From nobody Wed Apr 29 09:34:24 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6BC93CCA47A for ; Sat, 11 Jun 2022 10:05:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229871AbiFKKFQ (ORCPT ); Sat, 11 Jun 2022 06:05:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57636 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229699AbiFKKFL (ORCPT ); Sat, 11 Jun 2022 06:05:11 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 485EF1162; Sat, 11 Jun 2022 03:05:10 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 027CCB83611; Sat, 11 Jun 2022 10:05:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1B0AEC3411D; Sat, 11 Jun 2022 10:05:07 +0000 (UTC) Authentication-Results: smtp.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="PsWskfdF" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zx2c4.com; s=20210105; t=1654941906; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mhWBKi7DDw492CEoMKT+q0A6R8rT2bu6t1gopqQtrBU=; b=PsWskfdFEBgIR9ivJdzgXPrSdQH8EVyjjyJlDtarIJUzZg7tHcz2ZTUBORwSVoyJqIETOL LwcEeyRZ8o0k9Na9HwPf6YmzgNDleR32nskjUTn+lhE1wtuOM2AJXvZNRuh7+4ZMtPZYgU ob9BDAHr8NYZ7K+JtQXkUaq8vC3aonk= Received: by mail.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 9d9ce964 (TLSv1.3:AEAD-AES256-GCM-SHA384:256:NO); Sat, 11 Jun 2022 10:05:06 +0000 (UTC) From: "Jason A. Donenfeld" To: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, Michael Ellerman Cc: "Jason A. Donenfeld" , stable@vger.kernel.org, Christophe Leroy Subject: [PATCH v2 1/3] powerpc/microwatt: wire up rng during setup_arch Date: Sat, 11 Jun 2022 12:04:45 +0200 Message-Id: <20220611100447.5066-2-Jason@zx2c4.com> In-Reply-To: <20220611100447.5066-1-Jason@zx2c4.com> References: <20220611100447.5066-1-Jason@zx2c4.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" The platform's RNG must be available before random_init() in order to be useful for initial seeding, which in turn means that it needs to be called from setup_arch(), rather than from an init call. Fortunately, each platform already has a setup_arch function pointer, which means it's easy to wire this up for each of the three platforms that have an RNG. This commit also removes some noisy log messages that don't add much. Cc: stable@vger.kernel.org Cc: Michael Ellerman Cc: Christophe Leroy Fixes: c25769fddaec ("powerpc/microwatt: Add support for hardware random nu= mber generator") Signed-off-by: Jason A. Donenfeld --- arch/powerpc/platforms/microwatt/rng.c | 9 ++------- arch/powerpc/platforms/microwatt/setup.c | 8 ++++++++ 2 files changed, 10 insertions(+), 7 deletions(-) diff --git a/arch/powerpc/platforms/microwatt/rng.c b/arch/powerpc/platform= s/microwatt/rng.c index 7bc4d1cbfaf0..d13f656910ad 100644 --- a/arch/powerpc/platforms/microwatt/rng.c +++ b/arch/powerpc/platforms/microwatt/rng.c @@ -29,7 +29,7 @@ static int microwatt_get_random_darn(unsigned long *v) return 1; } =20 -static __init int rng_init(void) +__init void microwatt_rng_init(void) { unsigned long val; int i; @@ -37,12 +37,7 @@ static __init int rng_init(void) for (i =3D 0; i < 10; i++) { if (microwatt_get_random_darn(&val)) { ppc_md.get_random_seed =3D microwatt_get_random_darn; - return 0; + return; } } - - pr_warn("Unable to use DARN for get_random_seed()\n"); - - return -EIO; } -machine_subsys_initcall(, rng_init); diff --git a/arch/powerpc/platforms/microwatt/setup.c b/arch/powerpc/platfo= rms/microwatt/setup.c index 0b02603bdb74..23c996dcc870 100644 --- a/arch/powerpc/platforms/microwatt/setup.c +++ b/arch/powerpc/platforms/microwatt/setup.c @@ -32,10 +32,18 @@ static int __init microwatt_populate(void) } machine_arch_initcall(microwatt, microwatt_populate); =20 +__init void microwatt_rng_init(void); + +static void __init microwatt_setup_arch(void) +{ + microwatt_rng_init(); +} + define_machine(microwatt) { .name =3D "microwatt", .probe =3D microwatt_probe, .init_IRQ =3D microwatt_init_IRQ, + .setup_arch =3D microwatt_setup_arch, .progress =3D udbg_progress, .calibrate_decr =3D generic_calibrate_decr, }; --=20 2.35.1 From nobody Wed Apr 29 09:34:24 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 85A66CCA47A for ; Sat, 11 Jun 2022 10:05:21 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230070AbiFKKFT (ORCPT ); Sat, 11 Jun 2022 06:05:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57966 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229822AbiFKKFO (ORCPT ); Sat, 11 Jun 2022 06:05:14 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 323F91162; Sat, 11 Jun 2022 03:05:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id DC478B83610; Sat, 11 Jun 2022 10:05:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0F036C34116; Sat, 11 Jun 2022 10:05:09 +0000 (UTC) Authentication-Results: smtp.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="gguJbPAu" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zx2c4.com; s=20210105; t=1654941909; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=C9JEGD/T94874e2WQF0vvmCHKGBmTtNF2+fOXO/TMAY=; b=gguJbPAuUbQTPdt/YwAUtZcmUJRay7cAzE/0jzDFDjQdJ+GZLeAB3i3PJZTtc6cxiYfMvN AfL78on8rWVrbMkCAmyZZSZ0l+Dy0wOOb9geL1VP6+peK+MNGplk/hx06X9camcsNzlh1P 7q1UIq51Obw2DPhnaRKI3KU8btu6oNs= Received: by mail.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id b7a67809 (TLSv1.3:AEAD-AES256-GCM-SHA384:256:NO); Sat, 11 Jun 2022 10:05:08 +0000 (UTC) From: "Jason A. Donenfeld" To: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, Michael Ellerman Cc: "Jason A. Donenfeld" , stable@vger.kernel.org, Christophe Leroy Subject: [PATCH v2 2/3] powerpc/powernv: wire up rng during setup_arch Date: Sat, 11 Jun 2022 12:04:46 +0200 Message-Id: <20220611100447.5066-3-Jason@zx2c4.com> In-Reply-To: <20220611100447.5066-1-Jason@zx2c4.com> References: <20220611100447.5066-1-Jason@zx2c4.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" The platform's RNG must be available before random_init() in order to be useful for initial seeding, which in turn means that it needs to be called from setup_arch(), rather than from an init call. Fortunately, each platform already has a setup_arch function pointer, which means it's easy to wire this up for each of the three platforms that have an RNG. This commit also removes some noisy log messages that don't add much. Cc: stable@vger.kernel.org Cc: Michael Ellerman Cc: Christophe Leroy Fixes: a4da0d50b2a0 ("powerpc: Implement arch_get_random_long/int() for pow= ernv") Signed-off-by: Jason A. Donenfeld --- arch/powerpc/platforms/powernv/rng.c | 17 ++++------------- arch/powerpc/platforms/powernv/setup.c | 4 ++++ 2 files changed, 8 insertions(+), 13 deletions(-) diff --git a/arch/powerpc/platforms/powernv/rng.c b/arch/powerpc/platforms/= powernv/rng.c index e3d44b36ae98..ef24e72a1b69 100644 --- a/arch/powerpc/platforms/powernv/rng.c +++ b/arch/powerpc/platforms/powernv/rng.c @@ -84,24 +84,20 @@ static int powernv_get_random_darn(unsigned long *v) return 1; } =20 -static int __init initialise_darn(void) +static void __init initialise_darn(void) { unsigned long val; int i; =20 if (!cpu_has_feature(CPU_FTR_ARCH_300)) - return -ENODEV; + return; =20 for (i =3D 0; i < 10; i++) { if (powernv_get_random_darn(&val)) { ppc_md.get_random_seed =3D powernv_get_random_darn; - return 0; + return; } } - - pr_warn("Unable to use DARN for get_random_seed()\n"); - - return -EIO; } =20 int powernv_get_random_long(unsigned long *v) @@ -163,14 +159,12 @@ static __init int rng_create(struct device_node *dn) =20 rng_init_per_cpu(rng, dn); =20 - pr_info_once("Registering arch random hook.\n"); - ppc_md.get_random_seed =3D powernv_get_random_long; =20 return 0; } =20 -static __init int rng_init(void) +__init void powernv_rng_init(void) { struct device_node *dn; int rc; @@ -188,7 +182,4 @@ static __init int rng_init(void) } =20 initialise_darn(); - - return 0; } -machine_subsys_initcall(powernv, rng_init); diff --git a/arch/powerpc/platforms/powernv/setup.c b/arch/powerpc/platform= s/powernv/setup.c index 824c3ad7a0fa..a0c5217bc5c0 100644 --- a/arch/powerpc/platforms/powernv/setup.c +++ b/arch/powerpc/platforms/powernv/setup.c @@ -184,6 +184,8 @@ static void __init pnv_check_guarded_cores(void) } } =20 +__init void powernv_rng_init(void); + static void __init pnv_setup_arch(void) { set_arch_panic_timeout(10, ARCH_PANIC_TIMEOUT); @@ -203,6 +205,8 @@ static void __init pnv_setup_arch(void) pnv_check_guarded_cores(); =20 /* XXX PMCS */ + + powernv_rng_init(); } =20 static void __init pnv_init(void) --=20 2.35.1 From nobody Wed Apr 29 09:34:24 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 42794C433EF for ; Sat, 11 Jun 2022 10:05:28 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230297AbiFKKFW (ORCPT ); Sat, 11 Jun 2022 06:05:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230020AbiFKKFQ (ORCPT ); Sat, 11 Jun 2022 06:05:16 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2F011162; Sat, 11 Jun 2022 03:05:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 94805B80735; Sat, 11 Jun 2022 10:05:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E5C26C3411D; Sat, 11 Jun 2022 10:05:11 +0000 (UTC) Authentication-Results: smtp.kernel.org; dkim=pass (1024-bit key) header.d=zx2c4.com header.i=@zx2c4.com header.b="SovZca05" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zx2c4.com; s=20210105; t=1654941911; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=860RRq4dCnrOZ6HPYeocn0YwALM93FOoHdN1hLMQjng=; b=SovZca05NNF2EplK2VYsnE7o8nYIQr8noM94aBOUWF0vtN6bJfXdQ79KDsMwWo0PylU+36 uktES5SXq2YPrwXx5FhlGCW63JL5rJ9mU7SZzZUykNqOCIk13QXuRsBQNCWoYvw5jxXkpe /PS1yjTVHKBRRIGuXsIrd5v/0YNcKhM= Received: by mail.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 389082eb (TLSv1.3:AEAD-AES256-GCM-SHA384:256:NO); Sat, 11 Jun 2022 10:05:11 +0000 (UTC) From: "Jason A. Donenfeld" To: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, Michael Ellerman Cc: "Jason A. Donenfeld" , stable@vger.kernel.org, Christophe Leroy Subject: [PATCH v2 3/3] powerpc/pseries: wire up rng during setup_arch Date: Sat, 11 Jun 2022 12:04:47 +0200 Message-Id: <20220611100447.5066-4-Jason@zx2c4.com> In-Reply-To: <20220611100447.5066-1-Jason@zx2c4.com> References: <20220611100447.5066-1-Jason@zx2c4.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" The platform's RNG must be available before random_init() in order to be useful for initial seeding, which in turn means that it needs to be called from setup_arch(), rather than from an init call. Fortunately, each platform already has a setup_arch function pointer, which means it's easy to wire this up for each of the three platforms that have an RNG. This commit also removes some noisy log messages that don't add much. Cc: stable@vger.kernel.org Cc: Michael Ellerman Cc: Christophe Leroy Fixes: a489043f4626 ("powerpc/pseries: Implement arch_get_random_long() bas= ed on H_RANDOM") Signed-off-by: Jason A. Donenfeld --- arch/powerpc/platforms/pseries/rng.c | 11 ++--------- arch/powerpc/platforms/pseries/setup.c | 3 +++ 2 files changed, 5 insertions(+), 9 deletions(-) diff --git a/arch/powerpc/platforms/pseries/rng.c b/arch/powerpc/platforms/= pseries/rng.c index 6268545947b8..d39bfce39aa1 100644 --- a/arch/powerpc/platforms/pseries/rng.c +++ b/arch/powerpc/platforms/pseries/rng.c @@ -24,19 +24,12 @@ static int pseries_get_random_long(unsigned long *v) return 0; } =20 -static __init int rng_init(void) +__init void pseries_rng_init(void) { struct device_node *dn; - dn =3D of_find_compatible_node(NULL, NULL, "ibm,random"); if (!dn) - return -ENODEV; - - pr_info("Registering arch random hook.\n"); - + return; ppc_md.get_random_seed =3D pseries_get_random_long; - of_node_put(dn); - return 0; } -machine_subsys_initcall(pseries, rng_init); diff --git a/arch/powerpc/platforms/pseries/setup.c b/arch/powerpc/platform= s/pseries/setup.c index afb074269b42..7f3ee2658163 100644 --- a/arch/powerpc/platforms/pseries/setup.c +++ b/arch/powerpc/platforms/pseries/setup.c @@ -779,6 +779,8 @@ static resource_size_t pseries_pci_iov_resource_alignme= nt(struct pci_dev *pdev, } #endif =20 +__init void pseries_rng_init(void); + static void __init pSeries_setup_arch(void) { set_arch_panic_timeout(10, ARCH_PANIC_TIMEOUT); @@ -839,6 +841,7 @@ static void __init pSeries_setup_arch(void) } =20 ppc_md.pcibios_root_bridge_prepare =3D pseries_root_bridge_prepare; + pseries_rng_init(); } =20 static void pseries_panic(char *str) --=20 2.35.1