Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2494154ybb; Mon, 30 Mar 2020 07:16:02 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtmEaq7lk9E2UVCbsgC9BxTkEwucM/VFvKJHF8ose9GlckNBih/LsQCo0LubsUEzhgHRJYf X-Received: by 2002:a9d:82a:: with SMTP id 39mr9213491oty.82.1585577762466; Mon, 30 Mar 2020 07:16:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585577762; cv=none; d=google.com; s=arc-20160816; b=u/CnUix5dsIHH+6N4Uku0ITeuYVCBiAn18i7JK2x0vN1rYUjGdTmexcu0mh1uIDS0n KMMAHxziTu48VCkzq1ZTA2BMuy5vSuxxvMwnzoSPOijQXX71WmmGT0tE/xRFp0J4ccrp qk3mk9iB1xQrFjjyNZ9I01ImiiPoUEdYLL5VxwitGb1m+r9AuhGav1a3McNqlb/ktbjt kSs0KD55FaVocSKC+yKlnxTAro8qQBrBC3DgZFv3z/ZHtkVPWF/KX5Zr8Dlh8stKlLT2 ovrIZd+Pskj9hV+QUaLL39bJSa/PQ9cRKa/W0ErpnEdA0JV/nRRP5BHkO4QRpX3pV9NK uCRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=HLkLfdU+SPGYbqEAiQoYrl7XWidUnTd1ph8cyzMtzNg=; b=pso5/IxE0bdSH6cjM96E6VovkPaxZXgJVsENKzkQ0FpGx9D6QCEoOmlu8ooeS+blQr rumNZavhCZy1v0exSjc00C5iotK2ZTghM6v5WW9ZIxm8Q1mHX+AfgnJuB+VBsz5G9HiR NghBSXEHCE0VDN+Rydt8rQL8RX8aOJxGc8oNIUh1WySsnQn2RjxZzHhFmpshTvwqOXlV tpC51+XGA2lwSAfzaMakMHKKMXA463c5+z0vpnM5d6a3TmGML+9qQWsLcW+edrhE1jSl P8bsMjCpE6e8xBF8GyEF843jVlWQbWL7eyqY6u6kNATQmm+SVNZtTUQNTD/TyMYbdp+s pcgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e17si6319106oti.82.2020.03.30.07.15.47; Mon, 30 Mar 2020 07:16:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728630AbgC3OOg (ORCPT + 99 others); Mon, 30 Mar 2020 10:14:36 -0400 Received: from foss.arm.com ([217.140.110.172]:54722 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727874AbgC3OOg (ORCPT ); Mon, 30 Mar 2020 10:14:36 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 964661042; Mon, 30 Mar 2020 07:14:33 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B10F33F71E; Mon, 30 Mar 2020 07:14:32 -0700 (PDT) Date: Mon, 30 Mar 2020 15:14:30 +0100 From: Mark Rutland To: "Theodore Y. Ts'o" Cc: Alexander Sverdlin , linux-kernel@vger.kernel.org, Arnd Bergmann , Greg Kroah-Hartman , Herbert Xu Subject: Re: [PATCH] random: Drop ARCH limitations for CONFIG_RANDOM_TRUST_CPU Message-ID: <20200330141430.GC20969@lakrids.cambridge.arm.com> References: <20200329082909.193910-1-alexander.sverdlin@gmail.com> <20200329165624.GO53396@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200329165624.GO53396@mit.edu> User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Mar 29, 2020 at 12:56:24PM -0400, Theodore Y. Ts'o wrote: > On Sun, Mar 29, 2020 at 10:29:09AM +0200, Alexander Sverdlin wrote: > > The option itself looks attractive for the embedded devices which often > > have HWRNG but less entropy from user-input. And these devices are often > > ARM/ARM64 or MIPS. The reason to limit it to X86/S390/PPC is not obvious. > > > > Signed-off-by: Alexander Sverdlin > > This feature is *only* applicable if the CPU supports a > arch_get_random_seed_long() or arch_get_random_long(). I believe > there are some server-class ARM64 CPU's that support such an > instruction, but I don't believe any of the embedded arm64 --- and > certainly non of the embedded arm --- SOC's support > arch_get_random_long(). > > The reason why we limited it to X86/S390/PPC is because those were the > platforms which supported an RDRAND-like instruction at the time. > Richard Henderson added support for ARM64 in commit 1a50ec0b3b2e > ("arm64: Implement archrandom.h for ARMv8.5-RNG") in late January 2020. > > So we should either add ARM64 to the dependency list, or we could, as > you suggest, simply remove the dependency altogether. The tradeoff is > that it will cause an extra CONFIG prompt on a number of platforms > (mips, arm, sparc, etc.) where it will be utterly pointless since > those architectures have no chance of support a RDRAND-like > instruction. Just for anyone watching, the dependency rework is already handled in linux-next by commit: 23ae0c17b89cfeb5 ("random: Make RANDOM_TRUST_CPU depend on ARCH_RANDOM") ... where x86, s390, ppc, and arm64 all select ARCH_RANDOM. Mark.