Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1520928ybl; Tue, 3 Dec 2019 08:24:38 -0800 (PST) X-Google-Smtp-Source: APXvYqyzvO2h/bw7uG8ku/ZTjfq08r9KSS7KtzRnLTK0RDy+6ihsVFYBf5oMCbAEVuZSChfGS902 X-Received: by 2002:a05:6830:13d9:: with SMTP id e25mr3742082otq.134.1575390278683; Tue, 03 Dec 2019 08:24:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575390278; cv=none; d=google.com; s=arc-20160816; b=B7JURoCrlicNTOQEabL7uq9zgwztWFp4xUIYgd/jPyOBLIghvzJlEfJOEnIHMmKwOc LVkm0EBjlOhADBmDtLvqEjzB5tFwGXQX4ey8O2rAUMh9teBuMSUcxY1s8HYuHNEgt1xv hAZAGT90mehQfyOy7msdv9PxjriAN/QalhbUc3FIj/jwXmLCN77amxa/5u3f5roll8mz DBi8dyAKKqWLEv9J1my3m/d3AEMiS88J5v5rQKdpYIYHnYfiDk8N8GoUtRaWJrCptXHC tKWhAR/mTNV3oEqPRvaldNi/AUb8rLJ649froc55tby/RdhKXGd65jQxQJeww9PoPACe 8QgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=wle6ftF3vYNvjHLW0AC3BqyDRZsOSFp+4C26kE+oXNI=; b=z+C7Y2X7VmS4qbH1h66rQG7CE1dE+oY3ow0CcM0lBDIHFbySKrsuoihU1bgZVVDX6Q jYqrJ5Dke3mZQYOZp6AT5zbEVA7pou+DEloxfDlIuCQduagJsAJGQMLCzggdm61i49It fLVmP/JoxkZy89kFmmEeI9joEC9fcvZlZMtHr9FaYnnf01jqiGKYb5nThfMUp26711fD 5N9kgN63sdn5BGvxkWMbUiNzK0nll1dHuPHInAE4+L/4Zax7cLmzu4d0ETpZUUV7cNhZ 1RWP4jtoIqUR2ke/aiofPAB/S3bjWEoV5pHM9hjhVkNvzX0sMoXoB4otbijFPuJI7gwX iAsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=f+Fvu++w; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d24si1448558otp.110.2019.12.03.08.24.22; Tue, 03 Dec 2019 08:24:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=f+Fvu++w; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726847AbfLCQYR (ORCPT + 99 others); Tue, 3 Dec 2019 11:24:17 -0500 Received: from mail-pl1-f193.google.com ([209.85.214.193]:44127 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726819AbfLCQYR (ORCPT ); Tue, 3 Dec 2019 11:24:17 -0500 Received: by mail-pl1-f193.google.com with SMTP id az9so1875504plb.11; Tue, 03 Dec 2019 08:24:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=wle6ftF3vYNvjHLW0AC3BqyDRZsOSFp+4C26kE+oXNI=; b=f+Fvu++wmpRb0OtIKu4TzxwMLkmSILc1DiDSdgGDk48Ot4XGTYCXafU7MfCcH0Vy/N DVyj0k2o4vNaLWbWgrvAZwlZpMFNcv15ruC8dv5aKo6NTtKFSH6KXYhjPYY5Qw3CMFLh Uo82AJ6xqFNOQMWz5rKtKE21d6014fipPIgrBsJYik+VzKEKckAG8sKx487h2KeUphYE 0snEjYDNK4DbCVIDjUuXKa6vyCg9XT+dgqHHWPE0nai9blD4I+7OSil5mEopoEPCDbxy OqXI7377J8F+Bs38y4FJ0veYcWKLCRglzfY7GHT6P1bJXCmJRHTJ9p9rQzBsW1wTrTuZ f/AA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=wle6ftF3vYNvjHLW0AC3BqyDRZsOSFp+4C26kE+oXNI=; b=T3PemRssC3mJEvxEDWcdqucOwe1Ca0d3Dj/fDhssYuLqZEbeluAeGw8LDFGwxiakr2 4JejplGQzIwSzgxl0SoazPkLZNgtpVNpb/LAyaHjjUcnoMPRWdgW0TcgIE28qPvTmAA+ u4u8q3S42ua4WTNDrfSu6vO7s1IyEH3PP4Y5TZ8oYyuhXaWND9JRPH2fFfZUHm2mwb1L gDsCY1fwhGVmdbBCbuJkBjhVDMzvfI+ltXGozOfXmaVJbwucG6Vp82kF1BTb93ZkUDRS IZRdWBFJrDWhtQ3fbiYJF/R3E7nqNtDoeEg016m1hXOEWnuZey6M86jR/qq7Z3+dw+a8 fACg== X-Gm-Message-State: APjAAAWpE8reFqsV/pIROGo9sXTdUx2etZF9voQEM4IjEUR0X8toZld6 oC0dpkSbl9kF5RURP/+ENlF/2ze24iU= X-Received: by 2002:a17:90a:1aa3:: with SMTP id p32mr6529505pjp.8.1575390256037; Tue, 03 Dec 2019 08:24:16 -0800 (PST) Received: from localhost.hsd1.wa.comcast.net ([2601:602:847f:811f:babe:8e8d:b27e:e6d7]) by smtp.gmail.com with ESMTPSA id g10sm4052093pgh.35.2019.12.03.08.24.