From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, MIME_BASE64_TEXT,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY, URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8215BC433DF for ; Tue, 2 Jun 2020 08:15:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5E214207DA for ; Tue, 2 Jun 2020 08:15:16 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=mediatek.com header.i=@mediatek.com header.b="kK/IlOt+" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726267AbgFBIPM (ORCPT ); Tue, 2 Jun 2020 04:15:12 -0400 Received: from mailgw01.mediatek.com ([210.61.82.183]:26864 "EHLO mailgw01.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726185AbgFBIPJ (ORCPT ); Tue, 2 Jun 2020 04:15:09 -0400 X-UUID: 41f700aa76014982907c2e4dcb054db8-20200602 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mediatek.com; s=dk; h=Content-Transfer-Encoding:Content-Type:MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:CC:To:From; bh=L04bYCk8wivAACUMFnflEPSxZwU86UwuPofSNkaCMCU=; b=kK/IlOt+LmAuxs+qhSF4osH/4xMPI0ZIGCblJ1ptxihKEa55ui80wayDtP2Qm4r9TYCmY6fx4S9A4re0x8XZyBuYBBguZOwtNMeiutEo6e+0CBEjJ66dxCH06vEmALJHFOfr1vyL5mBPw7uh1kfJcM0Zd6gv59VP1S6zP+stwMM=; X-UUID: 41f700aa76014982907c2e4dcb054db8-20200602 Received: from mtkcas10.mediatek.inc [(172.21.101.39)] by mailgw01.mediatek.com (envelope-from ) (Cellopoint E-mail Firewall v4.1.10 Build 0809 with TLS) with ESMTP id 1379994272; Tue, 02 Jun 2020 16:15:00 +0800 Received: from mtkcas08.mediatek.inc (172.21.101.126) by mtkmbs01n2.mediatek.inc (172.21.101.79) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 16:14:59 +0800 Received: from mtkswgap22.mediatek.inc (172.21.77.33) by mtkcas08.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Tue, 2 Jun 2020 16:14:58 +0800 From: Neal Liu To: Matt Mackall , Herbert Xu , Rob Herring , Matthias Brugger , Sean Wang , Arnd Bergmann , Greg Kroah-Hartman CC: Neal Liu , , , , , lkml , , Crystal Guo Subject: [PATCH v6 2/2] hwrng: add sec-rng driver Date: Tue, 2 Jun 2020 16:14:38 +0800 Message-ID: <1591085678-22764-3-git-send-email-neal.liu@mediatek.com> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> References: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> MIME-Version: 1.0 Content-Type: text/plain X-TM-SNTS-SMTP: 909ABA3B6E64AD00041CC4B3A9BF7D20E656DA2E14FD0DBC349B80906CF174CA2000:8 X-MTK: N Content-Transfer-Encoding: base64 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Rm9yIHNlY3VyaXR5IGF3YXJlbmVzcyBTb0NzIG9uIEFSTXY4IHdpdGggVHJ1c3Rab25lIGVuYWJs ZWQsDQpwZXJpcGhlcmFscyBsaWtlIGVudHJvcHkgc291cmNlcyBpcyBub3QgYWNjZXNzaWJsZSBm cm9tIG5vcm1hbCB3b3JsZA0KKGxpbnV4KSBhbmQgcmF0aGVyIGFjY2Vzc2libGUgZnJvbSBzZWN1 cmUgd29ybGQgKEhZUC9BVEYvVEVFKSBvbmx5Lg0KVGhpcyBkcml2ZXIgYWltcyB0byBwcm92aWRl IGEgZ2VuZXJpYyBpbnRlcmZhY2UgdG8gQXJtIFRydXN0ZWQNCkZpcm13YXJlIG9yIEh5cGVydmlz b3Igcm5nIHNlcnZpY2UuDQoNClNpZ25lZC1vZmYtYnk6IE5lYWwgTGl1IDxuZWFsLmxpdUBtZWRp YXRlay5jb20+DQotLS0NCiBkcml2ZXJzL2NoYXIvaHdfcmFuZG9tL0tjb25maWcgICB8ICAgMTMg KysrKw0KIGRyaXZlcnMvY2hhci9od19yYW5kb20vTWFrZWZpbGUgIHwgICAgMSArDQogZHJpdmVy cy9jaGFyL2h3X3JhbmRvbS9zZWMtcm5nLmMgfCAgMTU1ICsrKysrKysrKysrKysrKysrKysrKysr KysrKysrKysrKysrKysrDQogMyBmaWxlcyBjaGFuZ2VkLCAxNjkgaW5zZXJ0aW9ucygrKQ0KIGNy ZWF0ZSBtb2RlIDEwMDY0NCBkcml2ZXJzL2NoYXIvaHdfcmFuZG9tL3NlYy1ybmcuYw0KDQpkaWZm IC0tZ2l0IGEvZHJpdmVycy9jaGFyL2h3X3JhbmRvbS9LY29uZmlnIGIvZHJpdmVycy9jaGFyL2h3 X3JhbmRvbS9LY29uZmlnDQppbmRleCA5YmM0NmRhLi5jYjljOGE5IDEwMDY0NA0KLS0tIGEvZHJp dmVycy9jaGFyL2h3X3JhbmRvbS9LY29uZmlnDQorKysgYi9kcml2ZXJzL2NoYXIvaHdfcmFuZG9t L0tjb25maWcNCkBAIC00NzQsNiArNDc0LDE5IEBAIGNvbmZpZyBIV19SQU5ET01fS0VZU1RPTkUN CiAJaGVscA0KIAkgIFRoaXMgb3B0aW9uIGVuYWJsZXMgS2V5c3RvbmUncyBoYXJkd2FyZSByYW5k b20gZ2VuZXJhdG9yLg0KIA0KK2NvbmZpZyBIV19SQU5ET01fU0VDVVJFDQorCXRyaXN0YXRlICJB cm0gU2VjdXJpdHkgUmFuZG9tIE51bWJlciBHZW5lcmF0b3Igc3VwcG9ydCINCisJZGVwZW5kcyBv biBIQVZFX0FSTV9TTUNDQyB8fCBDT01QSUxFX1RFU1QNCisJZGVmYXVsdCBIV19SQU5ET00NCisJ aGVscA0KKwkgIFRoaXMgZHJpdmVyIHByb3ZpZGVzIGtlcm5lbC1zaWRlIHN1cHBvcnQgZm9yIHRo ZSBBcm0gU2VjdXJpdHkNCisJICBSYW5kb20gTnVtYmVyIEdlbmVyYXRvci4NCisNCisJICBUbyBj b21waWxlIHRoaXMgZHJpdmVyIGFzIGEgbW9kdWxlLCBjaG9vc2UgTSBoZXJlLiB0aGUNCisJICBt b2R1bGUgd2lsbCBiZSBjYWxsZWQgc2VjLXJuZy4NCisNCisJICBJZiB1bnN1cmUsIHNheSBZLg0K Kw0KIGVuZGlmICMgSFdfUkFORE9NDQogDQogY29uZmlnIFVNTF9SQU5ET00NCmRpZmYgLS1naXQg YS9kcml2ZXJzL2NoYXIvaHdfcmFuZG9tL01ha2VmaWxlIGIvZHJpdmVycy9jaGFyL2h3X3JhbmRv bS9NYWtlZmlsZQ0KaW5kZXggYTc4MDFiNC4uMDQ1MzNkMSAxMDA2NDQNCi0tLSBhL2RyaXZlcnMv Y2hhci9od19yYW5kb20vTWFrZWZpbGUNCisrKyBiL2RyaXZlcnMvY2hhci9od19yYW5kb20vTWFr ZWZpbGUNCkBAIC00MSwzICs0MSw0IEBAIG9iai0kKENPTkZJR19IV19SQU5ET01fUzM5MCkgKz0g czM5MC10cm5nLm8NCiBvYmotJChDT05GSUdfSFdfUkFORE9NX0tFWVNUT05FKSArPSBrcy1zYS1y bmcubw0KIG9iai0kKENPTkZJR19IV19SQU5ET01fT1BURUUpICs9IG9wdGVlLXJuZy5vDQogb2Jq LSQoQ09ORklHX0hXX1JBTkRPTV9OUENNKSArPSBucGNtLXJuZy5vDQorb2JqLSQoQ09ORklHX0hX X1JBTkRPTV9TRUNVUkUpICs9IHNlYy1ybmcubw0KZGlmZiAtLWdpdCBhL2RyaXZlcnMvY2hhci9o d19yYW5kb20vc2VjLXJuZy5jIGIvZHJpdmVycy9jaGFyL2h3X3JhbmRvbS9zZWMtcm5nLmMNCm5l dyBmaWxlIG1vZGUgMTAwNjQ0DQppbmRleCAwMDAwMDAwLi5jNmQzODcyDQotLS0gL2Rldi9udWxs DQorKysgYi9kcml2ZXJzL2NoYXIvaHdfcmFuZG9tL3NlYy1ybmcuYw0KQEAgLTAsMCArMSwxNTUg QEANCisvLyBTUERYLUxpY2Vuc2UtSWRlbnRpZmllcjogR1BMLTIuMA0KKy8qDQorICogQ29weXJp Z2h0IChDKSAyMDIwIE1lZGlhVGVrIEluYy4NCisgKi8NCisNCisjaW5jbHVkZSA8bGludXgvYXJt LXNtY2NjLmg+DQorI2luY2x1ZGUgPGxpbnV4L2h3X3JhbmRvbS5oPg0KKyNpbmNsdWRlIDxsaW51 eC9tb2R1bGUuaD4NCisjaW5jbHVkZSA8bGludXgvb2YuaD4NCisjaW5jbHVkZSA8bGludXgvcGxh dGZvcm1fZGV2aWNlLmg+DQorDQorI2RlZmluZSBTTUNfUkVUX05VTQk0DQorI2RlZmluZSBTRUNf Uk5EX1NJWkUJKHNpemVvZih1MzIpICogU01DX1JFVF9OVU0pDQorDQorI2RlZmluZSBIV1JOR19T TUNfRkFTVF9DQUxMX1ZBTChmdW5jX251bSkgXA0KKwlBUk1fU01DQ0NfQ0FMTF9WQUwoQVJNX1NN Q0NDX0ZBU1RfQ0FMTCwgQVJNX1NNQ0NDX1NNQ18zMiwgXA0KKwkJCSAgIEFSTV9TTUNDQ19PV05F Ul9TSVAsIChmdW5jX251bSkpDQorDQorI2RlZmluZSB0b19zZWNfcm5nKHApCWNvbnRhaW5lcl9v ZihwLCBzdHJ1Y3Qgc2VjX3JuZ19wcml2LCBybmcpDQorDQordHlwZWRlZiB2b2lkIChzZWNfcm5n X2ZuKSh1bnNpZ25lZCBsb25nLCB1bnNpZ25lZCBsb25nLCB1bnNpZ25lZCBsb25nLA0KKwkJCSAg dW5zaWduZWQgbG9uZywgdW5zaWduZWQgbG9uZywgdW5zaWduZWQgbG9uZywNCisJCQkgIHVuc2ln bmVkIGxvbmcsIHVuc2lnbmVkIGxvbmcsDQorCQkJICBzdHJ1Y3QgYXJtX3NtY2NjX3JlcyAqKTsN CisNCitzdHJ1Y3Qgc2VjX3JuZ19wcml2IHsNCisJdTE2IGZ1bmNfbnVtOw0KKwlzZWNfcm5nX2Zu ICpybmdfZm47DQorCXN0cnVjdCBod3JuZyBybmc7DQorfTsNCisNCisvKiBTaW1wbGUgd3JhcHBl ciBmdW5jdGlvbnMgdG8gYmUgYWJsZSB0byB1c2UgYSBmdW5jdGlvbiBwb2ludGVyICovDQorc3Rh dGljIHZvaWQgc2VjX3JuZ19zbWModW5zaWduZWQgbG9uZyBhMCwgdW5zaWduZWQgbG9uZyBhMSwN CisJCQl1bnNpZ25lZCBsb25nIGEyLCB1bnNpZ25lZCBsb25nIGEzLA0KKwkJCXVuc2lnbmVkIGxv bmcgYTQsIHVuc2lnbmVkIGxvbmcgYTUsDQorCQkJdW5zaWduZWQgbG9uZyBhNiwgdW5zaWduZWQg bG9uZyBhNywNCisJCQlzdHJ1Y3QgYXJtX3NtY2NjX3JlcyAqcmVzKQ0KK3sNCisJYXJtX3NtY2Nj X3NtYyhhMCwgYTEsIGEyLCBhMywgYTQsIGE1LCBhNiwgYTcsIHJlcyk7DQorfQ0KKw0KK3N0YXRp YyB2b2lkIHNlY19ybmdfaHZjKHVuc2lnbmVkIGxvbmcgYTAsIHVuc2lnbmVkIGxvbmcgYTEsDQor CQkJdW5zaWduZWQgbG9uZyBhMiwgdW5zaWduZWQgbG9uZyBhMywNCisJCQl1bnNpZ25lZCBsb25n IGE0LCB1bnNpZ25lZCBsb25nIGE1LA0KKwkJCXVuc2lnbmVkIGxvbmcgYTYsIHVuc2lnbmVkIGxv bmcgYTcsDQorCQkJc3RydWN0IGFybV9zbWNjY19yZXMgKnJlcykNCit7DQorCWFybV9zbWNjY19o dmMoYTAsIGExLCBhMiwgYTMsIGE0LCBhNSwgYTYsIGE3LCByZXMpOw0KK30NCisNCitzdGF0aWMg Ym9vbCBfX3NlY19nZXRfcm5kKHN0cnVjdCBzZWNfcm5nX3ByaXYgKnByaXYsIHVpbnQzMl90ICp2 