Re: [PATCH 1/2] cmd: kaslrseed: add command to generate value from hwrng

2021-10-24 Thread Simon Glass
Hi,

On Fri, 15 Oct 2021 at 23:48, Heinrich Schuchardt  wrote:
>
> Am 15. Oktober 2021 14:54:03 MESZ schrieb Kever Yang 
> :
> >Reviewed-by: Kever Yang 
> >
> >
> >Thanks,
> >- Kever
> >
> >Chris Morgan  于2021年8月26日周四 上午12:23写道:
> >>
> >> From: Chris Morgan 
> >>
> >> Allow the kaslr-seed value in the chosen node to be set from a hardware
> >> rng source.
> >>
> >> Tested on a Rockchip PX30 (Odroid Go Advance), you must have loaded
> >> the devicetree first and prepared it for editing. On my device the
> >> workflow goes as follows:
> >>
> >> setenv dtb_loadaddr "0x01f0"
> >> load mmc 0:1 ${dtb_loadaddr} rk3326-odroid-go2.dtb
> >> fdt addr ${dtb_loadaddr}
> >> fdt resize
> >> kaslrseed
>
> This seems overly complicated. Why don't you add the seed in the board fixup 
> routines in dependence on a Kconfig symbol.

I had the same thought. But perhaps we should be getting out of the
'fixup' business? That itself is complicated, with various different
levels of fixup. Perhaps a programmatic approach makes more sense?

So:

