* [PATCH v1 2/3] hw_random: add driver for Freescale RNGC
2017-03-13 13:42 [PATCH v1 1/3] drivers: add simple hw_random implementation Oleksij Rempel
@ 2017-03-13 13:42 ` Oleksij Rempel
2017-03-13 13:42 ` [PATCH v1 3/3] lib: random: get_random_bytes from HWRNG if present Oleksij Rempel
2017-03-14 7:55 ` [PATCH v1 1/3] drivers: add simple hw_random implementation Sascha Hauer
2 siblings, 0 replies; 4+ messages in thread
From: Oleksij Rempel @ 2017-03-13 13:42 UTC (permalink / raw)
To: barebox; +Cc: Oleksij Rempel, Steffen Trumtrar
From: Steffen Trumtrar <s.trumtrar@pengutronix.de>
The driver is ported from Freescales Linux git and can be
found in the
vendor/freescale/imx_2.6.35_maintain
branch.
According to that code, the RNGC is found on Freescales i.MX3/5 SoCs.
The i.MX2x actually has an RNGB, which has no driver implementation
in Freescales kernel. However as it turns out, the driver for the RNGC
works fine on the (at least) i.MX25. So, they seem to be somewhat
compatible.
Signed-off-by: Steffen Trumtrar <s.trumtrar@pengutronix.de>
Signed-off-by: Oleksij Rempel <o.rempel@pengutronix.de>
---
drivers/hw_random/Kconfig | 11 ++
drivers/hw_random/Makefile | 1 +
drivers/hw_random/mxc-rngc.c | 305 +++++++++++++++++++++++++++++++++++++++++++
3 files changed, 317 insertions(+)
create mode 100644 drivers/hw_random/mxc-rngc.c
diff --git a/drivers/hw_random/Kconfig b/drivers/hw_random/Kconfig
index 807fcadd3..d1297a48d 100644
--- a/drivers/hw_random/Kconfig
+++ b/drivers/hw_random/Kconfig
@@ -4,3 +4,14 @@ menuconfig HWRNG
Support for HWRNG(Hardware Random Number Generator) devices.
If unsure, say no.
+
+if HWRNG
+
+config HWRNG_MXC_RNGC
+ tristate "Freescale i.MX RNGC Random Number Generator"
+ depends on ARCH_IMX25 || ARCH_IMX35 || ARCH_IMX53
+ help
+ This driver provides kernel-side support for the Random Number
+ Generator hardware found on some Freescale i.MX processors.
+
+endif
diff --git a/drivers/hw_random/Makefile b/drivers/hw_random/Makefile
index 15307b100..79c238c48 100644
--- a/drivers/hw_random/Makefile
+++ b/drivers/hw_random/Makefile
@@ -1 +1,2 @@
obj-$(CONFIG_HWRNG) += core.o
+obj-$(CONFIG_HWRNG_MXC_RNGC) += mxc-rngc.o
diff --git a/drivers/hw_random/mxc-rngc.c b/drivers/hw_random/mxc-rngc.c
new file mode 100644
index 000000000..b00c0d135
--- /dev/null
+++ b/drivers/hw_random/mxc-rngc.c
@@ -0,0 +1,305 @@
+/*
+ * RNG driver for Freescale RNGC
+ *
+ * Copyright (C) 2008-2012 Freescale Semiconductor, Inc.
+ */
+
+/*
+ * The code contained herein is licensed under the GNU General Public
+ * License. You may obtain a copy of the GNU General Public License
+ * Version 2 or later at the following locations:
+ *
+ * http://www.opensource.org/licenses/gpl-license.html
+ * http://www.gnu.org/copyleft/gpl.html
+ */
+
+/*
+ * Hardware driver for the Intel/AMD/VIA Random Number Generators (RNG)
+ * (c) Copyright 2003 Red Hat Inc <jgarzik@redhat.com>
+ *
+ * derived from
+ *
+ * Hardware driver for the AMD 768 Random Number Generator (RNG)
+ * (c) Copyright 2001 Red Hat Inc <alan@redhat.com>
+ *
+ * derived from
+ *
+ * Hardware driver for Intel i810 Random Number Generator (RNG)
+ * Copyright 2000,2001 Jeff Garzik <jgarzik@pobox.com>
+ * Copyright 2000,2001 Philipp Rumpf <prumpf@mandrakesoft.com>
+ *
+ * This file is licensed under the terms of the GNU General Public
+ * License version 2. This program is licensed "as is" without any
+ * warranty of any kind, whether express or implied.
+ */
+
+#include <common.h>
+#include <clock.h>
+#include <driver.h>
+#include <init.h>
+#include <io.h>
+#include <linux/clk.h>
+#include <linux/hw_random.h>
+
+#define RNGC_VERSION_MAJOR3 3
+
+#define RNGC_VERSION_ID 0x0000
+#define RNGC_COMMAND 0x0004
+#define RNGC_CONTROL 0x0008
+#define RNGC_STATUS 0x000C
+#define RNGC_ERROR 0x0010
+#define RNGC_FIFO 0x0014
+#define RNGC_VERIF_CTRL 0x0020
+#define RNGC_OSC_CTRL_COUNT 0x0028
+#define RNGC_OSC_COUNT 0x002C
+#define RNGC_OSC_COUNT_STATUS 0x0030
+
+#define RNGC_VERID_ZEROS_MASK 0x0f000000
+#define RNGC_VERID_RNG_TYPE_MASK 0xf0000000
+#define RNGC_VERID_RNG_TYPE_SHIFT 28
+#define RNGC_VERID_CHIP_VERSION_MASK 0x00ff0000
+#define RNGC_VERID_CHIP_VERSION_SHIFT 16
+#define RNGC_VERID_VERSION_MAJOR_MASK 0x0000ff00
+#define RNGC_VERID_VERSION_MAJOR_SHIFT 8
+#define RNGC_VERID_VERSION_MINOR_MASK 0x000000ff
+#define RNGC_VERID_VERSION_MINOR_SHIFT 0
+
+#define RNGC_CMD_ZEROS_MASK 0xffffff8c
+#define RNGC_CMD_SW_RST 0x00000040
+#define RNGC_CMD_CLR_ERR 0x00000020
+#define RNGC_CMD_CLR_INT 0x00000010
+#define RNGC_CMD_SEED 0x00000002
+#define RNGC_CMD_SELF_TEST 0x00000001
+
+#define RNGC_CTRL_ZEROS_MASK 0xfffffc8c
+#define RNGC_CTRL_CTL_ACC 0x00000200
+#define RNGC_CTRL_VERIF_MODE 0x00000100
+#define RNGC_CTRL_MASK_ERROR 0x00000040
+
+#define RNGC_CTRL_MASK_DONE 0x00000020
+#define RNGC_CTRL_AUTO_SEED 0x00000010
+#define RNGC_CTRL_FIFO_UFLOW_MASK 0x00000003
+#define RNGC_CTRL_FIFO_UFLOW_SHIFT 0
+
+#define RNGC_CTRL_FIFO_UFLOW_ZEROS_ERROR 0
+#define RNGC_CTRL_FIFO_UFLOW_ZEROS_ERROR2 1
+#define RNGC_CTRL_FIFO_UFLOW_BUS_XFR 2
+#define RNGC_CTRL_FIFO_UFLOW_ZEROS_INTR 3
+
+#define RNGC_STATUS_ST_PF_MASK 0x00c00000
+#define RNGC_STATUS_ST_PF_SHIFT 22
+#define RNGC_STATUS_ST_PF_TRNG 0x00800000
+#define RNGC_STATUS_ST_PF_PRNG 0x00400000
+#define RNGC_STATUS_ERROR 0x00010000
+#define RNGC_STATUS_FIFO_SIZE_MASK 0x0000f000
+#define RNGC_STATUS_FIFO_SIZE_SHIFT 12
+#define RNGC_STATUS_FIFO_LEVEL_MASK 0x00000f00
+#define RNGC_STATUS_FIFO_LEVEL_SHIFT 8
+#define RNGC_STATUS_NEXT_SEED_DONE 0x00000040
+#define RNGC_STATUS_SEED_DONE 0x00000020
+#define RNGC_STATUS_ST_DONE 0x00000010
+#define RNGC_STATUS_RESEED 0x00000008
+#define RNGC_STATUS_SLEEP 0x00000004
+#define RNGC_STATUS_BUSY 0x00000002
+#define RNGC_STATUS_SEC_STATE 0x00000001
+
+#define RNGC_ERROR_STATUS_ZEROS_MASK 0xffffffc0
+#define RNGC_ERROR_STATUS_BAD_KEY 0x00000040
+#define RNGC_ERROR_STATUS_RAND_ERR 0x00000020
+#define RNGC_ERROR_STATUS_FIFO_ERR 0x00000010
+#define RNGC_ERROR_STATUS_STAT_ERR 0x00000008