YWwpDQorew0KKwlzdHJ1Y3QgYXJtX3NtY2NjX3JlcyByZXM7DQorDQorCXByaXYtPnJuZ19mbihI V1JOR19TTUNfRkFTVF9DQUxMX1ZBTChwcml2LT5mdW5jX251bSksDQorCQkJMCwgMCwgMCwgMCwg MCwgMCwgMCwgJnJlcyk7DQorDQorCWlmICghcmVzLmEwICYmICFyZXMuYTEgJiYgIXJlcy5hMiAm JiAhcmVzLmEzKQ0KKwkJcmV0dXJuIGZhbHNlOw0KKw0KKwl2YWxbMF0gPSByZXMuYTA7DQorCXZh bFsxXSA9IHJlcy5hMTsNCisJdmFsWzJdID0gcmVzLmEyOw0KKwl2YWxbM10gPSByZXMuYTM7DQor DQorCXJldHVybiB0cnVlOw0KK30NCisNCitzdGF0aWMgaW50IHNlY19ybmdfcmVhZChzdHJ1Y3Qg aHdybmcgKnJuZywgdm9pZCAqYnVmLCBzaXplX3QgbWF4LCBib29sIHdhaXQpDQorew0KKwlzdHJ1 Y3Qgc2VjX3JuZ19wcml2ICpwcml2ID0gdG9fc2VjX3JuZyhybmcpOw0KKwl1MzIgdmFsWzRdID0g ezB9Ow0KKwlpbnQgcmV0dmFsID0gMDsNCisJaW50IGk7DQorDQorCXdoaWxlIChtYXggPj0gU0VD X1JORF9TSVpFKSB7DQorCQlpZiAoIV9fc2VjX2dldF9ybmQocHJpdiwgdmFsKSkNCisJCQlyZXR1 cm4gcmV0dmFsOw0KKw0KKwkJZm9yIChpID0gMDsgaSA8IFNNQ19SRVRfTlVNOyBpKyspIHsNCisJ CQkqKHUzMiAqKWJ1ZiA9IHZhbFtpXTsNCisJCQlidWYgKz0gc2l6ZW9mKHUzMik7DQorCQl9DQor DQorCQlyZXR2YWwgKz0gU0VDX1JORF9TSVpFOw0KKwkJbWF4IC09IFNFQ19STkRfU0laRTsNCisJ fQ0KKw0KKwlyZXR1cm4gcmV0dmFsOw0KK30NCisNCitzdGF0aWMgaW50IHNlY19ybmdfcHJvYmUo c3RydWN0IHBsYXRmb3JtX2RldmljZSAqcGRldikNCit7DQorCXN0cnVjdCBzZWNfcm5nX3ByaXYg KnByaXY7DQorCWNvbnN0IGNoYXIgKm1ldGhvZDsNCisJaW50IHJldDsNCisNCisJcHJpdiA9IGRl dm1fa3phbGxvYygmcGRldi0+ZGV2LCBzaXplb2YoKnByaXYpLCBHRlBfS0VSTkVMKTsNCisJaWYg KCFwcml2KQ0KKwkJcmV0dXJuIC1FTk9NRU07DQorDQorCWlmIChvZl9wcm9wZXJ0eV9yZWFkX3N0 cmluZyhwZGV2LT5kZXYub2Zfbm9kZSwgIm1ldGhvZCIsICZtZXRob2QpKQ0KKwkJcmV0dXJuIC1F TlhJTzsNCisNCisJaWYgKCFzdHJuY21wKCJzbWMiLCBtZXRob2QsIHN0cmxlbigic21jIikpKQ0K KwkJcHJpdi0+cm5nX2ZuID0gc2VjX3JuZ19zbWM7DQorCWVsc2UgaWYgKCFzdHJuY21wKCJodmMi LCBtZXRob2QsIHN0cmxlbigiaHZjIikpKQ0KKwkJcHJpdi0+cm5nX2ZuID0gc2VjX3JuZ19odmM7 DQorDQorCWlmIChJU19FUlIocHJpdi0+cm5nX2ZuKSkgew0KKwkJZGV2X2VycigmcGRldi0+ZGV2 LCAibWV0aG9kICVzIGlzIG5vdCBzdXBwb3J0ZWRcbiIsIG1ldGhvZCk7DQorCQlyZXR1cm4gLUVJ TlZBTDsNCisJfQ0KKw0KKwlpZiAob2ZfcHJvcGVydHlfcmVhZF91MTYocGRldi0+ZGV2Lm9mX25v ZGUsICJtZXRob2QtZmlkIiwNCisJCQkJICZwcml2LT5mdW5jX251bSkpDQorCQlyZXR1cm4gLUVO WElPOw0KKw0KKwlpZiAob2ZfcHJvcGVydHlfcmVhZF91MTYocGRldi0+ZGV2Lm9mX25vZGUsICJx dWFsaXR5IiwNCisJCQkJICZwcml2LT5ybmcucXVhbGl0eSkpDQorCQlyZXR1cm4gLUVOWElPOw0K Kw0KKwlwcml2LT5ybmcubmFtZSA9IHBkZXYtPm5hbWU7DQorCXByaXYtPnJuZy5yZWFkID0gc2Vj X3JuZ19yZWFkOw0KKwlwcml2LT5ybmcucHJpdiA9ICh1bnNpZ25lZCBsb25nKSZwZGV2LT5kZXY7 DQorDQorCXJldCA9IGRldm1faHdybmdfcmVnaXN0ZXIoJnBkZXYtPmRldiwgJnByaXYtPnJuZyk7 DQorCWlmIChyZXQpIHsNCisJCWRldl9lcnIoJnBkZXYtPmRldiwgImZhaWxlZCB0byByZWdpc3Rl ciBybmcgZGV2aWNlOiAlZFxuIiwgcmV0KTsNCisJCXJldHVybiByZXQ7DQorCX0NCisNCisJcmV0 dXJuIDA7DQorfQ0KKw0KK3N0YXRpYyBjb25zdCBzdHJ1Y3Qgb2ZfZGV2aWNlX2lkIHNlY19ybmdf bWF0Y2hbXSA9IHsNCisJeyAuY29tcGF0aWJsZSA9ICJhcm0sc2VjLXJuZyIsIH0sDQorCXt9DQor fTsNCitNT0RVTEVfREVWSUNFX1RBQkxFKG9mLCBzZWNfcm5nX21hdGNoKTsNCisNCitzdGF0aWMg c3RydWN0IHBsYXRmb3JtX2RyaXZlciBzZWNfcm5nX2RyaXZlciA9IHsNCisJLnByb2JlID0gc2Vj X3JuZ19wcm9iZSwNCisJLmRyaXZlciA9IHsNCisJCS5uYW1lID0gS0JVSUxEX01PRE5BTUUsDQor CQkub3duZXIgPSBUSElTX01PRFVMRSwNCisJCS5vZl9tYXRjaF90YWJsZSA9IHNlY19ybmdfbWF0 Y2gsDQorCX0sDQorfTsNCisNCittb2R1bGVfcGxhdGZvcm1fZHJpdmVyKHNlY19ybmdfZHJpdmVy KTsNCisNCitNT0RVTEVfREVTQ1JJUFRJT04oIlNlY3VyaXR5IFJhbmRvbSBOdW1iZXIgR2VuZXJh dG9yIERyaXZlciIpOw0KK01PRFVMRV9BVVRIT1IoIk5lYWwgTGl1IDxuZWFsLmxpdUBtZWRpYXRl ay5jb20+Iik7DQorTU9EVUxFX0xJQ0VOU0UoIkdQTCIpOw0KLS0gDQoxLjcuOS41DQo= From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 52D6AC433E0 for ; Tue, 2 Jun 2020 08:25:45 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 25CBB2072F for ; Tue, 2 Jun 2020 08:25:45 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="V7P5rLBT"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=mediatek.com header.i=@mediatek.com header.b="jbX9s15L" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 25CBB2072F Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=mediatek.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-mediatek-bounces+linux-mediatek=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-ID:Date:Subject:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=QwiZW4O4YQ/N1GDv8McvijREZUJ11CMuKNCAVCn0VSo=; b=V7P5rLBT9SoOPf LZ6I+WDGhc//9r+NcLvPb+HfKS61ae5o3IZvy1HLkgP+3aXPFV8JPzS1RMjUlBiStRo6GFUh3uryO jPGuuCUpHkoMUhS+cW12K6kogukUEOyOkKTjCniQRncthiEAuNbwmTaqWvIO7yqL5QxKc5SppqDri YtYVMIHVuD02/zqpW6IIHGzK5HNQW0arNJxRLxQRMZn3kJxQrPTG0LWFvUjH2guK6qoW6MKXwKbFF 3bSnQAyQ/kb4GDX3AcDgq8dHjTIB3LyDEnmoFVrd3ELRCoRXxAgd2tKNnztjcWsvfRKqfFQYAiRd0 kpjDRLgXHXmCN9dLEMoA==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jg2Ep-0005CA-4S; Tue, 02 Jun 2020 08:25:35 +0000 Received: from mailgw02.mediatek.com ([216.200.240.185]) by bombadil.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jg2EY-0004ye-I3; Tue, 02 Jun 2020 08:25:20 +0000 X-UUID: 1534da590d414aaeaf5a5b60ce0eac3e-20200602 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mediatek.com; s=dk; h=Content-Transfer-Encoding:Content-Type:MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:CC:To:From; bh=L04bYCk8wivAACUMFnflEPSxZwU86UwuPofSNkaCMCU=; b=jbX9s15LImbS1lMlL4qHc72C4/E7MkqS/qkQri6OS47xtgGtW6E7PrMgmuxo/TvBiI1wfLaXbxVs3fvoNnrdWM+hOCLRKPWQwiTahehaPEqmaPt7aRojDe6CytW4yT0PwniCGciFiCu0K8/X+sninvj15NtsUF5w2jNCXSq+Lg8=; X-UUID: 1534da590d414aaeaf5a5b60ce0eac3e-20200602 Received: from mtkcas66.mediatek.inc [(172.29.193.44)] by mailgw02.mediatek.com (envelope-from ) (musrelay.mediatek.com ESMTP with TLS) with ESMTP id 1968415831; Tue, 02 Jun 2020 00:25:16 -0800 Received: from MTKMBS01N2.mediatek.inc (172.21.101.79) by MTKMBS62DR.mediatek.inc (172.29.94.18) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 01:15:12 -0700 Received: from mtkcas08.mediatek.inc (172.21.101.126) by mtkmbs01n2.mediatek.inc (172.21.101.79) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 16:14:59 +0800 Received: from mtkswgap22.mediatek.inc (172.21.77.33) by mtkcas08.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Tue, 2 Jun 2020 16:14:58 +0800 From: Neal Liu To: Matt Mackall , Herbert Xu , Rob Herring , Matthias Brugger , Sean Wang , Arnd Bergmann , "Greg Kroah-Hartman" Subject: [PATCH v6 2/2] hwrng: add sec-rng driver Date: Tue, 2 Jun 2020 16:14:38 +0800 Message-ID: <1591085678-22764-3-git-send-email-neal.liu@mediatek.com> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> References: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> MIME-Version: 1.0 X-TM-SNTS-SMTP: 909ABA3B6E64AD00041CC4B3A9BF7D20E656DA2E14FD0DBC349B80906CF174CA2000:8 X-MTK: N X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200602_012518_602880_D9150D9A X-CRM114-Status: GOOD ( 16.75 ) X-BeenThere: linux-mediatek@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: devicetree@vger.kernel.org, wsd_upstream@mediatek.com, lkml , Crystal Guo , linux-mediatek@lists.infradead.org, linux-crypto@vger.kernel.org, Neal Liu , linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "Linux-mediatek" Errors-To: linux-mediatek-bounces+linux-mediatek=archiver.kernel.org@lists.infradead.org For security awareness SoCs on ARMv8 with TrustZone enabled, peripherals like entropy sources is not accessible from normal world (linux) and rather accessible from secure world (HYP/ATF/TEE) only. This driver aims to provide a generic interface to Arm Trusted Firmware