Reviewed-by: Simon Glass 


>
> Best regards
>
> Heinrich
>
>
> >>
> >> and the output can be seen here:
> >> fdt print /chosen
> >> chosen {
> >> kaslr-seed = <0x6f61df74 0x6f7b996c>;
> >> stdout-path = "serial2:115200n8";
> >> };
> >>
> >> Signed-off-by: Chris Morgan 
> >> ---
> >>  cmd/Kconfig |  7 +
> >>  cmd/Makefile|  1 +
> >>  cmd/kaslrseed.c | 81 +
> >>  3 files changed, 89 insertions(+)
> >>  create mode 100644 cmd/kaslrseed.c
> >>
> >> diff --git a/cmd/Kconfig b/cmd/Kconfig
> >> index ffef3cc76c..e62adff939 100644
> >> --- a/cmd/Kconfig
> >> +++ b/cmd/Kconfig
> >> @@ -1790,6 +1790,13 @@ config CMD_RNG
> >> help
> >>   Print bytes from the hardware random number generator.
> >>
> >> +config CMD_KASLRSEED
> >> +   bool "kaslrseed"
> >> +   depends on DM_RNG
> >> +   help
> >> + Set the kaslr-seed in the chosen node with entropy provided by a
> >> + hardware random number generator.
> >> +
> >>  config CMD_SLEEP
> >> bool "sleep"
> >> default y
> >> diff --git a/cmd/Makefile b/cmd/Makefile
> >> index ed3669411e..34cbda72f5 100644
> >> --- a/cmd/Makefile
> >> +++ b/cmd/Makefile
> >> @@ -131,6 +131,7 @@ obj-$(CONFIG_CMD_REGINFO) += reginfo.o
> >>  obj-$(CONFIG_CMD_REISER) += reiser.o
> >>  obj-$(CONFIG_CMD_REMOTEPROC) += remoteproc.o
> >>  obj-$(CONFIG_CMD_RNG) += rng.o
> >> +obj-$(CONFIG_CMD_KASLRSEED) += kaslrseed.o
> >>  obj-$(CONFIG_CMD_ROCKUSB) += rockusb.o
> >>  obj-$(CONFIG_CMD_RTC) += rtc.o
> >>  obj-$(CONFIG_SANDBOX) += host.o
> >> diff --git a/cmd/kaslrseed.c b/cmd/kaslrseed.c
> >> new file mode 100644
> >> index 00..27c2648c91
> >> --- /dev/null
> >> +++ b/cmd/kaslrseed.c
> >> @@ -0,0 +1,81 @@
> >> +// SPDX-License-Identifier: GPL-2.0+
> >> +/*
> >> + * The 'kaslrseed' command takes bytes from the hardware random number
> >> + * generator and uses them to set the kaslr-seed value in the chosen node.
> >> + *
> >> + * Copyright (c) 2021, Chris Morgan 
> >> + */
> >> +
> >> +#include 
> >> +#include 
> >> +#include 
> >> +#include 
> >> +#include 
> >> +#include 
> >> +#include 
> >> +
> >> +static int do_kaslr_seed(struct cmd_tbl *cmdtp, int flag, int argc, char 
> >> *const argv[])
> >> +{
> >> +   size_t n = 0x8;
> >> +   struct udevice *dev;
> >> +   u64 *buf;
> >> +   int nodeoffset;
> >> +   int ret = CMD_RET_SUCCESS;
> >> +
> >> +   if (uclass_get_device(UCLASS_RNG, 0, ) || !dev) {
> >> +   printf("No RNG device\n");
> >> +   return CMD_RET_FAILURE;
> >> +   }
> >> +
> >> +   buf = malloc(n);
> >> +   if (!buf) {
> >> +   printf("Out of memory\n");
> >> +   return CMD_RET_FAILURE;
> >> +   }
> >> +
> >> +   if (dm_rng_read(dev, buf, n)) {
> >> +   printf("Reading RNG failed\n");
> >> +   return CMD_RET_FAILURE;
> >> +   }
> >> +
> >> +   if (!working_fdt) {
> >> +   printf("No FDT memory address configured. Please 
> >> configure\n"
> >> +  "the FDT address via \"fdt addr \" 
> >> command.\n"
> >> +  "Aborting!\n");
> >> +   return CMD_RET_FAILURE;
> >> +   }
> >> +
> >> +   ret = fdt_check_header(working_fdt);
> >> +   if (ret < 0) {
> >> +   printf("fdt_chosen: %s\n", fdt_strerror(ret));
> >> +   return CMD_RET_FAILURE;
> >> +   }
> >> +
> >> +   nodeoffset = fdt_find_or_add_subnode(working_fdt, 0, "chosen");
> >> +   if (nodeoffset < 0) {
> >> +   printf("Reading chosen node failed\n");
> >> +   return CMD_RET_FAILURE;
> >> +   }
> >> +
> >> +   ret = fdt_setprop(working_fdt, nodeoffset, "kaslr-seed", buf, 
> >> sizeof(buf));
> >> +   if (ret < 0) {
> >> +   printf("Unable to set kaslr-seed on chosen node: %s\n", 
> >> fdt_strerror(ret));
> >> 

Re: [PATCH 1/2] cmd: kaslrseed: add command to generate value from hwrng

2021-10-15 Thread Heinrich Schuchardt
Am 15. Oktober 2021 14:54:03 MESZ schrieb Kever Yang 
:
>Reviewed-by: Kever Yang 
>
>
>Thanks,
>- Kever
>
>Chris Morgan  于2021年8月26日周四 上午12:23写道:
>>
>> From: Chris Morgan 
>>
>> Allow the kaslr-seed value in the chosen node to be set from a hardware
>> rng source.
>>
>> Tested on a Rockchip PX30 (Odroid Go Advance), you must have loaded
>> the devicetree first and prepared it for editing. On my device the
>> workflow goes as follows:
>>
>> setenv dtb_loadaddr "0x01f0"
>> load mmc 0:1 ${dtb_loadaddr} rk3326-odroid-go2.dtb
>> fdt addr ${dtb_loadaddr}
>> fdt resize
>> kaslrseed

This seems overly complicated. Why don't you add the seed in the board fixup 
routines in dependence on a Kconfig symbol.