+#define RNGC_ERROR_STATUS_ST_ERR 0x00000004
+#define RNGC_ERROR_STATUS_OSC_ERR 0x00000002
+#define RNGC_ERROR_STATUS_LFSR_ERR 0x00000001
+
+#define RNG_ADDR_RANGE 0x34
+
+struct mxc_rngc {
+ struct device_d *dev;
+ struct clk *clk;
+ void __iomem *base;
+ struct hwrng rng;
+};
+
+static int mxc_rngc_data_present(struct hwrng *rng)
+{
+ struct mxc_rngc *rngc = container_of(rng, struct mxc_rngc, rng);
+
+ /* how many random numbers are in FIFO? [0-16] */
+ return (readl(rngc->base + RNGC_STATUS) &
+ RNGC_STATUS_FIFO_LEVEL_MASK) >> RNGC_STATUS_FIFO_LEVEL_SHIFT;
+}
+
+static int mxc_rngc_read(struct hwrng *rng, void *buf, size_t max, bool wait)
+{
+ struct mxc_rngc *rngc = container_of(rng, struct mxc_rngc, rng);
+ unsigned int err;
+ int count = 0;
+ u32 *data = buf;
+
+ while (mxc_rngc_data_present(rng) && max) {
+ /* retrieve a random number from FIFO */
+ *(data+count) = readl(rngc->base + RNGC_FIFO);
+
+ /* is there some error while reading this random number? */
+ err = readl(rngc->base + RNGC_STATUS) & RNGC_STATUS_ERROR;
+ if (err)
+ break;
+
+ count += 1;
+ max -= 4;
+ }
+
+ /* if error happened doesn't return random number */
+ return err ? 0 : count * 4;
+}
+
+static int mxc_rngc_init(struct hwrng *rng)
+{
+ struct mxc_rngc *rngc = container_of(rng, struct mxc_rngc, rng);
+ unsigned int err;
+ uint64_t start;
+ u32 cmd;
+ u32 ctrl;
+ u32 osc;
+
+ err = readl(rngc->base + RNGC_STATUS) & RNGC_STATUS_ERROR;
+ if (err) {
+ /* is this a bad keys error ? */
+ if (readl(rngc->base + RNGC_ERROR) &
+ RNGC_ERROR_STATUS_BAD_KEY) {
+ dev_err(rngc->dev, "Can't start, Bad Keys.\n");
+ return -EIO;
+ }
+ }
+
+ /* mask all interrupts, will be unmasked soon */
+ ctrl = readl(rngc->base + RNGC_CONTROL);
+ writel(ctrl | RNGC_CTRL_MASK_DONE | RNGC_CTRL_MASK_ERROR,
+ rngc->base + RNGC_CONTROL);
+
+ /* verify if oscillator is working */
+ osc = readl(rngc->base + RNGC_ERROR);
+ if (osc & RNGC_ERROR_STATUS_OSC_ERR) {
+ dev_err(rngc->dev, "RNGC Oscillator is dead!\n");
+ return -EIO;
+ }
+
+ /* do self test, repeat until get success */
+ do {
+ /* clear error */
+ cmd = readl(rngc->base + RNGC_COMMAND);
+ writel(cmd | RNGC_CMD_CLR_ERR, rngc->base + RNGC_COMMAND);
+
+ /* unmask all interrupt */
+ ctrl = readl(rngc->base + RNGC_CONTROL);
+ writel(ctrl & ~(RNGC_CTRL_MASK_DONE | RNGC_CTRL_MASK_ERROR),
+ rngc->base + RNGC_CONTROL);
+
+ /* run self test */
+ cmd = readl(rngc->base + RNGC_COMMAND);
+ writel(cmd | RNGC_CMD_SELF_TEST, rngc->base + RNGC_COMMAND);
+
+ start = get_time_ns();
+ while (!(readl(rngc->base + RNGC_STATUS) &
+ RNGC_STATUS_ST_DONE)) {
+ if (is_timeout(start, 100 * MSECOND)) {
+ dev_err(rng->dev, "Timedout while seeding\n");
+ return -ETIMEDOUT;
+ }
+ }
+ writel(RNGC_CMD_CLR_INT | RNGC_CMD_CLR_ERR,
+ rngc->base + RNGC_COMMAND);
+ } while (readl(rngc->base + RNGC_ERROR) & RNGC_ERROR_STATUS_ST_ERR);
+
+ /* clear interrupt. Is it really necessary here? */
+ writel(RNGC_CMD_CLR_INT | RNGC_CMD_CLR_ERR, rngc->base + RNGC_COMMAND);
+
+ start = get_time_ns();
+ /* create seed, repeat while there is some statistical error */
+ do {
+ /* clear error */
+ cmd = readl(rngc->base + RNGC_COMMAND);
+ writel(cmd | RNGC_CMD_CLR_ERR, rngc->base + RNGC_COMMAND);
+
+ /* seed creation */
+ cmd = readl(rngc->base + RNGC_COMMAND);
+ writel(cmd | RNGC_CMD_SEED, rngc->base + RNGC_COMMAND);
+
+ while (!(readl(rngc->base + RNGC_STATUS) &
+ RNGC_STATUS_SEED_DONE)) {
+ if (is_timeout(start, 100 * MSECOND)) {
+ dev_err(rng->dev, "Timedout while seeding\n");
+ return -ETIMEDOUT;
+ }
+ }
+ writel(RNGC_CMD_CLR_INT | RNGC_CMD_CLR_ERR,
+ rngc->base + RNGC_COMMAND);
+ } while (readl(rngc->base + RNGC_ERROR) &
+ RNGC_ERROR_STATUS_STAT_ERR);
+
+ err = readl(rngc->base + RNGC_ERROR) &
+ (RNGC_ERROR_STATUS_STAT_ERR |
+ RNGC_ERROR_STATUS_RAND_ERR |
+ RNGC_ERROR_STATUS_FIFO_ERR |
+ RNGC_ERROR_STATUS_ST_ERR |
+ RNGC_ERROR_STATUS_OSC_ERR |
+ RNGC_ERROR_STATUS_LFSR_ERR);
+
+ if (err) {
+ dev_err(rngc->dev, "FSL RNGC appears inoperable.\n");
+ return -EIO;
+ }
+
+ return 0;
+}
+
+static int mxc_rngc_probe(struct device_d *dev)
+{
+ struct mxc_rngc *rngc;
+ int ret;
+
+ rngc = xzalloc(sizeof(*rngc));
+
+ rngc->base = dev_request_mem_region(dev, 0);
+ if (IS_ERR(rngc->base))
+ return PTR_ERR(rngc->base);
+
+ rngc->clk = clk_get(dev, "ipg");
+ if (IS_ERR(rngc->clk)) {
+ dev_err(dev, "Can not get rng_clk\n");
+ return PTR_ERR(rngc->clk);
+ }
+
+ ret = clk_enable(rngc->clk);
+ if (ret)
+ return ret;
+
+ rngc->rng.name = dev->name;
+ rngc->rng.read = mxc_rngc_read;
+ rngc->rng.init = mxc_rngc_init;
+
+ ret = hwrng_register(dev, &rngc->rng);
+ if (ret) {
+ dev_err(dev, "FSL RNGC registering failed (%d)\n", ret);
+ clk_disable(rngc->clk);
+
+ return ret;
+ }
+
+ dev_info(dev, "Freescale RNGC Registered.\n");
+
+ return 0;
+}
+
+static const struct of_device_id mxc_rngc_dt_ids[] = {
+ { .compatible = "fsl,imx25-rng" },
+ { /* sentinel */ }
+};
+
+static struct driver_d mxc_rngc_driver = {
+ .name = "mxc_rngc",
+ .probe = mxc_rngc_probe,
+ .of_compatible = mxc_rngc_dt_ids,
+};
+device_platform_driver(mxc_rngc_driver);
--
2.11.0