or Hypervisor rng service. Signed-off-by: Neal Liu --- drivers/char/hw_random/Kconfig | 13 ++++ drivers/char/hw_random/Makefile | 1 + drivers/char/hw_random/sec-rng.c | 155 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 169 insertions(+) create mode 100644 drivers/char/hw_random/sec-rng.c diff --git a/drivers/char/hw_random/Kconfig b/drivers/char/hw_random/Kconfig index 9bc46da..cb9c8a9 100644 --- a/drivers/char/hw_random/Kconfig +++ b/drivers/char/hw_random/Kconfig @@ -474,6 +474,19 @@ config HW_RANDOM_KEYSTONE help This option enables Keystone's hardware random generator. +config HW_RANDOM_SECURE + tristate "Arm Security Random Number Generator support" + depends on HAVE_ARM_SMCCC || COMPILE_TEST + default HW_RANDOM + help + This driver provides kernel-side support for the Arm Security + Random Number Generator. + + To compile this driver as a module, choose M here. the + module will be called sec-rng. + + If unsure, say Y. + endif # HW_RANDOM config UML_RANDOM diff --git a/drivers/char/hw_random/Makefile b/drivers/char/hw_random/Makefile index a7801b4..04533d1 100644 --- a/drivers/char/hw_random/Makefile +++ b/drivers/char/hw_random/Makefile @@ -41,3 +41,4 @@ obj-$(CONFIG_HW_RANDOM_S390) += s390-trng.o obj-$(CONFIG_HW_RANDOM_KEYSTONE) += ks-sa-rng.o obj-$(CONFIG_HW_RANDOM_OPTEE) += optee-rng.o obj-$(CONFIG_HW_RANDOM_NPCM) += npcm-rng.o +obj-$(CONFIG_HW_RANDOM_SECURE) += sec-rng.o diff --git a/drivers/char/hw_random/sec-rng.c b/drivers/char/hw_random/sec-rng.c new file mode 100644 index 0000000..c6d3872 --- /dev/null +++ b/drivers/char/hw_random/sec-rng.c @@ -0,0 +1,155 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2020 MediaTek Inc. + */ + +#include +#include +#include +#include +#include + +#define SMC_RET_NUM 4 +#define SEC_RND_SIZE (sizeof(u32) * SMC_RET_NUM) + +#define HWRNG_SMC_FAST_CALL_VAL(func_num) \ + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, ARM_SMCCC_SMC_32, \ + ARM_SMCCC_OWNER_SIP, (func_num)) + +#define to_sec_rng(p) container_of(p, struct sec_rng_priv, rng) + +typedef void (sec_rng_fn)(unsigned long, unsigned long, unsigned long, + unsigned long, unsigned long, unsigned long, + unsigned long, unsigned long, + struct arm_smccc_res *); + +struct sec_rng_priv { + u16 func_num; + sec_rng_fn *rng_fn; + struct hwrng rng; +}; + +/* Simple wrapper functions to be able to use a function pointer */ +static void sec_rng_smc(unsigned long a0, unsigned long a1, + unsigned long a2, unsigned long a3, + unsigned long a4, unsigned long a5, + unsigned long a6, unsigned long a7, + struct arm_smccc_res *res) +{ + arm_smccc_smc(a0, a1, a2, a3, a4, a5, a6, a7, res); +} + +static void sec_rng_hvc(unsigned long a0, unsigned long a1, + unsigned long a2, unsigned long a3, + unsigned long a4, unsigned long a5, + unsigned long a6, unsigned long a7, + struct arm_smccc_res *res) +{ + arm_smccc_hvc(a0, a1, a2, a3, a4, a5, a6, a7, res); +} + +static bool __sec_get_rnd(struct sec_rng_priv *priv, uint32_t *val) +{ + struct arm_smccc_res res; + + priv->rng_fn(HWRNG_SMC_FAST_CALL_VAL(priv->func_num), + 0, 0, 0, 0, 0, 0, 0, &res); + + if (!res.a0 && !res.a1 && !res.a2 && !res.a3) + return false; + + val[0] = res.a0; + val[1] = res.a1; + val[2] = res.a2; + val[3] = res.a3; + + return true; +} + +static int sec_rng_read(struct hwrng *rng, void *buf, size_t max, bool wait) +{ + struct sec_rng_priv *priv = to_sec_rng(rng); + u32 val[4] = {0}; + int retval = 0; + int i; + + while (max >= SEC_RND_SIZE) { + if (!__sec_get_rnd(priv, val)) + return retval; + + for (i = 0; i < SMC_RET_NUM; i++) { + *(u32 *)buf = val[i]; + buf += sizeof(u32); + } + + retval += SEC_RND_SIZE; + max -= SEC_RND_SIZE; + } + + return retval; +} + +static int sec_rng_probe(struct platform_device *pdev) +{ + struct sec_rng_priv *priv; + const char *method; + int ret; + + priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL); + if (!priv) + return -ENOMEM; + + if (of_property_read_string(pdev->dev.of_node, "method", &method)) + return -ENXIO; + + if (!strncmp("smc", method, strlen("smc"))) + priv->rng_fn = sec_rng_smc; + else if (!strncmp("hvc", method, strlen("hvc"))) + priv->rng_fn = sec_rng_hvc; + + if (IS_ERR(priv->rng_fn)) { + dev_err(&pdev->dev, "method %s is not supported\n", method); + return -EINVAL; + } + + if (of_property_read_u16(pdev->dev.of_node, "method-fid", + &priv->func_num)) + return -ENXIO; + + if (of_property_read_u16(pdev->dev.of_node, "quality", + &priv->rng.quality)) + return -ENXIO; + + priv->rng.name = pdev->name; + priv->rng.read = sec_rng_read; + priv->rng.priv = (unsigned long)&pdev->dev; + + ret = devm_hwrng_register(&pdev->dev, &priv->rng); + if (ret) { + dev_err(&pdev->dev, "failed to register rng device: %d\n", ret); + return ret; + } + + return 0; +} + +static const struct of_device_id sec_rng_match[] = { + { .compatible = "arm,sec-rng", }, + {} +}; +MODULE_DEVICE_TABLE(of, sec_rng_match); + +static struct platform_driver sec_rng_driver = { + .probe = sec_rng_probe, + .driver = { + .name = KBUILD_MODNAME, + .owner = THIS_MODULE, + .of_match_table = sec_rng_match, + }, +}; + +module_platform_driver(sec_rng_driver); + +MODULE_DESCRIPTION("Security Random Number Generator Driver"); +MODULE_AUTHOR("Neal Liu "); +MODULE_LICENSE("GPL"); -- 1.7.9.5 _______________________________________________ Linux-mediatek mailing list Linux-mediatek@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-mediatek From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C8688C433DF for ; Tue, 2 Jun 2020 08:25:45 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 750C9206C3 for ; Tue, 2 Jun 2020 08:25:45 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="BbKyEU5f"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=mediatek.com header.i=@mediatek.com header.b="jbX9s15L" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 750C9206C3 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=mediatek.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-ID:Date:Subject:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=jCVpqen6trbsGtKvilPOEOdV1FaaSoIghaqbSBOBhfE=; b=BbKyEU5fb/UwKs wnK3h4mqRvQnI0A3uts9a6n+Y1CpZjDY2Q/jNnSYqy6aUjZjx4YjfmP+7EiEWbV6k4BkFLYwSNt/r ISRCR9mO7S4ryilQLv5RTl+MwqQYYXBNulCUrUDSfJ3pO/zp5roRj5QI53ptzxOOxc1NyU/I34Q7e 1xBNuA2N2dDhQKPmZJEXK00oCuaadOkEmUc+0BpPNmqvDSgnPa0Dlh8XBpMJZnixsD0o7aEkJQETa yEJyi3lQBvXf9ltB01aBmun5IrZgN8XINfg3Ge0Sw+5aJ0oVHqbEVxulYuwhlOioR4xxOB39ME2kw zEN7E8v3cdBxUlwRkTmg==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jg2Es-0005Es-1U; Tue, 02 Jun 2020 08:25:38 +0000 Received: from mailgw02.mediatek.com ([216.200.240.185]) by bombadil.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jg2EY-0004ye-I3; Tue, 02 Jun 2020 08:25:20 +0000 X-UUID: 1534da590d414aaeaf5a5b60ce0eac3e-20200602 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mediatek.com; s=dk; h=Content-Transfer-Encoding:Content-Type:MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:CC:To:From; bh=L04bYCk8wivAACUMFnflEPSxZwU86UwuPofSNkaCMCU=; b=jbX9s15LImbS1lMlL4qHc72C4/E7MkqS/qkQri6OS47xtgGtW6E7PrMgmuxo/TvBiI1wfLaXbxVs3fvoNnrdWM+hOCLRKPWQwiTahehaPEqmaPt7aRojDe6CytW4yT0PwniCGciFiCu0K8/X+sninvj15NtsUF5w2jNCXSq+Lg8=; X-UUID: 1534da590d414aaeaf5a5b60ce0eac3e-20200602 