Best regards

Heinrich


>>
>> and the output can be seen here:
>> fdt print /chosen
>> chosen {
>> kaslr-seed = <0x6f61df74 0x6f7b996c>;
>> stdout-path = "serial2:115200n8";
>> };
>>
>> Signed-off-by: Chris Morgan 
>> ---
>>  cmd/Kconfig |  7 +
>>  cmd/Makefile|  1 +
>>  cmd/kaslrseed.c | 81 +
>>  3 files changed, 89 insertions(+)
>>  create mode 100644 cmd/kaslrseed.c
>>
>> diff --git a/cmd/Kconfig b/cmd/Kconfig
>> index ffef3cc76c..e62adff939 100644
>> --- a/cmd/Kconfig
>> +++ b/cmd/Kconfig
>> @@ -1790,6 +1790,13 @@ config CMD_RNG
>> help
>>   Print bytes from the hardware random number generator.
>>
>> +config CMD_KASLRSEED
>> +   bool "kaslrseed"
>> +   depends on DM_RNG
>> +   help
>> + Set the kaslr-seed in the chosen node with entropy provided by a
>> + hardware random number generator.
>> +
>>  config CMD_SLEEP
>> bool "sleep"
>> default y
>> diff --git a/cmd/Makefile b/cmd/Makefile
>> index ed3669411e..34cbda72f5 100644
>> --- a/cmd/Makefile
>> +++ b/cmd/Makefile
>> @@ -131,6 +131,7 @@ obj-$(CONFIG_CMD_REGINFO) += reginfo.o
>>  obj-$(CONFIG_CMD_REISER) += reiser.o
>>  obj-$(CONFIG_CMD_REMOTEPROC) += remoteproc.o
>>  obj-$(CONFIG_CMD_RNG) += rng.o
>> +obj-$(CONFIG_CMD_KASLRSEED) += kaslrseed.o
>>  obj-$(CONFIG_CMD_ROCKUSB) += rockusb.o
>>  obj-$(CONFIG_CMD_RTC) += rtc.o
>>  obj-$(CONFIG_SANDBOX) += host.o
>> diff --git a/cmd/kaslrseed.c b/cmd/kaslrseed.c
>> new file mode 100644
>> index 00..27c2648c91
>> --- /dev/null
>> +++ b/cmd/kaslrseed.c
>> @@ -0,0 +1,81 @@
>> +// SPDX-License-Identifier: GPL-2.0+
>> +/*
>> + * The 'kaslrseed' command takes bytes from the hardware random number
>> + * generator and uses them to set the kaslr-seed value in the chosen node.
>> + *
>> + * Copyright (c) 2021, Chris Morgan 
>> + */
>> +
>> +#include 
>> +#include 
>> +#include 
>> +#include 
>> +#include 
>> +#include 
>> +#include 
>> +
>> +static int do_kaslr_seed(struct cmd_tbl *cmdtp, int flag, int argc, char 
>> *const argv[])
>> +{
>> +   size_t n = 0x8;
>> +   struct udevice *dev;
>> +   u64 *buf;
>> +   int nodeoffset;
>> +   int ret = CMD_RET_SUCCESS;
>> +
>> +   if (uclass_get_device(UCLASS_RNG, 0, ) || !dev) {
>> +   printf("No RNG device\n");
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   buf = malloc(n);
>> +   if (!buf) {
>> +   printf("Out of memory\n");
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   if (dm_rng_read(dev, buf, n)) {
>> +   printf("Reading RNG failed\n");
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   if (!working_fdt) {
>> +   printf("No FDT memory address configured. Please configure\n"
>> +  "the FDT address via \"fdt addr \" 
>> command.\n"
>> +  "Aborting!\n");
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   ret = fdt_check_header(working_fdt);
>> +   if (ret < 0) {
>> +   printf("fdt_chosen: %s\n", fdt_strerror(ret));
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   nodeoffset = fdt_find_or_add_subnode(working_fdt, 0, "chosen");
>> +   if (nodeoffset < 0) {
>> +   printf("Reading chosen node failed\n");
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   ret = fdt_setprop(working_fdt, nodeoffset, "kaslr-seed", buf, 
>> sizeof(buf));
>> +   if (ret < 0) {
>> +   printf("Unable to set kaslr-seed on chosen node: %s\n", 
>> fdt_strerror(ret));
>> +   return CMD_RET_FAILURE;
>> +   }
>> +
>> +   free(buf);
>> +
>> +   return ret;
>> +}
>> +
>> +#ifdef CONFIG_SYS_LONGHELP
>> +static char kaslrseed_help_text[] =
>> +   "[n]\n"
>> +   "  - append random bytes to chosen kaslr-seed node\n";
>> +#endif
>> +
>> +U_BOOT_CMD(
>> +   kaslrseed, 1, 0, do_kaslr_seed,
>> +   "feed bytes from the hardware random number generator to the 
>> kaslr-seed",
>> +   kaslrseed_help_text
>> +);
>> --
>> 2.25.1
>>