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Dec 2019 08:24:15 -0800 (PST) From: Andrey Smirnov To: linux-crypto@vger.kernel.org Cc: Andrey Smirnov , Chris Healy , Lucas Stach , =?UTF-8?q?Horia=20Geant=C4=83?= , Herbert Xu , Iuliana Prodan , linux-imx@nxp.com, linux-kernel@vger.kernel.org Subject: [PATCH v5 2/4] crypto: caam - move RNG presence check into a shared function Date: Tue, 3 Dec 2019 08:23:55 -0800 Message-Id: <20191203162357.21942-3-andrew.smirnov@gmail.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20191203162357.21942-1-andrew.smirnov@gmail.com> References: <20191203162357.21942-1-andrew.smirnov@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Move the code to check if RNG block is instantiated into a shared function. This will be used by commits that follow. Signed-off-by: Andrey Smirnov Tested-by: Chris Healy Cc: Chris Healy Cc: Lucas Stach Cc: Horia Geantă Cc: Herbert Xu Cc: Iuliana Prodan Cc: linux-imx@nxp.com Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- drivers/crypto/caam/caamrng.c | 10 +--------- drivers/crypto/caam/intern.h | 14 ++++++++++++++ 2 files changed, 15 insertions(+), 9 deletions(-) diff --git a/drivers/crypto/caam/caamrng.c b/drivers/crypto/caam/caamrng.c index e8baacaabe07..041fbd015691 100644 --- a/drivers/crypto/caam/caamrng.c +++ b/drivers/crypto/caam/caamrng.c @@ -313,19 +313,11 @@ void caam_rng_exit(void) int caam_rng_init(struct device *ctrldev) { struct device *dev; - u32 rng_inst; struct caam_drv_private *priv = dev_get_drvdata(ctrldev); int err; init_done = false; - /* Check for an instantiated RNG before registration */ - if (priv->era < 10) - rng_inst = (rd_reg32(&priv->ctrl->perfmon.cha_num_ls) & - CHA_ID_LS_RNG_MASK) >> CHA_ID_LS_RNG_SHIFT; - else - rng_inst = rd_reg32(&priv->ctrl->vreg.rng) & CHA_VER_NUM_MASK; - - if (!rng_inst) + if (!caam_has_rng(priv)) return 0; dev = caam_jr_alloc(); diff --git a/drivers/crypto/caam/intern.h b/drivers/crypto/caam/intern.h index c7c10c90464b..f815e1ad4608 100644 --- a/drivers/crypto/caam/intern.h +++ b/drivers/crypto/caam/intern.h @@ -104,6 +104,20 @@ struct caam_drv_private { #endif }; +static inline bool caam_has_rng(struct caam_drv_private *priv) +{ + u32 rng_inst; + + /* Check for an instantiated RNG before registration */ + if (priv->era < 10) + rng_inst = (rd_reg32(&priv->ctrl->perfmon.cha_num_ls) & + CHA_ID_LS_RNG_MASK) >> CHA_ID_LS_RNG_SHIFT; + else + rng_inst = rd_reg32(&priv->ctrl->vreg.rng) & CHA_VER_NUM_MASK; + + return rng_inst; +} + #ifdef CONFIG_CRYPTO_DEV_FSL_CAAM_CRYPTO_API int caam_algapi_init(struct device *dev); -- 2.21.0