Received: from mtkcas66.mediatek.inc [(172.29.193.44)] by mailgw02.mediatek.com (envelope-from ) (musrelay.mediatek.com ESMTP with TLS) with ESMTP id 1968415831; Tue, 02 Jun 2020 00:25:16 -0800 Received: from MTKMBS01N2.mediatek.inc (172.21.101.79) by MTKMBS62DR.mediatek.inc (172.29.94.18) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 01:15:12 -0700 Received: from mtkcas08.mediatek.inc (172.21.101.126) by mtkmbs01n2.mediatek.inc (172.21.101.79) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 2 Jun 2020 16:14:59 +0800 Received: from mtkswgap22.mediatek.inc (172.21.77.33) by mtkcas08.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Tue, 2 Jun 2020 16:14:58 +0800 From: Neal Liu To: Matt Mackall , Herbert Xu , Rob Herring , Matthias Brugger , Sean Wang , Arnd Bergmann , "Greg Kroah-Hartman" Subject: [PATCH v6 2/2] hwrng: add sec-rng driver Date: Tue, 2 Jun 2020 16:14:38 +0800 Message-ID: <1591085678-22764-3-git-send-email-neal.liu@mediatek.com> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> References: <1591085678-22764-1-git-send-email-neal.liu@mediatek.com> MIME-Version: 1.0 X-TM-SNTS-SMTP: 909ABA3B6E64AD00041CC4B3A9BF7D20E656DA2E14FD0DBC349B80906CF174CA2000:8 X-MTK: N X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200602_012518_602880_D9150D9A X-CRM114-Status: GOOD ( 16.75 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: devicetree@vger.kernel.org, wsd_upstream@mediatek.com, lkml , Crystal Guo , linux-mediatek@lists.infradead.org, linux-crypto@vger.kernel.org, Neal Liu , linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org For security awareness SoCs on ARMv8 with TrustZone enabled, peripherals like entropy sources is not accessible from normal world (linux) and rather accessible from secure world (HYP/ATF/TEE) only. This driver aims to provide a generic interface to Arm Trusted Firmware or Hypervisor rng service. Signed-off-by: Neal Liu --- drivers/char/hw_random/Kconfig | 13 ++++ drivers/char/hw_random/Makefile | 1 + drivers/char/hw_random/sec-rng.c | 155 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 169 insertions(+) create mode 100644 drivers/char/hw_random/sec-rng.c diff --git a/drivers/char/hw_random/Kconfig b/drivers/char/hw_random/Kconfig index 9bc46da..cb9c8a9 100644 --- a/drivers/char/hw_random/Kconfig +++ b/drivers/char/hw_random/Kconfig @@ -474,6 +474,19 @@ config HW_RANDOM_KEYSTONE help This option enables Keystone's hardware random generator. +config HW_RANDOM_SECURE + tristate "Arm Security Random Number Generator support" + depends on HAVE_ARM_SMCCC || COMPILE_TEST + default HW_RANDOM + help + This driver provides kernel-side support for the Arm Security + Random Number Generator. + + To compile this driver as a module, choose M here. the + module will be called sec-rng. + + If unsure, say Y. + endif # HW_RANDOM config UML_RANDOM diff --git a/drivers/char/hw_random/Makefile b/drivers/char/hw_random/Makefile index a7801b4..04533d1 100644 --- a/drivers/char/hw_random/Makefile +++ b/drivers/char/hw_random/Makefile @@ -41,3 +41,4 @@ obj-$(CONFIG_HW_RANDOM_S390) += s390-trng.o obj-$(CONFIG_HW_RANDOM_KEYSTONE) += ks-sa-rng.o obj-$(CONFIG_HW_RANDOM_OPTEE) += optee-rng.o obj-$(CONFIG_HW_RANDOM_NPCM) += npcm-rng.o +obj-$(CONFIG_HW_RANDOM_SECURE) += sec-rng.o diff --git a/drivers/char/hw_random/sec-rng.c b/drivers/char/hw_random/sec-rng.c new file mode 100644 index 0000000..c6d3872 --- /dev/null +++ b/drivers/char/hw_random/sec-rng.c @@ -0,0 +1,155 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (C) 2020 MediaTek Inc. + */ + +#include +#include +#include +#include +#include + +#define SMC_RET_NUM 4 +#define SEC_RND_SIZE (sizeof(u32) * SMC_RET_NUM) + +#define HWRNG_SMC_FAST_CALL_VAL(func_num) \ + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, ARM_SMCCC_SMC_32, \ + ARM_SMCCC_OWNER_SIP, (func_num)) + +#define to_sec_rng(p) container_of(p, struct sec_rng_priv, rng) + +typedef void (sec_rng_fn)(unsigned long, unsigned long, unsigned long, + unsigned long, unsigned long, unsigned long, + unsigned long, unsigned long, + struct arm_smccc_res *); + +struct sec_rng_priv { + u16 func_num; + sec_rng_fn *rng_fn; + struct hwrng rng; +}; + +/* Simple wrapper functions to be able to use a function pointer */ +static void sec_rng_smc(unsigned long a0, unsigned long a1, + unsigned long a2, unsigned long a3, + unsigned long a4, unsigned long a5, + unsigned long a6, unsigned long a7, + struct arm_smccc_res *res) +{ + arm_smccc_smc(a0, a1, a2, a3, a4, a5, a6, a7, res); +} + +static void sec_rng_hvc(unsigned long a0, unsigned long a1, + unsigned long a2, unsigned long a3, + unsigned long a4, unsigned long a5, + unsigned long a6, unsigned long a7, + struct arm_smccc_res *res) +{ + arm_smccc_hvc(a0, a1, a2, a3, a4, a5, a6, a7, res); +} + +static bool __sec_get_rnd(struct sec_rng_priv *priv, uint32_t *val) +{ + struct arm_smccc_res res; + + priv->rng_fn(HWRNG_SMC_FAST_CALL_VAL(priv->func_num), + 0, 0, 0, 0, 0, 0, 0, &res); + + if (!res.a0 && !res.a1 && !res.a2 && !res.a3) + return false; + + val[0] = res.a0; + val[1] = res.a1; + val[2] = res.a2; + val[3] = res.a3; + + return true; +} + +static int sec_rng_read(struct hwrng *rng, void *buf, size_t max, bool wait) +{ + struct sec_rng_priv *priv = to_sec_rng(rng); + u32 val[4] = {0}; + int retval = 0; + int i; + + while (max >= SEC_RND_SIZE) { + if (!__sec_get_rnd(priv, val)) + return retval; + + for (i = 0; i < SMC_RET_NUM; i++) { + *(u32 *)buf = val[i]; + buf += sizeof(u32); + } + + retval += SEC_RND_SIZE; + max -= SEC_RND_SIZE; + } + + return retval; +} + +static int sec_rng_probe(struct platform_device *pdev) +{ + struct sec_rng_priv *priv; + const char *method; + int ret; + + priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL); + if (!priv) + return -ENOMEM; + + if (of_property_read_string(pdev->dev.of_node, "method", &method)) + return -ENXIO; + + if (!strncmp("smc", method, strlen("smc"))) + priv->rng_fn = sec_rng_smc; + else if (!strncmp("hvc", method, strlen("hvc"))) + priv->rng_fn = sec_rng_hvc; + + if (IS_ERR(priv->rng_fn)) { + dev_err(&pdev->dev, "method %s is not supported\n", method); + return -EINVAL; + } + + if (of_property_read_u16(pdev->dev.of_node, "method-fid", + &priv->func_num)) + return -ENXIO; + + if (of_property_read_u16(pdev->dev.of_node, "quality", + &priv->rng.quality)) + return -ENXIO; + + priv->rng.name = pdev->name; + priv->rng.read = sec_rng_read; + priv->rng.priv = (unsigned long)&pdev->dev; + + ret = devm_hwrng_register(&pdev->dev, &priv->rng); + if (ret) { + dev_err(&pdev->dev, "failed to register rng device: %d\n", ret); + return ret; + } + + return 0; +} + +static const struct of_device_id sec_rng_match[] = { + { .compatible = "arm,sec-rng", }, + {} +}; +MODULE_DEVICE_TABLE(of, sec_rng_match); + +static struct platform_driver sec_rng_driver = { + .probe = sec_rng_probe, + .driver = { + .name = KBUILD_MODNAME, + .owner = THIS_MODULE, + .of_match_table = sec_rng_match, + }, +}; + +module_platform_driver(sec_rng_driver); + +MODULE_DESCRIPTION("Security Random Number Generator Driver"); +MODULE_AUTHOR("Neal Liu "); +MODULE_LICENSE("GPL"); -- 1.7.9.5 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel