public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "PierreGondois" <pierre.gondois@arm.com>
To: Ard Biesheuvel <ardb@kernel.org>, Sami Mujawar <Sami.Mujawar@arm.com>
Cc: "devel@edk2.groups.io" <devel@edk2.groups.io>,
	Ard Biesheuvel <ardb+tianocore@kernel.org>,
	Liming Gao <gaoliming@byosoft.com.cn>,
	Jiewen Yao <jiewen.yao@intel.com>,
	Jian J Wang <jian.j.wang@intel.com>, nd <nd@arm.com>
Subject: Re: [edk2-devel] [PATCH v2 1/1] SecurityPkg/RngDxe: Fix Rng algo selection for Arm
Date: Fri, 18 Nov 2022 11:32:06 +0100	[thread overview]
Message-ID: <f6ae4dd9-ad5c-64a7-bd1f-c6b3cc65e972@arm.com> (raw)
In-Reply-To: <CAMj1kXFYghiQ6pexXbeMsZ+jpBv3fV0=3pww3moD2VNw2LjXjg@mail.gmail.com>



On 11/18/22 11:14, Ard Biesheuvel wrote:
> On Fri, 18 Nov 2022 at 11:10, Sami Mujawar <Sami.Mujawar@arm.com> wrote:
>>
>> Hi Ard,
>>
>> Please find my response inline marked [SAMI].
>>
>> Regards,
>>
>> Sami Mujawar
>>
>> On 18/11/2022, 09:56, "Ard Biesheuvel" <ardb@kernel.org> wrote:
>>
>>      On Wed, 16 Nov 2022 at 16:02, PierreGondois <pierre.gondois@arm.com> wrote:
>>      >
>>      > From: Pierre Gondois <pierre.gondois@arm.com>
>>      >
>>      > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4151
>>      >
>>      > The EFI_RNG_PROTOCOL can advertise multiple algorithms through
>>      > Guids. The PcdCpuRngSupportedAlgorithm contains a Guid that
>>      > can be configured. It represents the algorithm used in RngLib.
>>      > PcdCpuRngSupportedAlgorithm is set to the Zero Guid for KvmTool.
>>      >
>>      > When running KvmTool on a platform platform only having the RngLib,
>>      > the only Guid available for EFI_RNG_PROTOCOL will be the zero Guid.
>>      >
>>      > To select the default algorithm in EFI_RNG_PROTOCOL.GetRng():
>>      > a. Zero Guids are skipped
>>      > b. If no algorithm is found, an ASSERT is triggered
>>      >
>>      > To allow using the RngLib to be used for the case above, Zero Guids
>>      > should not be skipped (a.).
>>      > If no algorithm is found, don't prevent from booting on DEBUG builds
>>      > (b.).
>>      >
>>      > Allow Zero Guids to be selected and don't ASSERT if no algorithm is
>>      > found. Also simplify the selection of the Rng algorithm when the
>>      > default one is selected by just picking up the first element of
>>      > mAvailableAlgoArray.
>>      >
>>      > Reported-by: Sami Mujawar <sami.mujawar@arm.com>
>>      > Signed-off-by: Pierre Gondois <Pierre.Gondois@arm.com>
>>
>>      I am still confused by this.
>>
>>      Does this mean we might register the RNG protocol if we don't have
>>      anything to back it up?
>> [SAMI] From a Guest firmware implementation perspective, we do not know the available RNG source.
>> It may be CPU RNG, Arm FW TRNG or VIRTIO RNG.
>> I would assume either one of CPU RNG or Arm FW TRNG would be implemented on the host platform. If none of these are present, we would want to fall back to VIRTIO RNG.
>>
>> Considering this, I think we should not register the EFI_RNG_PRTOCOL if no supported algorithms are present.
>>
>> The other argument would be that the protocol allows discovery of supported RNG source. But looking how this is consumed in Linux, I think it is better to not register EFI_RNG_PRTOCOL if no supported algorithms are present.
>>
>> Please do let me know your thoughts.
> 
> Agreed. I am adding support for the TRNG to the QEMU firmware, and if
> this is supported, there is really no point in attaching a driver to
> virtio-rng as well.
> 
> This means that checking for the existence of the EFI_RNG_PROTOCOL
> should be sufficient to decide whether or not install another one.

Hello,
There would maybe be a case where the consumer explicitly requests the
gEfiRngAlgorithmRaw GUID and the RngDxe doesn't detect it. So there would be
two EFI_RNG_PRTOCOL registered on different handles with different
algorithms available. I am not sure of what should happen then.

But about the inital point, EFI_RNG_PRTOCOL should indeed not be registered
if no algorithm is available.

Regards,
Pierre

  reply	other threads:[~2022-11-18 10:32 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-11-16 15:01 [PATCH v2 1/1] SecurityPkg/RngDxe: Fix Rng algo selection for Arm PierreGondois
2022-11-18  9:55 ` [edk2-devel] " Ard Biesheuvel
2022-11-18 10:10   ` Sami Mujawar
2022-11-18 10:14     ` Ard Biesheuvel
2022-11-18 10:32       ` PierreGondois [this message]
2022-11-18 10:35         ` Ard Biesheuvel
2022-11-18 10:50           ` PierreGondois

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f6ae4dd9-ad5c-64a7-bd1f-c6b3cc65e972@arm.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox