~kamalmostafa/ubuntu/+source/linux-aws/+git/disco:lp1859192/graviton-entropy

Last commit made on 2020-01-10
Get this branch:
git clone -b lp1859192/graviton-entropy https://git.launchpad.net/~kamalmostafa/ubuntu/+source/linux-aws/+git/disco
Only Kamal Mostafa can upload to this branch. If you are Kamal Mostafa please log in for upload directions.

Branch merges

Branch information

Name:
lp1859192/graviton-entropy
Repository:
lp:~kamalmostafa/ubuntu/+source/linux-aws/+git/disco

Recent commits

00a20e6... by Dominik Brodowski <email address hidden>

efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness

BugLink: https://bugs.launchpad.net/bugs/1859192

Commit 428826f5358c ("fdt: add support for rng-seed") introduced
add_bootloader_randomness(), permitting randomness provided by the
bootloader or firmware to be credited as entropy. However, the fact
that the UEFI support code was already wired into the RNG subsystem
via a call to add_device_randomness() was overlooked, and so it was
not converted at the same time.

Note that this UEFI (v2.4 or newer) feature is currently only
implemented for EFI stub booting on ARM, and further note that
CONFIG_RANDOM_TRUST_BOOTLOADER must be enabled, and this should be
done only if there indeed is sufficient trust in the bootloader
_and_ its source of randomness.

[ ardb: update commit log ]

Tested-by: Bhupesh Sharma <email address hidden>
Signed-off-by: Dominik Brodowski <email address hidden>
Signed-off-by: Ard Biesheuvel <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: Peter Zijlstra <email address hidden>
Cc: Thomas Gleixner <email address hidden>
Cc: <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Ingo Molnar <email address hidden>
(cherry picked from commit 18b915ac6b0ac5ba7ded03156860f60a9f16df2b)
Signed-off-by: Kamal Mostafa <email address hidden>

e378908... by Hsin-Yi Wang <email address hidden>

fdt: add support for rng-seed

BugLink: https://bugs.launchpad.net/bugs/1859192

Introducing a chosen node, rng-seed, which is an entropy that can be
passed to kernel called very early to increase initial device
randomness. Bootloader should provide this entropy and the value is
read from /chosen/rng-seed in DT.

Obtain of_fdt_crc32 for CRC check after early_init_dt_scan_nodes(),
since early_init_dt_scan_chosen() would modify fdt to erase rng-seed.

Add a new interface add_bootloader_randomness() for rng-seed use case.
Depends on whether the seed is trustworthy, rng seed would be passed to
add_hwgenerator_randomness(). Otherwise it would be passed to
add_device_randomness(). Decision is controlled by kernel config
RANDOM_TRUST_BOOTLOADER.

Signed-off-by: Hsin-Yi Wang <email address hidden>
Reviewed-by: Stephen Boyd <email address hidden>
Reviewed-by: Rob Herring <email address hidden>
Reviewed-by: Theodore Ts'o <email address hidden> # drivers/char/random.c
Signed-off-by: Will Deacon <email address hidden>
(cherry picked from commit 428826f5358c922dc378830a1717b682c0823160)
Signed-off-by: Kamal Mostafa <email address hidden>

639f658... by Kamal Mostafa

UBUNTU: aws: [Config] CONFIG_RANDOM_TRUST_BOOTLOADER=y for arm64

BugLink: https://bugs.launchpad.net/bugs/1859192

Enable RANDOM_TRUST_BOOTLOADER for AWS Graviton instances.

Signed-off-by: Kamal Mostafa <email address hidden>

50f58e3... by Gal Pressman <email address hidden>

UBUNTU: SAUCE: linux/efa: Bump driver version to 1.5.0

BugLink: https://bugs.launchpad.net/bugs/1850195

Reviewed-by: Firas JahJah <email address hidden>
Reviewed-by: Yossi Leybovich <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

1def8e8... by Gal Pressman <email address hidden>

UBUNTU: SAUCE: linux/efa: SuSE 15.1 support

BugLink: https://bugs.launchpad.net/bugs/1850195

Add support for SuSE 15.1 AMI.

Reviewed-by: Firas JahJah <email address hidden>
Reviewed-by: Yossi Leybovich <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

1c9d3a6... by Gal Pressman <email address hidden>

UBUNTU: SAUCE: linux/efa: Check sscanf return value

BugLink: https://bugs.launchpad.net/bugs/1850195

Check for errors in sscanf return value.

Reviewed-by: Firas JahJah <email address hidden>
Reviewed-by: Yossi Leybovich <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

93409b4... by Gal Pressman <email address hidden>

UBUNTU: SAUCE: linux/efa: Backport missing driver id

BugLink: https://bugs.launchpad.net/bugs/1850195

The timeframe between the addition of driver id validation and EFA
upstreaming doesn't work with ioctl because of missing EFA driver id.
Backport it to fix kernels between v4.17 and v5.1.

Reviewed-by: Firas JahJah <email address hidden>
Reviewed-by: Yossi Leybovich <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

82e90b1... by Gal Pressman <email address hidden>

UBUNTU: SAUCE: linux/efa: Use the ib_port_phys_state enum values

BugLink: https://bugs.launchpad.net/bugs/1850195

On older kernels override it with a define in kcompat.

Reviewed-by: Firas JahJah <email address hidden>
Reviewed-by: Yossi Leybovich <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

270ab5e... by Gal Pressman <email address hidden>

UBUNTU: SAUCE: linux/efa: Add ib_uverbs as a soft dependency

BugLink: https://bugs.launchpad.net/bugs/1850195

ib_uverbs must have be loaded in order to work with EFA, add it as a
soft dependency.

Reviewed-by: Firas JahJah <email address hidden>
Reviewed-by: Yossi Leybovich <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

4191623... by Daniel Kranzdorf <email address hidden>

UBUNTU: SAUCE: linux/efa: Expose RDMA read related attributes

BugLink: https://bugs.launchpad.net/bugs/1850195

Query the device attributes for RDMA operations, including maximum
transfer size and maximum number of SGEs per RDMA WR, and report them
back to the userspace library.

Signed-off-by: Daniel Kranzdorf <email address hidden>
Reviewed-by: Firas JahJah <email address hidden>
Signed-off-by: Gal Pressman <email address hidden>
Reference: https://github.com/amzn/amzn-drivers/releases/tag/efa_linux_1.5.0
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Acked-by: Marcelo Henrique Cerri <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>