Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp585678pxu; Wed, 7 Oct 2020 10:25:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzH57zvAxcQjpzlsDEQagpbmaHOUC6SaNGcIjBu1CaHWxBzG0bPmBv6efFoFUhgoIHeFVVP X-Received: by 2002:a17:906:d186:: with SMTP id c6mr4264692ejz.298.1602091524783; Wed, 07 Oct 2020 10:25:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602091524; cv=none; d=google.com; s=arc-20160816; b=g0BWIB9a3xX5rbL6IjFQdff14+uWtq9q+YkaDApSfBi5z1Ect3sxIiXGKwCTb3Mv7K KStUy4E/+bjeJXIo10JH1C8NJCBdJABdhovWiWu5kAuOL+50VYwqYlT+eGvU5chw30+z hHgCfQAzwPj1fqVSRIb1gg8qSDbJ2H9b13CFPbAxTBJJJmvSl2UejrDq/ZBCuRAWRsxQ qYK8GNKHcjQIDB2fxHTpM+3QepUkyt5q8kLKCtVjtDQwYNxUfn+v5dHhP6shjb96u4Qn FMSTgD2d4hDYPN6P+kgcvQNbkJK2jgJywij/cXtknhuyIwIGAhF+A//C5rUdRnZuMMgv U4rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :autocrypt:from:references:cc:to:subject; bh=IVnjTh5pVTpz7EhTqceN5e7wbwaNWpYS1Gc1tPo7MeY=; b=xxbOkGEWs5l7Zj8EHhmRiw14/B9+8ilBt2Gy3yWFfD4n94kAkmBk3/2trtSckmoObR LDuskzEhkYf72f2K0bbCiPSFryikR/EHg5VSyK3CPLLZ1dfM23g0/OgcVHLI2F6qjMue Oa2ZdibxUXnL3x+Ok3gQVRhz85Z781YNfr3W5ZaLRwRVrx3DZXbzoHwtJy1WDhG7ie1b aiAK7E/bvwKA4a98siLwLWQi5AGtEWroqN/3jG27DoBw1voh8GlxsG4aPbgOzobelblJ HnXX4hBRhZ/HNYxM9EgWe9VGqTs+UK6BkpESuhvrgm8naSGEwahQEA4/b2TgB79Qp3v0 lksw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y2si1744044ede.379.2020.10.07.10.25.01; Wed, 07 Oct 2020 10:25:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728633AbgJGOof (ORCPT + 99 others); Wed, 7 Oct 2020 10:44:35 -0400 Received: from foss.arm.com ([217.140.110.172]:44990 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728535AbgJGOoe (ORCPT ); Wed, 7 Oct 2020 10:44:34 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BFF8E106F; Wed, 7 Oct 2020 07:44:33 -0700 (PDT) Received: from [192.168.2.22] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3704F3F66B; Wed, 7 Oct 2020 07:44:32 -0700 (PDT) Subject: Re: [PATCH 2/2] arm64: Add support for SMCCC TRNG firmware interface To: James Morse Cc: Catalin Marinas , Will Deacon , Mark Rutland , Lorenzo Pieralisi , Richard Henderson , linux-kernel@vger.kernel.org, Mark Brown , Sudeep Holla , Ard Biesheuvel , linux-arm-kernel@lists.infradead.org References: <20201006201808.37665-1-andre.przywara@arm.com> <20201006201808.37665-3-andre.przywara@arm.com> <65057faa-d06b-6baf-4f12-9587cacbe3a9@arm.com> From: =?UTF-8?Q?Andr=c3=a9_Przywara?= Autocrypt: addr=andre.przywara@arm.com; prefer-encrypt=mutual; keydata= xsFNBFNPCKMBEAC+6GVcuP9ri8r+gg2fHZDedOmFRZPtcrMMF2Cx6KrTUT0YEISsqPoJTKld tPfEG0KnRL9CWvftyHseWTnU2Gi7hKNwhRkC0oBL5Er2hhNpoi8x4VcsxQ6bHG5/dA7ctvL6 kYvKAZw4X2Y3GTbAZIOLf+leNPiF9175S8pvqMPi0qu67RWZD5H/uT/TfLpvmmOlRzNiXMBm kGvewkBpL3R2clHquv7pB6KLoY3uvjFhZfEedqSqTwBVu/JVZZO7tvYCJPfyY5JG9+BjPmr+ REe2gS6w/4DJ4D8oMWKoY3r6ZpHx3YS2hWZFUYiCYovPxfj5+bOr78sg3JleEd0OB0yYtzTT esiNlQpCo0oOevwHR+jUiaZevM4xCyt23L2G+euzdRsUZcK/M6qYf41Dy6Afqa+PxgMEiDto ITEH3Dv+zfzwdeqCuNU0VOGrQZs/vrKOUmU/QDlYL7G8OIg5Ekheq4N+Ay+3EYCROXkstQnf YYxRn5F1oeVeqoh1LgGH7YN9H9LeIajwBD8OgiZDVsmb67DdF6EQtklH0ycBcVodG1zTCfqM AavYMfhldNMBg4vaLh0cJ/3ZXZNIyDlV372GmxSJJiidxDm7E1PkgdfCnHk+pD8YeITmSNyb 7qeU08Hqqh4ui8SSeUp7+yie9zBhJB5vVBJoO5D0MikZAODIDwARAQABzS1BbmRyZSBQcnp5 d2FyYSAoQVJNKSA8YW5kcmUucHJ6eXdhcmFAYXJtLmNvbT7CwXsEEwECACUCGwMGCwkIBwMC BhUIAgkKCwQWAgMBAh4BAheABQJTWSV8AhkBAAoJEAL1yD+ydue63REP/1tPqTo/f6StS00g NTUpjgVqxgsPWYWwSLkgkaUZn2z9Edv86BLpqTY8OBQZ19EUwfNehcnvR+Olw+7wxNnatyxo D2FG0paTia1SjxaJ8Nx3e85jy6l7N2AQrTCFCtFN9lp8Pc0LVBpSbjmP+Peh5Mi7gtCBNkpz KShEaJE25a/+rnIrIXzJHrsbC2GwcssAF3bd03iU41J1gMTalB6HCtQUwgqSsbG8MsR/IwHW XruOnVp0GQRJwlw07e9T3PKTLj3LWsAPe0LHm5W1Q+euoCLsZfYwr7phQ19HAxSCu8hzp43u zSw0+sEQsO+9wz2nGDgQCGepCcJR1lygVn2zwRTQKbq7Hjs+IWZ0gN2nDajScuR1RsxTE4WR lj0+Ne6VrAmPiW6QqRhliDO+e82riI75ywSWrJb9TQw0+UkIQ2DlNr0u0TwCUTcQNN6aKnru ouVt3qoRlcD5MuRhLH+ttAcmNITMg7GQ6RQajWrSKuKFrt6iuDbjgO2cnaTrLbNBBKPTG4oF D6kX8Zea0KvVBagBsaC1CDTDQQMxYBPDBSlqYCb/b2x7KHTvTAHUBSsBRL6MKz8wwruDodTM 4E4ToV9URl4aE/msBZ4GLTtEmUHBh4/AYwk6ACYByYKyx5r3PDG0iHnJ8bV0OeyQ9ujfgBBP B2t4oASNnIOeGEEcQ2rjzsFNBFNPCKMBEACm7Xqafb1Dp1nDl06aw/3O9ixWsGMv1Uhfd2B6 it6wh1HDCn9HpekgouR2HLMvdd3Y//GG89irEasjzENZPsK82PS0bvkxxIHRFm0pikF4ljIb 6tca2sxFr/H7CCtWYZjZzPgnOPtnagN0qVVyEM7L5f7KjGb1/o5EDkVR2SVSSjrlmNdTL2Rd zaPqrBoxuR/y/n856deWqS1ZssOpqwKhxT1IVlF6S47CjFJ3+fiHNjkljLfxzDyQXwXCNoZn BKcW9PvAMf6W1DGASoXtsMg4HHzZ5fW+vnjzvWiC4pXrcP7Ivfxx5pB+nGiOfOY+/VSUlW/9 GdzPlOIc1bGyKc6tGREH5lErmeoJZ5k7E9cMJx+xzuDItvnZbf6RuH5fg3QsljQy8jLlr4S6 8YwxlObySJ5K+suPRzZOG2+kq77RJVqAgZXp3Zdvdaov4a5J3H8pxzjj0yZ2JZlndM4X7Msr P5tfxy1WvV4Km6QeFAsjcF5gM+wWl+mf2qrlp3dRwniG1vkLsnQugQ4oNUrx0ahwOSm9p6kM CIiTITo+W7O9KEE9XCb4vV0ejmLlgdDV8ASVUekeTJkmRIBnz0fa4pa1vbtZoi6/LlIdAEEt PY6p3hgkLLtr2GRodOW/Y3vPRd9+rJHq/tLIfwc58ZhQKmRcgrhtlnuTGTmyUqGSiMNfpwAR AQABwsFfBBgBAgAJBQJTTwijAhsMAAoJEAL1yD+ydue64BgP/33QKczgAvSdj9XTC14wZCGE U8ygZwkkyNf021iNMj+o0dpLU48PIhHIMTXlM2aiiZlPWgKVlDRjlYuc9EZqGgbOOuR/pNYA JX9vaqszyE34JzXBL9DBKUuAui8z8GcxRcz49/xtzzP0kH3OQbBIqZWuMRxKEpRptRT0wzBL O31ygf4FRxs68jvPCuZjTGKELIo656/Hmk17cmjoBAJK7JHfqdGkDXk5tneeHCkB411p9WJU vMO2EqsHjobjuFm89hI0pSxlUoiTL0Nuk9Edemjw70W4anGNyaQtBq+qu1RdjUPBvoJec7y/ EXJtoGxq9Y+tmm22xwApSiIOyMwUi9A1iLjQLmngLeUdsHyrEWTbEYHd2sAM2sqKoZRyBDSv