Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/arch/mips/cavium/dev Oceton RNG/RNM driver modernisation...
details: https://anonhg.NetBSD.org/src/rev/0d4d0294509f
branches: trunk
changeset: 932615:0d4d0294509f
user: simonb <simonb%NetBSD.org@localhost>
date: Tue May 12 14:04:50 2020 +0000
description:
Oceton RNG/RNM driver modernisation to fit new entropy world order by
riastradh@, with some tweaks to get working in RNG mode.
XXX TODO: work out how to get raw entropy mode working.
diffstat:
sys/arch/mips/cavium/dev/octeon_rnm.c | 139 ++++++++++++++-------------------
1 files changed, 60 insertions(+), 79 deletions(-)
diffs (213 lines):
diff -r 9e05e7de25fa -r 0d4d0294509f sys/arch/mips/cavium/dev/octeon_rnm.c
--- a/sys/arch/mips/cavium/dev/octeon_rnm.c Tue May 12 11:39:08 2020 +0000
+++ b/sys/arch/mips/cavium/dev/octeon_rnm.c Tue May 12 14:04:50 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: octeon_rnm.c,v 1.3 2020/05/12 10:37:10 simonb Exp $ */
+/* $NetBSD: octeon_rnm.c,v 1.4 2020/05/12 14:04:50 simonb Exp $ */
/*
* Copyright (c) 2007 Internet Initiative Japan, Inc.
@@ -27,14 +27,13 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: octeon_rnm.c,v 1.3 2020/05/12 10:37:10 simonb Exp $");
+__KERNEL_RCSID(0, "$NetBSD: octeon_rnm.c,v 1.4 2020/05/12 14:04:50 simonb Exp $");
#include <sys/param.h>
#include <sys/device.h>
-#include <sys/systm.h>
-#include <sys/sysctl.h>
#include <sys/kernel.h>
#include <sys/rndsource.h>
+#include <sys/systm.h>
#include <mips/locore.h>
#include <mips/cavium/include/iobusvar.h>
@@ -45,26 +44,18 @@
#include <sys/bus.h>
#define RNG_DELAY_CLOCK 91
-#define RNG_DEF_BURST_COUNT 10
-
-int octeon_rnm_burst_count = RNG_DEF_BURST_COUNT;
struct octeon_rnm_softc {
- device_t sc_dev;
-
bus_space_tag_t sc_bust;
bus_space_handle_t sc_regh;
-
+ kmutex_t sc_lock;
krndsource_t sc_rndsrc; /* /dev/random source */
- struct callout sc_rngto; /* rng timeout */
- int sc_rnghz; /* rng poll time */
};
static int octeon_rnm_match(device_t, struct cfdata *, void *);
static void octeon_rnm_attach(device_t, device_t, void *);
-static void octeon_rnm_rng(void *);
-static inline uint64_t octeon_rnm_load(struct octeon_rnm_softc *);
-static inline int octeon_rnm_iobdma(struct octeon_rnm_softc *);
+static void octeon_rnm_rng(size_t, void *);
+static uint64_t octeon_rnm_load(struct octeon_rnm_softc *);
CFATTACH_DECL_NEW(octeon_rnm, sizeof(struct octeon_rnm_softc),
octeon_rnm_match, octeon_rnm_attach, NULL, NULL);
@@ -94,7 +85,6 @@
aprint_normal("\n");
- sc->sc_dev = self;
sc->sc_bust = aa->aa_bust;
if (bus_space_map(aa->aa_bust, aa->aa_unit->addr, RNM_SIZE,
0, &sc->sc_regh) != 0) {
@@ -110,48 +100,81 @@
return;
}
+ mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_VM);
+
+#ifdef notyet
+ /*
+ * Enable the internal ring oscillator entropy source (ENT),
+ * but disable the LFSR/SHA-1 engine (RNG) so we get the raw RO
+ * samples.
+ *
+ * XXX simonb
+ * To access the raw entropy, it looks like this needs to be
+ * done through the IOBDMA. Put this in the "Too Hard For Now"
+ * basket and just use the RNG.
+ */
+ bus_space_write_8(sc->sc_bust, sc->sc_regh, RNM_CTL_STATUS_OFFSET,
+ RNM_CTL_STATUS_EXP_ENT | RNM_CTL_STATUS_ENT_EN);
+
+ /*
+ * Once entropy is enabled, 64 bits of raw entropy is available
+ * every 8 clock cycles. Wait a microsecond now before the
+ * random callback is called to much sure random data is
+ * available.
