diff options
author | Richard Henderson <richard.henderson@linaro.org> | 2020-01-21 15:58:52 +0300 |
---|---|---|
committer | Will Deacon <will@kernel.org> | 2020-01-22 12:54:18 +0300 |
commit | 1a50ec0b3b2e9a83f1b1245ea37a853aac2f741c (patch) | |
tree | 14509c3a940e8c2072ff34ffef36d0c53c9905b6 /arch/arm64/kernel/kaslr.c | |
parent | 46cf053efec6a3a5f343fead837777efe8252a46 (diff) | |
download | linux-1a50ec0b3b2e9a83f1b1245ea37a853aac2f741c.tar.xz |
arm64: Implement archrandom.h for ARMv8.5-RNG
Expose the ID_AA64ISAR0.RNDR field to userspace, as the RNG system
registers are always available at EL0.
Implement arch_get_random_seed_long using RNDR. Given that the
TRNG is likely to be a shared resource between cores, and VMs,
do not explicitly force re-seeding with RNDRRS. In order to avoid
code complexity and potential issues with hetrogenous systems only
provide values after cpufeature has finalized the system capabilities.
Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
[Modified to only function after cpufeature has finalized the system
capabilities and move all the code into the header -- broonie]
Signed-off-by: Mark Brown <broonie@kernel.org>
Reviewed-by: Mark Rutland <mark.rutland@arm.com>
Reviewed-by: Ard Biesheuvel <ardb@kernel.org>
[will: Advertise HWCAP via /proc/cpuinfo]
Signed-off-by: Will Deacon <will@kernel.org>
Diffstat (limited to 'arch/arm64/kernel/kaslr.c')
0 files changed, 0 insertions, 0 deletions