ejRvZD6zwkY/9nRqXt02H1quVOP42xlkwOQU6gxm93o/bxd7S5tEA359Sli5gZRaucpNQkwd KLQdCvFdksD270r4jU/rwR2R/Ubi+txfy0dk2wGBjl1xpSf0Lbl/KMR5TQntELfLR4etizLq Xpd2byn96Ivi8C8u9zJruXTueHH8vt7gJ1oax3yKRGU5o2eipCRiKZ0s/T7fvkdq+8beg9ku fDO4SAgJMIl6H5awliCY2zQvLHysS/Wb8QuB09hmhLZ4AifdHyF1J5qeePEhgTA+BaUbiUZf i4aIXCH3Wv6K Organization: ARM Ltd. Message-ID: Date: Wed, 7 Oct 2020 15:43:46 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <65057faa-d06b-6baf-4f12-9587cacbe3a9@arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/10/2020 15:16, James Morse wrote: Hi, > On 06/10/2020 21:18, Andre Przywara wrote: >> The ARM architected TRNG firmware interface, described in ARM spec >> DEN0098[1], defines an ARM SMCCC based interface to a true random number >> generator, provided by firmware. >> This can be discovered via the SMCCC >=v1.1 interface, and provides >> up to 192 bits of entropy per call. >> >> Hook this SMC call into arm64's arch_get_random_*() implementation, >> coming to the rescue when the CPU does not implement the ARM v8.5 RNG >> system registers. >> >> For the detection, we piggy back on the PSCI/SMCCC discovery (which gives >> us the conduit to use: hvc or smc), then try to call the >> ARM_SMCCC_TRNG_VERSION function, which returns -1 if this interface is >> not implemented. > >> arch/arm64/include/asm/archrandom.h | 83 +++++++++++++++++++++++++---- >> 1 file changed, 73 insertions(+), 10 deletions(-) > >> diff --git a/arch/arm64/include/asm/archrandom.h b/arch/arm64/include/asm/archrandom.h >> index ffb1a40d5475..b6c291c42a48 100644 >> --- a/arch/arm64/include/asm/archrandom.h >> +++ b/arch/arm64/include/asm/archrandom.h >> @@ -7,6 +7,13 @@ >> #include >> #include >> #include >> +#include >> + >> +static enum smc_trng_status { >> + SMC_TRNG_UNKNOWN, >> + SMC_TRNG_NOT_SUPPORTED, >> + SMC_TRNG_SUPPORTED >> +} smc_trng_status = SMC_TRNG_UNKNOWN; > > Doesn't this static variable in a header file mean each file that includes this has its > own copy? Is that intentional? Right, and it's not intentional. It doesn't really break, but since random.h includes archrandom.h, we get an instance everywhere :-( I wasn't too happy with this detection method to begin with (and also not with stuffing everything into a header file), but wanted to accommodate the early case, where PSCI hasn't been initialised yet, and so we don't know the SMCCC conduit. A static key sounds better, but gets a bit hairy with this scenario, I think. Any ideas here? I could copy Ard's solution and introduce random.c, if that makes more sense. Cheers, Andre