Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp6590380rwp; Tue, 18 Jul 2023 02:54:52 -0700 (PDT) X-Google-Smtp-Source: APBJJlEr2UXo+rHtO+WcHwvYvksdF0gHk7TELR73xJ9/zzawJzy1Hhzzb5yJ0S6uJcxvTvRhxunt X-Received: by 2002:a05:6358:42a1:b0:134:c373:fef1 with SMTP id s33-20020a05635842a100b00134c373fef1mr10642916rwc.18.1689674092142; Tue, 18 Jul 2023 02:54:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689674092; cv=none; d=google.com; s=arc-20160816; b=EiFDpjUvaMeXTRTEfcbtX9zuRy8jyCqArk1hoZ3geTHniwjEUEG416lHwG2k2HuesD V0bGkR8BbRxA06Ze9bjmUrd/i+crbyMZOJgm7qrwubOONgAO8wHTkCrLuqfQoffobL/G 1skkAVlJZnHtoiT9z9Mn31SX4Rb662CTR4lg5twexcP96GTHDqFcKql1a8Fqnvpfesfu 2sDI0ky5HBPEaHQEzmXmMfSI+KDg/fa2bE/TxO2TFgxNVIXATxP84RwI48VPsK8inbqD uV6U2u5mQ0Idt5bOvFcGHIQxBkZ7M3cUNrmrMZfYjMN2XjLWjcyquW/SZhtiVZZD0qgB haiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id; bh=lveWh2s97S3V5Z0THsrhlzmJs1pG2GQer4kPcHprWcc=; fh=6d3SrMh/uoBeXS/qmWtUYD+i2r5EBunm6iVe1slqCME=; b=jLYXioSl6AfhOzcfyR6PiTKSZyWDA8XODfETVM+JH4KCFpqeSqGJCHh9ZsdFcBLlJT wzPUzDp4RdTFZRqVOIqrTFJwSpQnCcrFwW0I/b0LA/AJ/6rmRWc6zGD8bswhPB1RMn8Z FWM5yrZW94fQmnRccTRyXoJxQ+t8N7sv1nKbyJxfdjHRAMQQZ/Qx6X7Q+izbJIIQfA1E asYwWi6ekKyZefb5n9iRC0sLpVDo5Mu2Y72ChbPxOhgaZOo76nuLh7GnJyT/jDCtUpR+ 8opKwyemt9TuLic/nNTOSinaT8/RL6ZZ7jkDpZItsDZSRYrPO/gEaDlSeMn0F3Ih+eSF F05Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c2-20020a63d142000000b0055c07307e5bsi1382190pgj.64.2023.07.18.02.54.29; Tue, 18 Jul 2023 02:54:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229831AbjGRJnR (ORCPT + 99 others); Tue, 18 Jul 2023 05:43:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44534 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229972AbjGRJnQ (ORCPT ); Tue, 18 Jul 2023 05:43:16 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1AF6FCA for ; Tue, 18 Jul 2023 02:43:15 -0700 (PDT) Received: from ptz.office.stw.pengutronix.de ([2a0a:edc0:0:900:1d::77] helo=[127.0.0.1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1qLhEa-0003t9-Bj; Tue, 18 Jul 2023 11:43:08 +0200 Message-ID: Date: Tue, 18 Jul 2023 11:43:02 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0 Subject: Re: [PATCH] crypto: caam - adjust RNG timing to support more devices Content-Language: en-US From: Bastian Krause To: meenakshi.aggarwal@nxp.com, horia.geanta@nxp.com, V.sethi@nxp.com, pankaj.gupta@nxp.com, gaurav.jain@nxp.com, herbert@gondor.apana.org.au, davem@davemloft.net, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Victoria Milhoan , Dan Douglass , Vipul Kumar , kernel@pengutronix.de References: <20230612082615.1255357-1-meenakshi.aggarwal@nxp.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:900:1d::77 X-SA-Exim-Mail-From: bst@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 7/17/23 14:43, Bastian Krause wrote: > On 6/12/23 10:26, meenakshi.aggarwal@nxp.com wrote: >> From: Victoria Milhoan >> >> Adjust RNG timing parameters to support more i.MX6 devices. >> >> Signed-off-by: Victoria Milhoan >> Signed-off-by: Dan Douglass >> Signed-off-by: Vipul Kumar >> Signed-off-by: Horia Geantă >> --- >>   drivers/crypto/caam/ctrl.c | 4 ++-- >>   1 file changed, 2 insertions(+), 2 deletions(-) > > This patch seems to breaks CAAM RNG instantiation on an i.MX8MM at my end: > > caam 30900000.crypto: Entropy delay = 3200 > caam 