diff options
author | Srujana Challa <schalla@marvell.com> | 2022-01-25 19:26:22 +0100 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2022-02-05 05:10:50 +0100 |
commit | bd9305b0cb69bfe98885a63a9e6231ae92e822e2 (patch) | |
tree | 446ab0b5f0470cd54c7b1ddb6fcc5154083f640b /kernel/range.c | |
parent | hwrng: core - break out of hwrng_fillfn if current rng is not trusted (diff) | |
download | linux-bd9305b0cb69bfe98885a63a9e6231ae92e822e2.tar.xz linux-bd9305b0cb69bfe98885a63a9e6231ae92e822e2.zip |
crypto: octeontx2 - CN10K CPT to RNM workaround
When software sets CPT_AF_CTL[RNM_REQ_EN]=1 and RNM in not producing
entropy(i.e., RNM_ENTROPY_STATUS[NORMAL_CNT] < 0x40), the first cycle of
the response may be lost due to a conditional clocking issue. Due to
this, the subsequent random number stream will be corrupted. So, this
patch adds support to ensure RNM_ENTROPY_STATUS[NORMAL_CNT] = 0x40
before writing CPT_AF_CTL[RNM_REQ_EN] = 1, as a workaround.
Signed-off-by: Srujana Challa <schalla@marvell.com>
Signed-off-by: Shijith Thotton <sthotton@marvell.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'kernel/range.c')
0 files changed, 0 insertions, 0 deletions