Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1937793ybg; Fri, 5 Jun 2020 01:11:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyzmFFtpMZhe4+yldm9SoDs8/KgYYbHthD9CpJl7kvhUdtONuf8S4y9WleHyovUsP6wDZaT X-Received: by 2002:a17:906:1c94:: with SMTP id g20mr7457989ejh.319.1591344701372; Fri, 05 Jun 2020 01:11:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591344701; cv=none; d=google.com; s=arc-20160816; b=Qqb1vY0UdAdu9zok+3vN5a9ymD6ISh/7GiOXvEwTvLCs+A8Wnv3ZGLZj+9kdb2H2zx yQSUjCsVrXqIPMXFqXGKV/H1P0fV9SPbaKL0eAcd79WWb4ZpXvqc1wkCQJCx0udEz/kx d7VRAIU3t14YBk0YTP5rpQpLTLoIhGyIZIETFSUYCSiNHMI0u56xoEocZ98VZBo2vBfx 84bSHdubyvWH4HKjKLCtpyV7d9NScZC01+Tkuv36l43H1f6A3S7uf5mXLytjXh+HSYS7 CDcu7VdzljaotysfzjwMLVPR+jEnPJB1NUMIWIOseLTxNQiKntkr0ZPuE0r4Xb32vteZ 3pfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=xTC03c+VN1v9oPdUo2yGRbRXi+/1BHiQCVEdadEW0B0=; b=tk1dOsbdN0B2mi8lXQ43omcGCcaZ696Hkecpu6vVcvbRZO4Sm8P+rLT7MkK9p8Kd5v vzO7mP3Tgvw/6cNpcW6aAkTcX3AOWa+W41+w18QXomV6FST7Pmgh+XGukozsuaeNW6OL vdn9l3O7F6xsNWeaA52mrNnurkHpFjDZSRNq5QUKM4HD2jJZDNcNZfnKfNfjjfOvdKpa 0QGiViudrtQ94gSr/pUQn2KF1ztfmOJ7ud4BJE/Z4EVkTLl3EZcH+IGgOuUAHMR1EljY kpKP7WFEgtUlZmHu8pNbQ2Er5HGU6Fihw4yyOu/2oA5WbMdWvJ2mZa+8daDuQf+3n4Rt ncRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@armlinux.org.uk header.s=pandora-2019 header.b=wBe35UXK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=armlinux.org.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r29si2989802edx.420.2020.06.05.01.11.18; Fri, 05 Jun 2020 01:11:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@armlinux.org.uk header.s=pandora-2019 header.b=wBe35UXK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=armlinux.org.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726127AbgFEIJY (ORCPT + 99 others); Fri, 5 Jun 2020 04:09:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726024AbgFEIJX (ORCPT ); Fri, 5 Jun 2020 04:09:23 -0400 Received: from pandora.armlinux.org.uk (pandora.armlinux.org.uk [IPv6:2001:4d48:ad52:3201:214:fdff:fe10:1be6]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07574C08C5C2; Fri, 5 Jun 2020 01:09:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=armlinux.org.uk; s=pandora-2019; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=xTC03c+VN1v9oPdUo2yGRbRXi+/1BHiQCVEdadEW0B0=; b=wBe35UXKkNUxuKRFJWItlkvuD 1XY++1q2yh1Zdn8E9bM44XF0UXOTbnrgJPyyFkMCF+P4VJYeq+HpcJrBCctVCNZHX/QflI8PUFqtB eZVzlHFtFLAMWyyURO+ZOuWjWW2UT6JYXUsEuLKMJ9qbhzww3ib7kkkI1fJmq070czJ/cCNCfTdtc 86LNj7hzaz4ANgBd2UcVJ/DlxPycd45pLpZ+iVRHYTIIhttw+53TPqf/dL2Ynv8/juj15jvwn3A7S 5jRRS8YLk88zzyi7ZU5mxkYkidghFxHNQohGA2yHxTA2VLGXaTvLNOXzek+UAYiFZxKhE4g3JDHDX ldCDaZPKQ==; Received: from shell.armlinux.org.uk ([2001:4d48:ad52:3201:5054:ff:fe00:4ec]:49608) by pandora.armlinux.org.uk with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jh7Pb-0001ay-Ky; Fri, 05 Jun 2020 09:09:11 +0100 Received: from linux by shell.armlinux.org.uk with local (Exim 4.92) (envelope-from ) id 1jh7PW-0007IR-1u; Fri, 05 Jun 2020 09:09:06 +0100 Date: Fri, 5 Jun 2020 09:09:06 +0100 From: Russell King - ARM Linux admin To: Neal Liu Cc: Marc Zyngier , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE BINDINGS" , Julius Werner , Herbert Xu , Arnd Bergmann , Greg Kroah-Hartman , Sean Wang , "linux-mediatek@lists.infradead.org" , lkml , wsd_upstream , Rob Herring , Linux Crypto Mailing List , Matt Mackall , Matthias Brugger , Crystal Guo =?utf-8?B?KOmDreaZtik=?= , Ard Biesheuvel , Linux ARM Subject: Re: Security Random Number Generator support Message-ID: <20200605080905.GF1551@shell.armlinux.org.uk> References: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> <85dfc0142d3879d50c0ba18bcc71e199@misterjones.org> <1591169342.4878.9.camel@mtkswgap22> <20200603093416.GY1551@shell.armlinux.org.uk> <1591341543.19510.4.camel@mtkswgap22> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1591341543.19510.4.camel@mtkswgap22> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 05, 2020 at 03:19:03PM +0800, Neal Liu wrote: > On Wed, 2020-06-03 at 17:34 +0800, Russell King - ARM Linux admin wrote: > > This kind of thing is something that ARM have seems to shy away from > > doing - it's a point I brought up many years ago when the whole > > trustzone thing first appeared with its SMC call. Those around the > > conference table were not interested - ARM seemed to prefer every > > vendor to do off and do their own thing with the SMC interface. > > Does that mean it make sense to model a sec-rng driver, and get each > vendor's SMC function id by DT node? _If_ vendors have already gone off and decided to use different SMC function IDs for this, while keeping the rest of the SMC interface the same, then the choice has already been made. I know on 32-bit that some of the secure world implementations can't be changed; they're burnt into the ROM. I believe on 64-bit that isn't the case, which makes it easier to standardise. Do you have visibility of how this SMC is implemented in the secure side? Is it in ATF, and is it done as a vendor hack or is there an element of generic implementation to it? Has it been submitted upstream to the main ATF repository? -- RMK's Patch system: https://www.armlinux.org.uk/developer/patches/ FTTC for 0.8m (est. 1762m) line in suburbia: sync at 13.1Mbps down 424kbps up