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
^ permalink raw reply [flat|nested] 4+ messages in thread
* [PATCH v1 3/3] lib: random: get_random_bytes from HWRNG if present
2017-03-13 13:42 [PATCH v1 1/3] drivers: add simple hw_random implementation Oleksij Rempel
2017-03-13 13:42 ` [PATCH v1 2/3] hw_random: add driver for Freescale RNGC Oleksij Rempel
@ 2017-03-13 13:42 ` Oleksij Rempel
2017-03-14 7:55 ` [PATCH v1 1/3] drivers: add simple hw_random implementation Sascha Hauer
2 siblings, 0 replies; 4+ messages in thread
From: Oleksij Rempel @ 2017-03-13 13:42 UTC (permalink / raw)
To: barebox; +Cc: Oleksij Rempel, Steffen Trumtrar
From: Steffen Trumtrar <s.trumtrar@pengutronix.de>
Instead of generating pseudo random numbers, get random bytes
from an optional HW generator, if enabled and registered.
Signed-off-by: Steffen Trumtrar <s.trumtrar@pengutronix.de>
Signed-off-by: Oleksij Rempel <o.rempel@pengutronix.de>
---
lib/random.c | 19 +++++++++++++++++++
1 file changed, 19 insertions(+)
diff --git a/lib/random.c b/lib/random.c
index 210fea994..ff82dd1be 100644
--- a/lib/random.c
+++ b/lib/random.c
@@ -1,5 +1,6 @@
#include <common.h>
#include <stdlib.h>
+#include <linux/hw_random.h>
static unsigned int random_seed;
@@ -22,6 +23,24 @@ void get_random_bytes(void *_buf, int len)
{
char *buf = _buf;
+ if (IS_ENABLED(CONFIG_HWRNG)) {
+ struct hwrng *rng;
+ int bytes;
+
+ rng = hwrng_get_first();
+ if (!PTR_ERR(rng)) {
+ while (len) {
+ bytes = hwrng_get_data(rng, _buf, len, 0);
+ if (!bytes)
+ goto sw_fallback;
+ len -= bytes;
+ }
+
+ return;
+ }
+ }
+
+sw_fallback:
while (len--)
*buf++ = rand() % 256;
}
--
2.11.0
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH v1 1/3] drivers: add simple hw_random implementation
2017-03-13 13:42 [PATCH v1 1/3] drivers: add simple hw_random implementation Oleksij Rempel
2017-03-13 13:42 ` [PATCH v1 2/3] hw_random: add driver for Freescale RNGC Oleksij Rempel
2017-03-13 13:42 ` [PATCH v1 3/3] lib: random: get_random_bytes from HWRNG if present Oleksij Rempel
@ 2017-03-14 7:55 ` Sascha Hauer
2 siblings, 0 replies; 4+ messages in thread
From: Sascha Hauer @ 2017-03-14 7:55 UTC (permalink / raw)
To: Oleksij Rempel; +Cc: barebox, Steffen Trumtrar
On Mon, Mar 13, 2017 at 02:42:26PM +0100, Oleksij Rempel wrote:
> From: Steffen Trumtrar <s.trumtrar@pengutronix.de>
>
> Add a simple hw_random implementation based on code from
> Linux v4.5-rc5.
>
> All the entropypool initialization stuff is left out and
> the obsolete data_read/data_present calls are omitted.
>
> Signed-off-by: Steffen Trumtrar <s.trumtrar@pengutronix.de>
> Signed-off-by: Oleksij Rempel <o.rempel@pengutronix.de>
> ---
> drivers/Kconfig | 1 +
> drivers/Makefile | 1 +
> drivers/hw_random/Kconfig | 6 +++
> drivers/hw_random/Makefile | 1 +
> drivers/hw_random/core.c | 110 +++++++++++++++++++++++++++++++++++++++++++++
> include/linux/hw_random.h | 44 ++++++++++++++++++
> 6 files changed, 163 insertions(+)
> create mode 100644 drivers/hw_random/Kconfig
> create mode 100644 drivers/hw_random/Makefile
> create mode 100644 drivers/hw_random/core.c
> create mode 100644 include/linux/hw_random.h
>
> diff --git a/drivers/Kconfig b/drivers/Kconfig
> index cc086ac2d..2f5784a4d 100644
> --- a/drivers/Kconfig
> +++ b/drivers/Kconfig
> @@ -21,6 +21,7 @@ source "drivers/eeprom/Kconfig"
> source "drivers/input/Kconfig"
> source "drivers/watchdog/Kconfig"
> source "drivers/pwm/Kconfig"
> +source "drivers/hw_random/Kconfig"
> source "drivers/dma/Kconfig"
> source "drivers/gpio/Kconfig"
> source "drivers/w1/Kconfig"
> diff --git a/drivers/Makefile b/drivers/Makefile
> index 6a70f6ee1..7e9b80e59 100644
> --- a/drivers/Makefile
> +++ b/drivers/Makefile
> @@ -20,6 +20,7 @@ obj-y += misc/
> obj-y += dma/
> obj-y += watchdog/
> obj-y += gpio/
> +obj-$(CONFIG_HWRNG) += hw_random/
> obj-$(CONFIG_OFTREE) += of/
> obj-$(CONFIG_W1) += w1/
> obj-y += pinctrl/
> diff --git a/drivers/hw_random/Kconfig b/drivers/hw_random/Kconfig
> new file mode 100644
> index 000000000..807fcadd3
> --- /dev/null
> +++ b/drivers/hw_random/Kconfig
> @@ -0,0 +1,6 @@
> +menuconfig HWRNG
> + bool "HWRNG Support"
> + help
> + Support for HWRNG(Hardware Random Number Generator) devices.
> +
> + If unsure, say no.
> diff --git a/drivers/hw_random/Makefile b/drivers/hw_random/Makefile
> new file mode 100644
> index 000000000..15307b100
> --- /dev/null
> +++ b/drivers/hw_random/Makefile
> @@ -0,0 +1 @@
> +obj-$(CONFIG_HWRNG) += core.o
> diff --git a/drivers/hw_random/core.c b/drivers/hw_random/core.c
> new file mode 100644
> index 000000000..3bf464a8b
> --- /dev/null
> +++ b/drivers/hw_random/core.c
> @@ -0,0 +1,110 @@
> +/*
> + * Copyright (c) 2016 Pengutronix, Steffen Trumtrar <kernel@pengutronix.de>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License version 2
> + * as published by the Free Software Foundation.
> + *
> + * derived from Linux kernel drivers/char/hw_random/core.c
> + */
> +
> +#include <common.h>
> +#include <linux/hw_random.h>
> +#include <malloc.h>
> +
> +static LIST_HEAD(hwrngs);
> +
> +#define RNG_BUFFER_SIZE 32
> +
> +int hwrng_get_data(struct hwrng *rng, u8 *buffer, size_t size, int wait)
u8 is not a nice type for a buffer. If the callers buffer is of another
type then we have an unnecessary cast. Use void * instead.
> +{
> + return rng->read(rng, buffer, size, wait);
> +}
> +
> +static int hwrng_init(struct hwrng *rng)
> +{
> + int ret = 0;
> +
> + if (rng->init) {
> + ret = rng->init(rng);
> + return ret;
> + }
> +
> + list_add_tail(&rng->list, &hwrngs);
When the new hwrng has an init function, Shouldn't it be added to the list
also?
> +
> + return 0;
> +}
> +
> +static ssize_t rng_dev_read(struct cdev *cdev, void *buf, size_t size,
> + loff_t offset, unsigned long flags)
> +{
> + struct hwrng *rng = container_of(cdev, struct hwrng, cdev);
> + size_t count = size;
> + ssize_t cur = 0;
> + int len;
> +
> + memset(buf, 0, size);
> +
> + while (count) {
> + int max = min(count, (size_t)RNG_BUFFER_SIZE);
> + len = hwrng_get_data(rng, rng->buf, max, true);
> + if (len < 0) {
> + cur = len;
> + break;
> + }
> +
> + memcpy(buf + cur, rng->buf, len);
> +
> + count -= len;
> + cur += len;
> + }
Why the detour round rng->buf? Can't we copy to the destination buf
directly?
> +
> + return cur;
> +}
> +
> +static struct file_operations rng_chrdev_ops = {
> + .read = rng_dev_read,
> + .lseek = dev_lseek_default,
> +};
> +
> +static int hwrng_register_cdev(struct hwrng *rng)
> +{
> + rng->cdev.name = "hwrng";
> + rng->cdev.flags = DEVFS_IS_CHARACTER_DEV;
> + rng->cdev.ops = &rng_chrdev_ops;
> + rng->cdev.dev = rng->dev;
> +
> + return devfs_create(&rng->cdev);
> +}
> +
> +struct hwrng *hwrng_get_first(void)
> +{
> + if (list_empty(&hwrngs))
> + return ERR_PTR(-ENODEV);
> + else
> + return list_first_entry(&hwrngs, struct hwrng, list);
> +}
> +
> +int hwrng_register(struct device_d *dev, struct hwrng *rng)
> +{
> + int err;
> +
> + if (rng->name == NULL || rng->read == NULL)
> + return -EINVAL;
> +
> + rng->buf = xzalloc(RNG_BUFFER_SIZE);
> +
> + err = hwrng_init(rng);
> + if (err) {
> + free(rng->buf);
> + return err;
> + }
> +
> + rng->dev = dev;
> +
> + err = hwrng_register_cdev(rng);
> + if (err)
> + free(rng->buf);
> +
> + return err;
> +}
> diff --git a/include/linux/hw_random.h b/include/linux/hw_random.h
> new file mode 100644
> index 000000000..a115cc1fa
> --- /dev/null
> +++ b/include/linux/hw_random.h
> @@ -0,0 +1,44 @@
> +/*
> + Hardware Random Number Generator
> +
> + Please read Documentation/hw_random.txt for details on use.
> +
> + ----------------------------------------------------------
> + This software may be used and distributed according to the terms
> + of the GNU General Public License, incorporated herein by reference.
> +
> + */
> +
> +#ifndef LINUX_HWRANDOM_H_
> +#define LINUX_HWRANDOM_H_
> +
> +#include <linux/list.h>
> +
> +/**
> + * struct hwrng - Hardware Random Number Generator driver
> + * @name: Unique RNG name.
> + * @init: Initialization callback (can be NULL).
> + * @read: New API. drivers can fill up to max bytes of data
> + * into the buffer. The buffer is aligned for any type.
> + * @priv: Private data, for use by the RNG driver.
> + */
> +struct hwrng {
> + const char *name;
> + int (*init)(struct hwrng *rng);
> + int (*read)(struct hwrng *rng, void *data, size_t max, bool wait);
> + unsigned long priv;
This is unused and can be removed. The RNG driver should embed a struct
hwrng in it's driver private data and use container_of().
> + u8 *buf;
> +};
> +
> +/** Register a new Hardware Random Number Generator driver. */
> +extern int hwrng_register(struct device_d *dev, struct hwrng *rng);
> +extern struct hwrng *hwrng_get_first(void);
> +extern int hwrng_get_data(struct hwrng *rng, u8 *buffer, size_t size,
> + int wait);
Drop the 'extern's please.
Sascha
--
Pengutronix e.K. | |
Industrial Linux Solutions | http://www.pengutronix.de/ |
Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
^ permalink raw reply [flat|nested] 4+ messages in thread