From patchwork Fri Oct 28 23:40:25 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Jason A. Donenfeld" X-Patchwork-Id: 12609 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp1103171wru; Fri, 28 Oct 2022 16:59:51 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6zNyLJA+V6kSuFK51jXuxss3Bzw+RKdJSXPaIXqkgW8LSYsNAhI5ckF5RrA8mLlXJmvLhU X-Received: by 2002:a17:907:7ea6:b0:791:81f4:b0e3 with SMTP id qb38-20020a1709077ea600b0079181f4b0e3mr1703550ejc.164.1667001590901; Fri, 28 Oct 2022 16:59:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667001590; cv=none; d=google.com; s=arc-20160816; b=OTc8XJtSRX2UicaSwEE0F/FDPX0biCpPaYs8FURRA/fYD/3iUwJJTMo25J4fLq68fX 4pvjBwGXtgGoAabl6M1ZCx8MVSdOikM/aQeJ+zBtL/vPv4zETUDSvDMPbasaEaSThvUS XGPR8zD4FUIlN0VnYRuFZOF8+ILJ0peui9rZX1ieeRzQlP+b+gU9MgXe0jAgePPXQPwk wet2kxBh0ZJr38nR9dSHLcqryll0JMTzb3kPuCTvnrPIY0tbulMnx/z5SXcNsJp7WJJu LE1NDFLiZ4vEmG5Ha+DPJDpTLwMP6udzYZARz9RNILuKLijXxuShXoNyJ4uKR/9te8qW lY+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=cp1Xr1b0al/fXFCbuvHhFS7yT6OAQVKZYDYFdLMcyIc=; b=hy8KnVdt+KaGXvoCBvPwQ9A0ZWRnAHaIW7TPkch5zBhsJZR0FRGZwT2kCEyW1Itycq g9HnItAdBjcr5LfB7VaNCzzErrKeFZ7hB8OG5OVQY9bP/6gfpFQ2rYo36RFn++wWfYNG NWYg8mi66/ILkwoZ1V2H1VFaCEE1JQ7OI+v9Bt/o5kH4zNNf5gZhHDxVsGPjVXsO1FXy b6R0hGGCnAfz9KTCd7G0RK4syeOOUO/QnvAJCxtX0/2t2w5xE8WMzBo4yOwo9sLbgSDl EHJLtIJ5f2GnqNOxDUpp5PDMdDALcf6u1DBIAxRquYuhQtY2UIrll20EP2XE6OAN8BAn qflA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@zx2c4.com header.s=20210105 header.b=PB+weiRE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=zx2c4.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id be7-20020a1709070a4700b0073d74bcac8dsi62770ejc.513.2022.10.28.16.59.26; Fri, 28 Oct 2022 16:59:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@zx2c4.com header.s=20210105 header.b=PB+weiRE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=zx2c4.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229865AbiJ1Xkp (ORCPT + 99 others); Fri, 28 Oct 2022 19:40:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229670AbiJ1Xkn (ORCPT ); Fri, 28 Oct 2022 19:40:43 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A95A71706 for ; Fri, 28 Oct 2022 16:40:41 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B035262AD8 for ; Fri, 28 Oct 2022 23:40:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5141EC433D6; Fri, 28 Oct 2022 23:40:39 +0000 (UTC) Authentication-Results: smtp.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="PB+weiRE" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zx2c4.com; s=20210105; t=1667000437; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=cp1Xr1b0al/fXFCbuvHhFS7yT6OAQVKZYDYFdLMcyIc=; b=PB+weiREJSJgZVfkz58SPQiIAV1W8QU2tt8R107aoTX7yo+d9d/uWKMtINVzQoODHODEna U5yRE23sBGGxWaYcWfeqfOftRpMkOEeEMrEjsjf+yKvWMyidVak8fO4av6UM8Sd3KXr0l9 vc89vsRwN9ctWa2tSkoKQj2Nm+DoXHo= Received: by mail.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 2b502cb8 (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO); Fri, 28 Oct 2022 23:40:36 +0000 (UTC) From: "Jason A. Donenfeld" To: catalin.marinas@arm.com, will@kernel.org, jean-philippe@linaro.org, ardb@kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Cc: "Jason A. Donenfeld" Subject: [PATCH] random: remove early archrandom abstraction Date: Sat, 29 Oct 2022 01:40:25 +0200 Message-Id: <20221028234025.82222-1-Jason@zx2c4.com> MIME-Version: 1.0 X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1747977860464325685?= X-GMAIL-MSGID: =?utf-8?q?1747977860464325685?= The arch_get_random*_early() abstraction is not completely useful and adds complexity, because it's not a given that there will be no calls to arch_get_random*() between random_init_early(), which uses arch_get_random*_early(), and init_cpu_features(). During that gap, crng_reseed() might be called, which uses arch_get_random*(), since it's mostly not init code. Instead we can test whether we're in the early phase in arch_get_random*() itself, and in doing so avoid all ambiguity about where we are. Fortunately, the only architecture that currently implements arch_get_random*_early() also has an alternatives-based cpu feature system, one flag of which determines whether the other flags have been initialized. This makes it possible to do the early check with zero cost once the system is initialized. Signed-off-by: Jason A. Donenfeld --- Catalin - Though this touches arm64's archrandom.h, I intend to take this through the random.git tree, if that's okay. I have other patches that will build off of this one. -Jason arch/arm64/include/asm/archrandom.h | 57 ++++++----------------------- drivers/char/random.c | 4 +- include/linux/random.h | 20 ---------- 3 files changed, 14 insertions(+), 67 deletions(-) diff --git a/arch/arm64/include/asm/archrandom.h b/arch/arm64/include/asm/archrandom.h index 109e2a4454be..8a059a9033af 100644 --- a/arch/arm64/include/asm/archrandom.h +++ b/arch/arm64/include/asm/archrandom.h @@ -58,6 +58,16 @@ static inline bool __arm64_rndrrs(unsigned long *v) return ok; } +static __always_inline bool __cpu_has_rng(void) +{ + if (!system_capabilities_finalized()) { + /* Open code as we run prior to the first call to cpufeature. */ + unsigned long ftr = read_sysreg_s(SYS_ID_AA64ISAR0_EL1); + return (ftr >> ID_AA64ISAR0_EL1_RNDR_SHIFT) & 0xf; + } + return cpus_have_const_cap(ARM64_HAS_RNG); +} + static inline size_t __must_check arch_get_random_longs(unsigned long *v, size_t max_longs) { /* @@ -66,7 +76,7 @@ static inline size_t __must_check arch_get_random_longs(unsigned long *v, size_t * cpufeature code and with potential scheduling between CPUs * with and without the feature. */ - if (max_longs && cpus_have_const_cap(ARM64_HAS_RNG) && __arm64_rndr(v)) + if (max_longs && __cpu_has_rng() && __arm64_rndr(v)) return 1; return 0; } @@ -108,53 +118,10 @@ static inline size_t __must_check arch_get_random_seed_longs(unsigned long *v, s * reseeded after each invocation. This is not a 100% fit but good * enough to implement this API if no other entropy source exists. */ - if (cpus_have_const_cap(ARM64_HAS_RNG) && __arm64_rndrrs(v)) + if (__cpu_has_rng() && __arm64_rndrrs(v)) return 1; return 0; } -static inline bool __init __early_cpu_has_rndr(void) -{ - /* Open code as we run prior to the first call to cpufeature. */ - unsigned long ftr = read_sysreg_s(SYS_ID_AA64ISAR0_EL1); - return (ftr >> ID_AA64ISAR0_EL1_RNDR_SHIFT) & 0xf; -} - -static inline size_t __init __must_check -arch_get_random_seed_longs_early(unsigned long *v, size_t max_longs) -{ - WARN_ON(system_state != SYSTEM_BOOTING); - - if (!max_longs) - return 0; - - if (smccc_trng_available) { - struct arm_smccc_res res; - - max_longs = min_t(size_t, 3, max_longs); - arm_smccc_1_1_invoke(ARM_SMCCC_TRNG_RND64, max_longs * 64, &res); - if ((int)res.a0 >= 0) { - switch (max_longs) { - case 3: - *v++ = res.a1; - fallthrough; - case 2: - *v++ = res.a2; - fallthrough; - case 1: - *v++ = res.a3; - break; - } - return max_longs; - } - } - - if (__early_cpu_has_rndr() && __arm64_rndr(v)) - return 1; - - return 0; -} -#define arch_get_random_seed_longs_early arch_get_random_seed_longs_early - #endif /* _ASM_ARCHRANDOM_H */ diff --git a/drivers/char/random.c b/drivers/char/random.c index 6f323344d0b9..e3cf4f51ed58 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -813,13 +813,13 @@ void __init random_init_early(const char *command_line) #endif for (i = 0, arch_bits = sizeof(entropy) * 8; i < ARRAY_SIZE(entropy);) { - longs = arch_get_random_seed_longs_early(entropy, ARRAY_SIZE(entropy) - i); + longs = arch_get_random_seed_longs(entropy, ARRAY_SIZE(entropy) - i); if (longs) { _mix_pool_bytes(entropy, sizeof(*entropy) * longs); i += longs; continue; } - longs = arch_get_random_longs_early(entropy, ARRAY_SIZE(entropy) - i); + longs = arch_get_random_longs(entropy, ARRAY_SIZE(entropy) - i); if (longs) { _mix_pool_bytes(entropy, sizeof(*entropy) * longs); i += longs; diff --git a/include/linux/random.h b/include/linux/random.h index 182780cafd45..2bdd3add3400 100644 --- a/include/linux/random.h +++ b/include/linux/random.h @@ -153,26 +153,6 @@ declare_get_random_var_wait(long, unsigned long) #include -/* - * Called from the boot CPU during startup; not valid to call once - * secondary CPUs are up and preemption is possible. - */ -#ifndef arch_get_random_seed_longs_early -static inline size_t __init arch_get_random_seed_longs_early(unsigned long *v, size_t max_longs) -{ - WARN_ON(system_state != SYSTEM_BOOTING); - return arch_get_random_seed_longs(v, max_longs); -} -#endif - -#ifndef arch_get_random_longs_early -static inline bool __init arch_get_random_longs_early(unsigned long *v, size_t max_longs) -{ - WARN_ON(system_state != SYSTEM_BOOTING); - return arch_get_random_longs(v, max_longs); -} -#endif - #ifdef CONFIG_SMP int random_prepare_cpu(unsigned int cpu); int random_online_cpu(unsigned int cpu);