[PATCH v5 5/8] sandbox: rng: Add a random number generator(rng) driver
Heinrich Schuchardt
xypron.glpk at gmx.de
Fri Dec 27 07:54:22 CET 2019
On 12/26/19 6:25 PM, Sughosh Ganu wrote:
> Add a sandbox driver for random number generation. Mostly aimed at
> providing a unit test for rng uclass.
>
> Signed-off-by: Sughosh Ganu <sughosh.ganu at linaro.org>
> Reviewed-by: Patrice Chotard <patrice.chotard at st.com>
> ---
> Changes since V4:
> * Return number of bytes read on a successful read, and a -ve value on
> error.
> * Modify the logic of sandbox_rng_read function to use rand and srand
> functions to return random data, based on feedback from Heinrich
> Schuchardt.
>
> arch/sandbox/dts/test.dts | 4 ++++
> drivers/rng/Kconfig | 8 +++++++
> drivers/rng/Makefile | 1 +
> drivers/rng/sandbox_rng.c | 56 +++++++++++++++++++++++++++++++++++++++++++++++
> 4 files changed, 69 insertions(+)
> create mode 100644 drivers/rng/sandbox_rng.c
>
> diff --git a/arch/sandbox/dts/test.dts b/arch/sandbox/dts/test.dts
> index fdb08f2..2c85540 100644
> --- a/arch/sandbox/dts/test.dts
> +++ b/arch/sandbox/dts/test.dts
> @@ -599,6 +599,10 @@
> reset-names = "other", "test";
> };
>
> + rng at 0 {
> + compatible = "sandbox,sandbox-rng";
> + };
> +
> rproc_1: rproc at 1 {
> compatible = "sandbox,test-processor";
> remoteproc-name = "remoteproc-test-dev1";
> diff --git a/drivers/rng/Kconfig b/drivers/rng/Kconfig
> index c9c4751..35a3bd1 100644
> --- a/drivers/rng/Kconfig
> +++ b/drivers/rng/Kconfig
> @@ -6,6 +6,14 @@ config DM_RNG
> This interface is used to initialise the rng device and to
> read the random seed from the device.
>
> +config RNG_SANDBOX
> + bool "Sandbox random number generator"
> + depends on SANDBOX && DM_RNG
> + select CONFIG_LIB_RAND
> + help
> + Enable random number generator for sandbox. This is an
> + emulation of a rng device.
> +
> config RNG_STM32MP1
> bool "Enable random number generator for STM32MP1"
> depends on ARCH_STM32MP && DM_RNG
> diff --git a/drivers/rng/Makefile b/drivers/rng/Makefile
> index 699beb3..3517005 100644
> --- a/drivers/rng/Makefile
> +++ b/drivers/rng/Makefile
> @@ -4,4 +4,5 @@
> #
>
> obj-$(CONFIG_DM_RNG) += rng-uclass.o
> +obj-$(CONFIG_RNG_SANDBOX) += sandbox_rng.o
> obj-$(CONFIG_RNG_STM32MP1) += stm32mp1_rng.o
> diff --git a/drivers/rng/sandbox_rng.c b/drivers/rng/sandbox_rng.c
> new file mode 100644
> index 0000000..5de1799
> --- /dev/null
> +++ b/drivers/rng/sandbox_rng.c
> @@ -0,0 +1,56 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/*
> + * Copyright (c) 2019, Linaro Limited
> + */
> +
> +#include <common.h>
> +#include <dm.h>
> +#include <rng.h>
> +
> +#include <linux/string.h>
> +
> +static int sandbox_rng_read(struct udevice *dev, void *data, size_t len)
> +{
> + int nbytes;
> + unsigned int i, seed;
> + unsigned int *buf = data;
You assume here that data is 4 byte aligned which may not hold true and
hence may lead to a crash on ARM.
Best regards
Heinrich
> + size_t nrem, nloops;
> +
> + /*
> + * Only INT_MAX number of bytes can be returned. If more
> + * bytes need to be read, the caller must do it in a loop.
> + */
> + if (len > INT_MAX)
> + len = INT_MAX;
> +
> + nbytes = len;
> + nloops = len / sizeof(unsigned int);
> + seed = get_timer(0) ^ rand();
> + srand(seed);
> +
> + for (i = 0, nrem = len; i < nloops; i++, nrem -= sizeof(unsigned int))
> + *buf++ = rand();
> +
> + seed = rand();
> + memcpy(buf, &seed, nrem);
> +
> + return nbytes;
> +}
> +
> +static const struct dm_rng_ops sandbox_rng_ops = {
> + .read = sandbox_rng_read,
> +};
> +
> +static const struct udevice_id sandbox_rng_match[] = {
> + {
> + .compatible = "sandbox,sandbox-rng",
> + },
> + {},
> +};
> +
> +U_BOOT_DRIVER(sandbox_rng) = {
> + .name = "sandbox-rng",
> + .id = UCLASS_RNG,
> + .of_match = sandbox_rng_match,
> + .ops = &sandbox_rng_ops,
> +};
>
More information about the U-Boot
mailing list