Re: [PATCH 1/2] cmd: kaslrseed: add command to generate value from hwrng

2021-10-15 Thread Kever Yang
Reviewed-by: Kever Yang 


Thanks,
- Kever

Chris Morgan  于2021年8月26日周四 上午12:23写道:
>
> From: Chris Morgan 
>
> Allow the kaslr-seed value in the chosen node to be set from a hardware
> rng source.
>
> Tested on a Rockchip PX30 (Odroid Go Advance), you must have loaded
> the devicetree first and prepared it for editing. On my device the
> workflow goes as follows:
>
> setenv dtb_loadaddr "0x01f0"
> load mmc 0:1 ${dtb_loadaddr} rk3326-odroid-go2.dtb
> fdt addr ${dtb_loadaddr}
> fdt resize
> kaslrseed
>
> and the output can be seen here:
> fdt print /chosen
> chosen {
> kaslr-seed = <0x6f61df74 0x6f7b996c>;
> stdout-path = "serial2:115200n8";
> };
>
> Signed-off-by: Chris Morgan 
> ---
>  cmd/Kconfig |  7 +
>  cmd/Makefile|  1 +
>  cmd/kaslrseed.c | 81 +
>  3 files changed, 89 insertions(+)
>  create mode 100644 cmd/kaslrseed.c
>
> diff --git a/cmd/Kconfig b/cmd/Kconfig
> index ffef3cc76c..e62adff939 100644
> --- a/cmd/Kconfig
> +++ b/cmd/Kconfig
> @@ -1790,6 +1790,13 @@ config CMD_RNG
> help
>   Print bytes from the hardware random number generator.
>
> +config CMD_KASLRSEED
> +   bool "kaslrseed"
> +   depends on DM_RNG
> +   help
> + Set the kaslr-seed in the chosen node with entropy provided by a
> + hardware random number generator.
> +
>  config CMD_SLEEP
> bool "sleep"
> default y
> diff --git a/cmd/Makefile b/cmd/Makefile
> index ed3669411e..34cbda72f5 100644
> --- a/cmd/Makefile
> +++ b/cmd/Makefile
> @@ -131,6 +131,7 @@ obj-$(CONFIG_CMD_REGINFO) += reginfo.o
>  obj-$(CONFIG_CMD_REISER) += reiser.o
>  obj-$(CONFIG_CMD_REMOTEPROC) += remoteproc.o
>  obj-$(CONFIG_CMD_RNG) += rng.o
> +obj-$(CONFIG_CMD_KASLRSEED) += kaslrseed.o
>  obj-$(CONFIG_CMD_ROCKUSB) += rockusb.o
>  obj-$(CONFIG_CMD_RTC) += rtc.o
>  obj-$(CONFIG_SANDBOX) += host.o
> diff --git a/cmd/kaslrseed.c b/cmd/kaslrseed.c
> new file mode 100644
> index 00..27c2648c91
> --- /dev/null
> +++ b/cmd/kaslrseed.c
> @@ -0,0 +1,81 @@
> +// SPDX-License-Identifier: GPL-2.0+
> +/*
> + * The 'kaslrseed' command takes bytes from the hardware random number
> + * generator and uses them to set the kaslr-seed value in the chosen node.
> + *
> + * Copyright (c) 2021, Chris Morgan 
> + */
> +
> +#include 
> +#include 
> +#include 
> +#include 
> +#include 
> +#include 
> +#include 
> +
> +static int do_kaslr_seed(struct cmd_tbl *cmdtp, int flag, int argc, char 
> *const argv[])
> +{
> +   size_t n = 0x8;
> +   struct udevice *dev;
> +   u64 *buf;
> +   int nodeoffset;
> +   int ret = CMD_RET_SUCCESS;
> +
> +   if (uclass_get_device(UCLASS_RNG, 0, ) || !dev) {
> +   printf("No RNG device\n");
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   buf = malloc(n);
> +   if (!buf) {
> +   printf("Out of memory\n");
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   if (dm_rng_read(dev, buf, n)) {
> +   printf("Reading RNG failed\n");
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   if (!working_fdt) {
> +   printf("No FDT memory address configured. Please configure\n"
> +  "the FDT address via \"fdt addr \" command.\n"
> +  "Aborting!\n");
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   ret = fdt_check_header(working_fdt);
> +   if (ret < 0) {
> +   printf("fdt_chosen: %s\n", fdt_strerror(ret));
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   nodeoffset = fdt_find_or_add_subnode(working_fdt, 0, "chosen");
> +   if (nodeoffset < 0) {
> +   printf("Reading chosen node failed\n");
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   ret = fdt_setprop(working_fdt, nodeoffset, "kaslr-seed", buf, 
> sizeof(buf));
> +   if (ret < 0) {
> +   printf("Unable to set kaslr-seed on chosen node: %s\n", 
> fdt_strerror(ret));
> +   return CMD_RET_FAILURE;
> +   }
> +
> +   free(buf);
> +
> +   return ret;
> +}
> +
> +#ifdef CONFIG_SYS_LONGHELP
> +static char kaslrseed_help_text[] =
> +   "[n]\n"
> +   "  - append random bytes to chosen kaslr-seed node\n";
> +#endif
> +
> +U_BOOT_CMD(
> +   kaslrseed, 1, 0, do_kaslr_seed,
> +   "feed bytes from the hardware random number generator to the 
> kaslr-seed",
> +   kaslrseed_help_text
> +);
> --
> 2.25.1
>