+ */
+ delay(1);
+#else
+ /* Enable the LFSR/SHA-1 engine (RNG). */
bus_space_write_8(sc->sc_bust, sc->sc_regh, RNM_CTL_STATUS_OFFSET,
RNM_CTL_STATUS_RNG_EN | RNM_CTL_STATUS_ENT_EN);
- if (hz >= 100)
- sc->sc_rnghz = hz / 100;
- else
- sc->sc_rnghz = 1;
+ /*
+ * Once entropy is enabled, a 64-bit random number is available
+ * every 81 clock cycles. Wait a microsecond now before the
+ * random callback is called to much sure random data is
+ * available.
+ */
+ delay(1);
+#endif
- rnd_attach_source(&sc->sc_rndsrc, device_xname(sc->sc_dev),
- RND_TYPE_RNG, RND_FLAG_NO_ESTIMATE);
-
- callout_init(&sc->sc_rngto, 0);
-
- octeon_rnm_rng(sc);
-
- aprint_normal("%s: random number generator enabled: %dhz\n",
- device_xname(sc->sc_dev), sc->sc_rnghz);
+ rndsource_setcb(&sc->sc_rndsrc, octeon_rnm_rng, sc);
+ rnd_attach_source(&sc->sc_rndsrc, device_xname(self), RND_TYPE_RNG,
+ RND_FLAG_DEFAULT | RND_FLAG_HASCB);
}
static void
-octeon_rnm_rng(void *vsc)
+octeon_rnm_rng(size_t nbytes, void *vsc)
{
struct octeon_rnm_softc *sc = vsc;
uint64_t rn;
int i;
- for (i = 0; i < octeon_rnm_burst_count; i++) {
+ /* Prevent concurrent access from emptying the FIFO. */
+ mutex_enter(&sc->sc_lock);
+ for (i = 0; i < howmany(nbytes, sizeof(rn)); i++) {
rn = octeon_rnm_load(sc);
rnd_add_data(&sc->sc_rndsrc,
&rn, sizeof(rn), sizeof(rn) * NBBY);
/*
* XXX
- * delay should be over RNG_DELAY_CLOCK cycles at least,
- * we need nanodelay() or clkdelay().
+ *
+ * If accessing RNG data, the 512 byte FIFO that gets
+ * 8 bytes of RNG data added every 81 clock cycles.
+ *
+ * If accessing raw oscillator entropy, the 512 byte
+ * FIFO gets 8 bytes of raw entropy added every 8 clock
+ * cycles.
+ *
+ * We should in theory rate limit calls to
+ * octeon_rnm_load() to observe this limit. In practice
+ * we don't appear to call octeon_rnm_load() anywhere
+ * near that often.
*/
- delay(1);
}
-
- callout_reset(&sc->sc_rngto, sc->sc_rnghz, octeon_rnm_rng, sc);
+ mutex_exit(&sc->sc_lock);
}
-static inline uint64_t
+static uint64_t
octeon_rnm_load(struct octeon_rnm_softc *sc)
{
uint64_t addr =
@@ -161,45 +184,3 @@
return octeon_xkphys_read_8(addr);
}
-
-static inline int
-octeon_rnm_iobdma(struct octeon_rnm_softc *sc)
-{
-
- /* XXX */
- return 0;
-}
-
-SYSCTL_SETUP(octeon_rnm_sysctl, "sysctl octeon_rnm subtree setup")
-{
- int rc, root_num;
- const struct sysctlnode *node;
-
- if ( (rc = sysctl_createv(clog, 0, NULL, NULL,
- CTLFLAG_PERMANENT, CTLTYPE_NODE, "hw", NULL,
- NULL, 0, NULL, 0, CTL_HW, CTL_EOL)) != 0) {
- goto err;
- }
-
- if ( (rc = sysctl_createv(clog, 0, NULL, &node,
- CTLFLAG_PERMANENT, CTLTYPE_NODE, "octeon_rnm",
- SYSCTL_DESCR("octeon_rnm controls"),
- NULL, 0, NULL, 0, CTL_HW, CTL_CREATE, CTL_EOL)) != 0) {
- goto err;
- }
-
- root_num = node->sysctl_num;
-
- if ( (rc = sysctl_createv(clog, 0, NULL, NULL,
- CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
- CTLTYPE_INT, "burst_count",
- SYSCTL_DESCR("Burst read count per callout"),
- NULL, 0, &octeon_rnm_burst_count,
- 0, CTL_HW, root_num, CTL_CREATE, CTL_EOL)) != 0) {
- goto err;
- }
-
- return;
-err:
- printf("%s: sysctl_createv failed (rc = %d)\n", __func__, rc);
-}
Home |
Main Index |
Thread Index |
Old Index