From: Benjamin Herrenschmidt <benh@kernel.crashing.org>
To: Ard Biesheuvel <ardb@kernel.org>
Cc: Andre Przywara <andre.przywara@arm.com>,
Mark Brown <broonie@kernel.org>, Will Deacon <will@kernel.org>,
"Saidi, Ali" <alisaidi@amazon.com>,
Linux ARM <linux-arm-kernel@lists.infradead.org>
Subject: Re: RNDR/SS vs. SMCCC
Date: Fri, 04 Jun 2021 07:30:30 +1000 [thread overview]
Message-ID: <9ca71c91bfc27f436bd9c04d5cd528b66870e31e.camel@kernel.crashing.org> (raw)
In-Reply-To: <CAMj1kXHZCzrELRH=G82AxPC76N=x89qx7OFndkcNvn63OXDX6A@mail.gmail.com>
On Thu, 2021-06-03 at 09:10 +0200, Ard Biesheuvel wrote:
>
> True. However, the way things are currently set up, the hwrng is used
> both either internally (if the entropy estimate is high enough) or
> via rngd in user space to read from /dev/hwrng and write it back to
> /dev/random. This is kind of pointless in this case, although not
> harmful per se
Right. For hwrngd, we could add a flag per "source" to indicate not to
bother if we cared enough. For rngd in userspace, not much to do other
than deprecate that thing with newer kernels :-)
> > > I would be interested to hear opinions on this.
> > The issue is with things like FIPS certification (and other such
> > horrors) where I believe /dev/random is much harder to deal with
> > since
> > it mixes multiple entropy sources.
>
>
> /dev/random is not an entropy source but a random number generator. I
> agree with your characterization of FIPS in the general case, but the
> /dev/random kludge we have is not pretty either :-)
True :)
>
> Note that NIST SP800-90A/B compliance has similar requirements, i.e.,
> if user space wants to seed its own DRBG in user space and comply
> with these specs, it needs a compliant entropy source as well.
> However, health tests on the entropy source are also mandated, and it
> is not clear to me how that would fit into the SMCCC + /dev/hwrng
>
> arrangement.
Yes I'm not sure either. But having /dev/hwrng I think won't hurt
either way.
Cheers,
Ben.
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
prev parent reply other threads:[~2021-06-03 21:33 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-05-26 23:54 RNDR/SS vs. SMCCC Benjamin Herrenschmidt
2021-05-27 12:50 ` Mark Brown
2021-05-27 23:12 ` Benjamin Herrenschmidt
2021-05-28 12:56 ` Mark Brown
2021-05-29 2:36 ` Benjamin Herrenschmidt
2021-05-31 1:02 ` Andre Przywara
2021-05-31 5:24 ` Ard Biesheuvel
2021-06-02 22:04 ` Benjamin Herrenschmidt
2021-06-03 0:19 ` Andre Przywara
2021-06-03 1:41 ` Benjamin Herrenschmidt
2021-06-03 7:10 ` Ard Biesheuvel
2021-06-03 21:30 ` Benjamin Herrenschmidt [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9ca71c91bfc27f436bd9c04d5cd528b66870e31e.camel@kernel.crashing.org \
--to=benh@kernel.crashing.org \
--cc=alisaidi@amazon.com \
--cc=andre.przywara@arm.com \
--cc=ardb@kernel.org \
--cc=broonie@kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).