBKyRc66yvEKrS/6CtDw QmEq4zApKRldyTS2ZjLdp1mfRw== X-Received: by 2002:a65:5c82:: with SMTP id a2mr50043330pgt.378.1558002537858; Thu, 16 May 2019 03:28:57 -0700 (PDT) Received: from hsinyi-z840.tpe.corp.google.com ([2401:fa00:1:10:b852:bd51:9305:4261]) by smtp.gmail.com with ESMTPSA id h123sm9338048pfe.80.2019.05.16.03.28.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 16 May 2019 03:28:57 -0700 (PDT) From: Hsin-Yi Wang To: linux-arm-kernel@lists.infradead.org Cc: Rob Herring , devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, Frank Rowand , Catalin Marinas , Will Deacon , Andrew Morton , Mike Rapoport , Ard Biesheuvel , Miles Chen , Hsin-Yi Wang , James Morse , Andrew Murray , Mark Rutland , Chintan Pandya , Jun Yao , Yu Zhao , Robin Murphy , Laura Abbott , Stephen Boyd , Kees Cook Subject: [PATCH v3 3/3] fdt: add support for rng-seed Date: Thu, 16 May 2019 18:28:17 +0800 Message-Id: <20190516102817.188519-3-hsinyi@chromium.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190516102817.188519-1-hsinyi@chromium.org> References: <20190516102817.188519-1-hsinyi@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introducing a chosen node, rng-seed, which is an entropy that can be passed to kernel called very early to increase initial device randomness. Bootloader should provide this entropy and the value is read from /chosen/rng-seed in DT. Signed-off-by: Hsin-Yi Wang --- change v2->v3: 1. use arch hook for fdt pgprot change 2. handle CONFIG_KEXEC --- Documentation/devicetree/bindings/chosen.txt | 14 +++++ drivers/of/fdt.c | 55 ++++++++++++++++++++ 2 files changed, 69 insertions(+) diff --git a/Documentation/devicetree/bindings/chosen.txt b/Documentation/devicetree/bindings/chosen.txt index 45e79172a646..fef5c82672dc 100644 --- a/Documentation/devicetree/bindings/chosen.txt +++ b/Documentation/devicetree/bindings/chosen.txt @@ -28,6 +28,20 @@ mode) when EFI_RNG_PROTOCOL is supported, it will be overwritten by the Linux EFI stub (which will populate the property itself, using EFI_RNG_PROTOCOL). +rng-seed +----------- + +This property served as an entropy to add device randomness. It is parsed +as a byte array, e.g. + +/ { + chosen { + rng-seed = <0x31 0x95 0x1b 0x3c 0xc9 0xfa 0xb3 ...>; + }; +}; + +This random value should be provided by bootloader. + stdout-path ----------- diff --git a/drivers/of/fdt.c b/drivers/of/fdt.c index e84971d1e9ea..e9862657268d 100644 --- a/drivers/of/fdt.c +++ b/drivers/of/fdt.c @@ -10,6 +10,7 @@ #include #include +#include #include #include #include @@ -24,6 +25,8 @@ #include #include #include +#include +#include #include /* for COMMAND_LINE_SIZE */ #include @@ -1087,11 +1090,14 @@ int __init early_init_dt_scan_memory(unsigned long node, const char *uname, return 0; } +int rng_seed_size; + int __init early_init_dt_scan_chosen(unsigned long node, const char *uname, int depth, void *data) { int l; const char *p; + const void *rng_seed; pr_debug("search \"chosen\", depth: %d, uname: %s\n", depth, uname); @@ -1126,6 +1132,16 @@ int __init early_init_dt_scan_chosen(unsigned long node, const char *uname, pr_debug("Command line is: %s\n", (char*)data); + rng_seed = of_get_flat_dt_prop(node, "rng-seed", &rng_seed_size); + if (rng_seed && rng_seed_size > 0) { + add_device_randomness(rng_seed, rng_seed_size); + + /* try to clear seed so it won't be found. */ + update_fdt_pgprot(PAGE_KERNEL); + fdt_delprop(initial_boot_params, node, "rng-seed"); + update_fdt_pgprot(PAGE_KERNEL_RO); + } + /* break now */ return 1; } @@ -1327,4 +1343,43 @@ static int __init of_fdt_raw_init(void) late_initcall(of_fdt_raw_init); #endif +#ifdef CONFIG_KEXEC +static int update_fdt_random_seed(struct notifier_block *nb, + unsigned long code, void *unused) +{ + int node; + void *rng_seed; + + if (!kexec_in_progress || !rng_seed_size) + return NOTIFY_DONE; + + node = fdt_path_offset(initial_boot_params, "/chosen"); + if (node < 0) + node = fdt_path_offset(initial_boot_params, "/chosen@0"); + if (node < 0) + return NOTIFY_DONE; + + rng_seed = kmalloc(rng_seed_size, GFP_ATOMIC); + get_random_bytes(rng_seed, rng_seed_size); + + update_fdt_pgprot(PAGE_KERNEL); + fdt_setprop(initial_boot_params, node, "rng-seed", rng_seed, + rng_seed_size); + + kfree(rng_seed); + + return NOTIFY_DONE; +} + +static struct notifier_block fdt_random_seed_nb = { + .notifier_call = update_fdt_random_seed, +}; + +static int register_update_fdt_random_seed(void) +{ + return register_reboot_notifier(&fdt_random_seed_nb); +} +late_initcall(register_update_fdt_random_seed); +#endif + #endif /* CONFIG_OF_EARLY_FLATTREE */ -- 2.20.1