Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp464604pxb; Thu, 12 Nov 2020 08:05:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJxhUAt96qQn/CwnHSSpbpWgnGTGbiVz3TFVMlcFW9XT+5m98UgEkzcJqBroJTHWXRNG6ciF X-Received: by 2002:aa7:d890:: with SMTP id u16mr428432edq.159.1605197120583; Thu, 12 Nov 2020 08:05:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605197120; cv=none; d=google.com; s=arc-20160816; b=UozoHxVv0av4139meuMXNQ9i1V0/9x6PA60NuZepaU/2apH+dZDJyfpYmcWo8b8Tp2 SRKgWCaWUjM7qw7WHVnR6gjUobHfPCiWC88jVYRj0J3XWXLfsZr/LNDpNw5ghPgX8jrF UxQ96DgFJ+s/kPnVw8tPrXpUwt9dccood9X0xgD0otghpgnzqqz/uPvEwjfYxqRsmCgr vgkGD9gIquKYTN0KvnucrIUv3r9R3pA/k9Szbwp2oZvk+llmi8R+0UFe7BqvWOWmY6R/ k14xFv482qvdbP526xUnlZVPBIpIIzaxN3vKYtqRukDE2Q7gZi8I5LwY/t4LrG0jIqJy UL9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :autocrypt:from:references:cc:to:subject; bh=nmrIRIhl0Zg/Ad/vbzTNSiRGPQ+DamMQQyTsZF8uOUM=; b=ThC2Mk7Xi+FsyGPihDCWOvOG8Tf8VVwmL27QcDH74ragC6nrIKmNIGE7GR0ERjcB9U tn4hp1APkvgQF9TM3ZMN+VefQsf3pownj2bBSevbv5W5Y3zB/wmIOKy4BxJkRk3zXsZF ssnGg/WTrZG80d0cAKZvXx3JxYCYh42VzwHueFQIHUf6DtABAD92E587W4sn9N+PDXia 2XtYvfO+iUQg8ASGhZKoPSsaR+v1Y+YJwIRB8woRGY3aVHQbFGlOYItQB34Dc7RU+Y5D EHfElSQMS9OLr5OZQZ2iPpnMdOggs28KbmRpwCkXxUAcIvAUDaKYbKBfELA05Xkc9zGm 5BGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hh13si3990111ejb.360.2020.11.12.08.04.51; Thu, 12 Nov 2020 08:05:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728599AbgKLQDW (ORCPT + 99 others); Thu, 12 Nov 2020 11:03:22 -0500 Received: from foss.arm.com ([217.140.110.172]:53422 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728426AbgKLQDW (ORCPT ); Thu, 12 Nov 2020 11:03:22 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A90FD142F; Thu, 12 Nov 2020 08:03:21 -0800 (PST) Received: from [192.168.2.22] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3EACD3F73C; Thu, 12 Nov 2020 08:03:19 -0800 (PST) Subject: Re: [PATCH v2 4/5] arm64: Add support for SMCCC TRNG entropy source To: Mark Rutland , Mark Brown Cc: Will Deacon , Catalin Marinas , Ard Biesheuvel , Russell King , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org, Sudeep Holla , Lorenzo Pieralisi , Linus Walleij References: <20201105125656.25259-1-andre.przywara@arm.com> <20201105125656.25259-5-andre.przywara@arm.com> <20201105134142.GA4856@sirena.org.uk> <20201105140322.GH82102@C02TD0UTHF1T.local> <20201105142949.GB4856@sirena.org.uk> <20201105143852.GJ82102@C02TD0UTHF1T.local> From: =?UTF-8?Q?Andr=c3=a9_Przywara?= Autocrypt: addr=andre.przywara@arm.com; prefer-encrypt=mutual; keydata= xsFNBFNPCKMBEAC+6GVcuP9ri8r+gg2fHZDedOmFRZPtcrMMF2Cx6KrTUT0YEISsqPoJTKld tPfEG0KnRL9CWvftyHseWTnU2Gi7hKNwhRkC0oBL5Er2hhNpoi8x4VcsxQ6bHG5/dA7ctvL6 kYvKAZw4X2Y3GTbAZIOLf+leNPiF9175S8pvqMPi0qu67RWZD5H/uT/TfLpvmmOlRzNiXMBm kGvewkBpL3R2clHquv7pB6KLoY3uvjFhZfEedqSqTwBVu/JVZZO7tvYCJPfyY5JG9+BjPmr+ REe2gS6w/4DJ4D8oMWKoY3r6ZpHx3YS2hWZFUYiCYovPxfj5+bOr78sg3JleEd0OB0yYtzTT esiNlQpCo0oOevwHR+jUiaZevM4xCyt23L2G+euzdRsUZcK/M6qYf41Dy6Afqa+PxgMEiDto ITEH3Dv+zfzwdeqCuNU0VOGrQZs/vrKOUmU/QDlYL7G8OIg5Ekheq4N+Ay+3EYCROXkstQnf YYxRn5F1oeVeqoh1LgGH7YN9H9LeIajwBD8OgiZDVsmb67DdF6EQtklH0ycBcVodG1zTCfqM AavYMfhldNMBg4vaLh0cJ/3ZXZNIyDlV372GmxSJJiidxDm7E1PkgdfCnHk+pD8YeITmSNyb 7qeU08Hqqh4ui8SSeUp7+yie9zBhJB5vVBJoO5D0MikZAODIDwARAQABzS1BbmRyZSBQcnp5 d2FyYSAoQVJNKSA8YW5kcmUucHJ6eXdhcmFAYXJtLmNvbT7CwXsEEwECACUCGwMGCwkIBwMC BhUIAgkKCwQWAgMBAh4BAheABQJTWSV8AhkBAAoJEAL1yD+ydue63REP/1tPqTo/f6StS00g NTUpjgVqxgsPWYWwSLkgkaUZn2z9Edv86BLpqTY8OBQZ19EUwfNehcnvR+Olw+7wxNnatyxo D2FG0paTia1SjxaJ8Nx3e85jy6l7N2AQrTCFCtFN9lp8Pc0LVBpSbjmP+Peh5Mi7gtCBNkpz KShEaJE25a/+rnIrIXzJHrsbC2GwcssAF3bd03iU41J1gMTalB6HCtQUwgqSsbG8MsR/IwHW XruOnVp0GQRJwlw07e9T3PKTLj3LWsAPe0LHm5W1Q+euoCLsZfYwr7phQ19HAxSCu8hzp43u zSw0+sEQsO+9wz2nGDgQCGepCcJR1lygVn2zwRTQKbq7Hjs+IWZ0gN2nDajScuR1RsxTE4WR lj0+Ne6VrAmPiW6QqRhliDO+e82riI75ywSWrJb9TQw0+UkIQ2DlNr0u0TwCUTcQNN6aKnru ouVt3qoRlcD5MuRhLH+ttAcmNITMg7GQ6RQajWrSKuKFrt6iuDbjgO2cnaTrLbNBBKPTG4oF D6kX8Zea0KvVBagBsaC1CDTDQQMxYBPDBSlqYCb/b2x7KHTvTAHUBSsBRL6MKz8wwruDodTM 4E4ToV9URl4aE/msBZ4GLTtEmUHBh4/AYwk6ACYByYKyx5r3PDG0iHnJ8bV0OeyQ9ujfgBBP B2t4oASNnIOeGEEcQ2rjzsFNBFNPCKMBEACm7Xqafb1Dp1nDl06aw/3O9ixWsGMv1Uhfd2B6 it6wh1HDCn9HpekgouR2HLMvdd3Y//GG89irEasjzENZPsK82PS0bvkxxIHRFm0pikF4ljIb 6tca2sxFr/H7CCtWYZjZzPgnOPtnagN0qVVyEM7L5f7KjGb1/o5EDkVR2SVSSjrlmNdTL2Rd zaPqrBoxuR/y/n856deWqS1ZssOpqwKhxT1IVlF6S47CjFJ3+fiHNjkljLfxzDyQXwXCNoZn BKcW9PvAMf6W1DGASoXtsMg4HHzZ5fW+vnjzvWiC4pXrcP7Ivfxx5pB+nGiOfOY+/VSUlW/9 GdzPlOIc1bGyKc6tGREH5lErmeoJZ5k7E9cMJx+xzuDItvnZbf6RuH5fg3QsljQy8jLlr4S6 8YwxlObySJ5K+suPRzZOG2+kq77RJVqAgZXp3Zdvdaov4a5J3H8pxzjj0yZ2JZlndM4X7Msr P5tfxy1WvV4Km6QeFAsjcF5gM+wWl+mf2qrlp3dRwniG1vkLsnQugQ4oNUrx0ahwOSm9p6kM CIiTITo+W7O9KEE9XCb4vV0ejmLlgdDV8ASVUekeTJkmRIBnz0fa4pa1vbtZoi6/LlIdAEEt PY6p3hgkLLtr2GRodOW/Y3vPRd9+rJHq/tLIfwc58ZhQKmRcgrhtlnuTGTmyUqGSiMNfpwAR AQABwsFfBBgBAgAJBQJTTwijAhsMAAoJEAL1yD+ydue64BgP/33QKczgAvSdj9XTC14wZCGE U8ygZwkkyNf021iNMj+o0dpLU48PIhHIMTXlM2aiiZlPWgKVlDRjlYuc9EZqGgbOOuR/pNYA JX9vaqszyE34JzXBL9DBKUuAui8z8GcxRcz49/xtzzP0kH3OQbBIqZWuMRxKEpRptRT0wzBL O31ygf4FRxs68jvPCuZjTGKELIo656/Hmk17cmjoBAJK7JHfqdGkDXk5tneeHCkB411p9WJU vMO2EqsHjobjuFm89hI0pSxlUoiTL0Nuk9Edemjw70W4anGNyaQtBq+qu1RdjUPBvoJec7y/ EXJtoGxq9Y+tmm22xwApSiIOyMwUi9A1iLjQLmngLeUdsHyrEWTbEYHd2sAM2sqKoZRyBDSv ejRvZD6zwkY/9nRqXt02H1quVOP42xlkwOQU6gxm93o/bxd7S5tEA359Sli5gZRaucpNQkwd KLQdCvFdksD270r4jU/rwR2R/Ubi+txfy0dk2wGBjl1xpSf0Lbl/KMR5TQntELfLR4etizLq Xpd2byn96Ivi8C8u9zJruXTueHH8vt7gJ1oax3yKRGU5o2eipCRiKZ0s/T7fvkdq+8beg9ku fDO4SAgJMIl6H5awliCY2zQvLHysS/Wb8QuB09hmhLZ4AifdHyF1J5qeePEhgTA+BaUbiUZf i4aIXCH3Wv6K Organization: ARM Ltd. Message-ID: <08049298-6d07-55ba-70ef-be3c8c017bf5@arm.com> Date: Thu, 12 Nov 2020 16:03:08 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <20201105143852.GJ82102@C02TD0UTHF1T.local> Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/11/2020 14:38, Mark Rutland wrote: Hi, > On Thu, Nov 05, 2020 at 02:29:49PM +0000, Mark Brown wrote: >> On Thu, Nov 05, 2020 at 02:03:22PM +0000, Mark Rutland wrote: >>> On Thu, Nov 05, 2020 at 01:41:42PM +0000, Mark Brown wrote: >> >>>> It isn't obvious to me why we don't fall through to trying the SMCCC >>>> TRNG here if for some reason the v8.5-RNG didn't give us something. >>>> Definitely an obscure possibility but still... >> >>> I think it's better to assume that if we have a HW RNG and it's not >>> giving us entropy, it's not worthwhile trapping to the host, which might >>> encounter the exact same issue. >> >> There's definitely a good argument for that, but OTOH it's possible the >> SMCCC implementation is doing something else (it'd be an interesting >> implementation decision but...). That said I don't really mind, I think >> my comment was more that if we're doing this the code should be explicit >> about what the intent is since right now it isn't obvious. Either a >> comment or having an explicit "what method are we choosing" thing. >> >>> That said, I'm not sure it's great to plumb this under the >>> arch_get_random*() interfaces, e.g. given this measn that >>> add_interrupt_randomness() will end up trapping to the host all the time >>> when it calls arch_get_random_seed_long(). >> >>> Is there an existing interface for "slow" runtime entropy that we can >>> plumb this into instead? >> >> Yeah, I was wondering about this myself - it seems like a better fit for >> hwrng rather than the arch interfaces but that's not used until >> userspace comes up, the arch stuff is all expected to be quick. I >> suppose we could implement the SMCCC stuff for the early variants of the >> API you added so it gets used for bootstrapping purposes and then we >> rely on userspace keeping things topped up by fetching entropy through >> hwrng or otherwise but that feels confused so I have a hard time getting >> enthusiastic about it. > > I'm perfectly happy for the early functions to call this, or for us to > add something new firmwware_get_random_*() functions that we can call > early (and potentially at runtime, but less often than > arch_get_random_*()). > > I suspect the easy thing to do for now is plumb this into the existing > early arch functions and hwrng. So coming back to this: With Ard's patch to remove arch_get_random from add_interrupt_randomness(), I see this called much less often: basically once at early boot, then 16 longs every 5 minutes or so, from the periodic crng reseed. The only exception would be the KVM code now, so we are at the grace of a guest to not swamp us with seed requests. Alternatively we could remove the direct arch_get_random call from the KVM code, relying on the general kernel pool instead. Is this new situation now good enough to keep the SMCCC calls in this interface here? I have the hwrng driver ready, which could coexist with the arch_random implementation. But if the only purpose of /dev/hwrng is to let rngd feed this entropy back into the kernel, it would be pointless. I found the driver useful to debug and test the firmware implementation and to assess the random number quality (by feeding the raw stream into rngtest or dieharder), but that might not justify a merge. Ard objected against the driver, I guess to keep things simple and architectural. So what is the plan here? Shall I post a v3 with or without the hwrng driver? And do we keep the SMCCC arch_random implementation? Cheers, Andre