[PATCH 1/2] cmd: kaslrseed: add command to generate value from hwrng

2021-08-25 Thread Chris Morgan
From: Chris Morgan 

Allow the kaslr-seed value in the chosen node to be set from a hardware
rng source.

Tested on a Rockchip PX30 (Odroid Go Advance), you must have loaded
the devicetree first and prepared it for editing. On my device the
workflow goes as follows:

setenv dtb_loadaddr "0x01f0"
load mmc 0:1 ${dtb_loadaddr} rk3326-odroid-go2.dtb
fdt addr ${dtb_loadaddr}
fdt resize
kaslrseed

and the output can be seen here:
fdt print /chosen
chosen {
kaslr-seed = <0x6f61df74 0x6f7b996c>;
stdout-path = "serial2:115200n8";
};

Signed-off-by: Chris Morgan 
---
 cmd/Kconfig |  7 +
 cmd/Makefile|  1 +
 cmd/kaslrseed.c | 81 +
 3 files changed, 89 insertions(+)
 create mode 100644 cmd/kaslrseed.c

diff --git a/cmd/Kconfig b/cmd/Kconfig
index ffef3cc76c..e62adff939 100644
--- a/cmd/Kconfig
+++ b/cmd/Kconfig
@@ -1790,6 +1790,13 @@ config CMD_RNG
help
  Print bytes from the hardware random number generator.
 
+config CMD_KASLRSEED
+   bool "kaslrseed"
+   depends on DM_RNG
+   help
+ Set the kaslr-seed in the chosen node with entropy provided by a
+ hardware random number generator.
+
 config CMD_SLEEP
bool "sleep"
default y
diff --git a/cmd/Makefile b/cmd/Makefile
index ed3669411e..34cbda72f5 100644
--- a/cmd/Makefile
+++ b/cmd/Makefile
@@ -131,6 +131,7 @@ obj-$(CONFIG_CMD_REGINFO) += reginfo.o
 obj-$(CONFIG_CMD_REISER) += reiser.o
 obj-$(CONFIG_CMD_REMOTEPROC) += remoteproc.o
 obj-$(CONFIG_CMD_RNG) += rng.o
+obj-$(CONFIG_CMD_KASLRSEED) += kaslrseed.o
 obj-$(CONFIG_CMD_ROCKUSB) += rockusb.o
 obj-$(CONFIG_CMD_RTC) += rtc.o
 obj-$(CONFIG_SANDBOX) += host.o
diff --git a/cmd/kaslrseed.c b/cmd/kaslrseed.c
new file mode 100644
index 00..27c2648c91
--- /dev/null
+++ b/cmd/kaslrseed.c
@@ -0,0 +1,81 @@
+// SPDX-License-Identifier: GPL-2.0+
+/*
+ * The 'kaslrseed' command takes bytes from the hardware random number
+ * generator and uses them to set the kaslr-seed value in the chosen node.
+ *
+ * Copyright (c) 2021, Chris Morgan 
+ */
+
+#include 
+#include 
+#include 
+#include 
+#include 
+#include 
+#include 
+
+static int do_kaslr_seed(struct cmd_tbl *cmdtp, int flag, int argc, char 
*const argv[])
+{
+   size_t n = 0x8;
+   struct udevice *dev;
+   u64 *buf;
+   int nodeoffset;
+   int ret = CMD_RET_SUCCESS;
+
+   if (uclass_get_device(UCLASS_RNG, 0, ) || !dev) {
+   printf("No RNG device\n");
+   return CMD_RET_FAILURE;
+   }
+
+   buf = malloc(n);
+   if (!buf) {
+   printf("Out of memory\n");
+   return CMD_RET_FAILURE;
+   }
+
+   if (dm_rng_read(dev, buf, n)) {
+   printf("Reading RNG failed\n");
+   return CMD_RET_FAILURE;
+   }
+
+   if (!working_fdt) {
+   printf("No FDT memory address configured. Please configure\n"
+  "the FDT address via \"fdt addr \" command.\n"
+  "Aborting!\n");
+   return CMD_RET_FAILURE;
+   }
+
+   ret = fdt_check_header(working_fdt);
+   if (ret < 0) {
+   printf("fdt_chosen: %s\n", fdt_strerror(ret));
+   return CMD_RET_FAILURE;
+   }
+
+   nodeoffset = fdt_find_or_add_subnode(working_fdt, 0, "chosen");
+   if (nodeoffset < 0) {
+   printf("Reading chosen node failed\n");
+   return CMD_RET_FAILURE;
+   }
+
+   ret = fdt_setprop(working_fdt, nodeoffset, "kaslr-seed", buf, 
sizeof(buf));
+   if (ret < 0) {
+   printf("Unable to set kaslr-seed on chosen node: %s\n", 
fdt_strerror(ret));
+   return CMD_RET_FAILURE;
+   }
+
+   free(buf);
+
+   return ret;
+}
+
+#ifdef CONFIG_SYS_LONGHELP
+static char kaslrseed_help_text[] =
+   "[n]\n"
+   "  - append random bytes to chosen kaslr-seed node\n";
+#endif
+
+U_BOOT_CMD(
+   kaslrseed, 1, 0, do_kaslr_seed,
+   "feed bytes from the hardware random number generator to the 
kaslr-seed",
+   kaslrseed_help_text
+);
-- 
2.25.1