30900000.crypto: Entropy delay = 3600 > [...] > caam 30900000.crypto: Entropy delay = 12400 > caam 30900000.crypto: failed to instantiate RNG > caam: probe of 30900000.crypto failed with error -11 > > If I revert this patch or increase RTSDCTL_ENT_DLY_MAX to a value > > 66800, it works again: > > caam 30900000.crypto: Entropy delay = 32800 > caam 30900000.crypto: Entropy delay = 33200 > [...] > caam 30900000.crypto: Entropy delay = 66800 > caam 30900000.crypto: Instantiated RNG4 SH0 > caam 30900000.crypto: Instantiated RNG4 SH1 > caam 30900000.crypto: device ID = 0x0a16040100000000 (Era 9) > caam 30900000.crypto: job rings = 2, qi = 0 > caam algorithms registered in /proc/crypto > caam 30900000.crypto: caam pkc algorithms registered in /proc/crypto > caam 30900000.crypto: registering rng-caam > Executing RNG SELF-TEST with wait > random: crng init done > caam 30900000.crypto: rng crypto API alg registered prng-caam This ^ was the kernel log for.. --- a/drivers/crypto/caam/regs.h +++ b/drivers/crypto/caam/regs.h @@@ -522,7 -522,7 +522,7 @@@ struct rng4tst #define RTSDCTL_ENT_DLY_SHIFT 16 #define RTSDCTL_ENT_DLY_MASK (0xffff << RTSDCTL_ENT_DLY_SHIFT) #define RTSDCTL_ENT_DLY_MIN 3200 --#define RTSDCTL_ENT_DLY_MAX 12800 ++#define RTSDCTL_ENT_DLY_MAX 70000 #define RTSDCTL_SAMP_SIZE_MASK 0xffff #define RTSDCTL_SAMP_SIZE_VAL 512 u32 rtsdctl; /* seed control register */ For completion's sake: Reverting this patch.. --- a/drivers/crypto/caam/ctrl.c +++ b/drivers/crypto/caam/ctrl.c @@ -383,7 +383,7 @@ static void kick_trng(struct device *dev, int ent_delay) /* min. freq. count, equal to 1/4 of the entropy sample length */ wr_reg32(&r4tst->rtfrqmin, val >> 2); /* max. freq. count, equal to 16 times the entropy sample length */ - wr_reg32(&r4tst->rtfrqmax, val << 4); + wr_reg32(&r4tst->rtfrqmax, RTFRQMAX_DISABLE); } wr_reg32(&r4tst->rtsdctl, (val << RTSDCTL_ENT_DLY_SHIFT) | ..produces this kernel log (without RNG SELF-TEST): caam 30900000.crypto: Entropy delay = 3200 caam 30900000.crypto: Entropy delay = 3600 caam 30900000.crypto: Instantiated RNG4 SH0 caam 30900000.crypto: Instantiated RNG4 SH1 caam 30900000.crypto: device ID = 0x0a16040100000000 (Era 9) caam 30900000.crypto: job rings = 2, qi = 0 caam algorithms registered in /proc/crypto caam 30900000.crypto: caam pkc algorithms registered in /proc/crypto caam 30900000.crypto: registering rng-caam caam 30900000.crypto: rng crypto API alg registered prng-caam random: crng init done Regards, Bastian >> >> diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c >> index 5fed3cf354c0..62dd069942e4 100644 >> --- a/drivers/crypto/caam/ctrl.c >> +++ b/drivers/crypto/caam/ctrl.c >> @@ -383,8 +383,8 @@ static void kick_trng(struct device *dev, int >> ent_delay) >>       wr_reg32(&r4tst->rtsdctl, val); >>       /* min. freq. count, equal to 1/4 of the entropy sample length */ >>       wr_reg32(&r4tst->rtfrqmin, ent_delay >> 2); >> -    /* disable maximum frequency count */ >> -    wr_reg32(&r4tst->rtfrqmax, RTFRQMAX_DISABLE); >> +    /* max. freq. count, equal to 16 times the entropy sample length */ >> +    wr_reg32(&r4tst->rtfrqmax, ent_delay << 4); >>       /* read the control register */ >>       val = rd_reg32(&r4tst->rtmctl); >>   start_rng: > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |