Re: [PATCH v2 05/16] x86/efi: Get entropy through EFI random number generator protocol

2015-08-27 Thread joeyli
On Thu, Aug 20, 2015 at 09:26:20PM +0100, Matt Fleming wrote:
 On Tue, 11 Aug, at 02:16:25PM, Lee, Chun-Yi wrote:
  +
  +static unsigned long efi_get_rng64(efi_system_table_t *sys_table,
  +  void **rng_handle)
  +{
  +   const struct efi_config *efi_early = __efi_early();
  +   efi_rng_protocol_64 *rng = NULL;
  +   efi_guid_t rng_proto = EFI_RNG_PROTOCOL_GUID;
  +   u64 *handles = (u64 *)(unsigned long)rng_handle;
  +   efi_status_t status;
  +   unsigned long rng_number;
  +
  +   status = efi_call_early(handle_protocol, handles[0],
  +   rng_proto, (void **)rng);
  +   if (status != EFI_SUCCESS)
  +   efi_printk(sys_table, Failed to get EFI_RNG_PROTOCOL 
  handles\n);
  +
  +   if (status == EFI_SUCCESS  rng) {
  +   status = efi_early-call((unsigned long)rng-get_rng, rng, NULL,
  +   sizeof(rng_number), rng_number);
 
 Actually, one thing just occurred to me - you're not passing an
 RNGAlgorithm value and are relying upon the firmware's default
 implementation.
 
 I don't think that's a safe bet, the default could be anything and
 might vary across implementations.
 

I didn't set specific RNGAlgorithm because different BIOS may
set different algorithm as default, it's also a kind of random situation
to provide uncertainty.

On the other hand, if the specific RNGAlgorithm doesn't support by BIOS
then EFI stub still need use BIOS's _default_ algorithm to get random
value.

 Can we do a little better here and pick a preferred algorithm
 instead of the default?
 
 -- 
 Matt Fleming, Intel Open Source Technology Center

Per EDK2 implementation, EFI_RNG_ALGORITHM_SP800_90_CTR_256 is the default
algorithm that provided by driver, and EFI_RNG_ALGORITHM_RAW is the second
algorithm supported by EDK2. BIOS vendor need to write driver to support
others.

Maybe using EFI_RNG_ALGORITHM_SP800_90_CTR_256 as the default RNGAlgorithm
in efi_random can cover the most widely UEFI implementation, but when BIOS
do not support EFI_RNG_ALGORITHM_SP800_90_CTR_256 then kernel still need
use BIOS's _default_ setting.

I hope your suggestion.


Thanks a lot!
Joey Lee
--
To unsubscribe from this list: send the line unsubscribe linux-efi in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH v2 05/16] x86/efi: Get entropy through EFI random number generator protocol

2015-08-26 Thread joeyli
On Thu, Aug 20, 2015 at 03:47:06PM +0100, Matt Fleming wrote:
 On Tue, 11 Aug, at 02:16:25PM, Lee, Chun-Yi wrote:
  To grab random numbers through EFI protocol as one of the entropies
  source of swsusp key, this patch adds the logic for accessing EFI RNG
  (random number generator) protocol that's introduced since UEFI 2.4.
  
  Signed-off-by: Lee, Chun-Yi j...@suse.com
  ---
   arch/x86/boot/compressed/efi_random.c | 209 
  ++
   include/linux/efi.h   |  13 +++
   2 files changed, 222 insertions(+)
 
 [...]
 
 Most of this looks good.
 
  +static unsigned long efi_get_rng(efi_system_table_t *sys_table)
  +{
  +   const struct efi_config *efi_early = __efi_early();
  +   unsigned long random = 0;
  +   efi_status_t status;
  +   void **rng_handle = NULL;
  +
  +   status = efi_locate_rng(sys_table, rng_handle);
  +   if (status != EFI_SUCCESS)
  +   return 0;
  +
  +   if (efi_early-is64)
  +   random = efi_get_rng64(sys_table, rng_handle);
  +   else
  +   random = efi_get_rng32(sys_table, rng_handle);
  +
  +   efi_call_early(free_pool, rng_handle);
  +
  +   return random;
  +}
   
 I think this function is named particularly poorly in the UEFI spec
 (GetRNG), can we maybe make this efi_get_rng_number(),
 efi_get_rng_value() or efi_get_rng_long() to match the existing
 naming?


Thanks for your suggestion, I will change the naming of functions.
 
  diff --git a/include/linux/efi.h b/include/linux/efi.h
  index 85ef051..8914d60 100644
  --- a/include/linux/efi.h
  +++ b/include/linux/efi.h
  @@ -427,6 +427,16 @@ typedef struct {
   #define EFI_PCI_IO_ATTRIBUTE_VGA_PALETTE_IO_16 0x2
   #define EFI_PCI_IO_ATTRIBUTE_VGA_IO_16 0x4
   
  +typedef struct {
  +   u32 get_info;
  +   u32 get_rng;
  +} efi_rng_protocol_32;
  +
  +typedef struct {
  +   u64 get_info;
  +   u64 get_rng;
  +} efi_rng_protocol_64;
  +
 
 We've been kinda slack with the naming conventions in efi.h but these
 should really both be 'efi_rng_protocol_*_t'.
 

I will also change the name of struct here. 

 -- 
 Matt Fleming, Intel Open Source Technology Center


Thanks a lot!
Joey Lee
--
To unsubscribe from this list: send the line unsubscribe linux-efi in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH v2 05/16] x86/efi: Get entropy through EFI random number generator protocol

2015-08-20 Thread Matt Fleming
On Tue, 11 Aug, at 02:16:25PM, Lee, Chun-Yi wrote:
 +
 +static unsigned long efi_get_rng64(efi_system_table_t *sys_table,
 +void **rng_handle)
 +{
 + const struct efi_config *efi_early = __efi_early();
 + efi_rng_protocol_64 *rng = NULL;
 + efi_guid_t rng_proto = EFI_RNG_PROTOCOL_GUID;
 + u64 *handles = (u64 *)(unsigned long)rng_handle;
 + efi_status_t status;
 + unsigned long rng_number;
 +
 + status = efi_call_early(handle_protocol, handles[0],
 + rng_proto, (void **)rng);
 + if (status != EFI_SUCCESS)
 + efi_printk(sys_table, Failed to get EFI_RNG_PROTOCOL 
 handles\n);
 +
 + if (status == EFI_SUCCESS  rng) {
 + status = efi_early-call((unsigned long)rng-get_rng, rng, NULL,
 + sizeof(rng_number), rng_number);

Actually, one thing just occurred to me - you're not passing an
RNGAlgorithm value and are relying upon the firmware's default
implementation.

I don't think that's a safe bet, the default could be anything and
might vary across implementations.

Can we do a little better here and pick a preferred algorithm
instead of the default?

-- 
Matt Fleming, Intel Open Source Technology Center
--
To unsubscribe from this list: send the line unsubscribe linux-efi in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html