From patchwork Fri Jun 17 15:36:53 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Etienne Carriere X-Patchwork-Id: 1644888 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256 header.s=google header.b=Kxj+1DWd; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4LPjqZ10Rhz9sG0 for ; Sat, 18 Jun 2022 01:38:17 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 0E39884419; Fri, 17 Jun 2022 17:37:52 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="Kxj+1DWd"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 3F7DE843F2; Fri, 17 Jun 2022 17:37:48 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-wm1-x32b.google.com (mail-wm1-x32b.google.com [IPv6:2a00:1450:4864:20::32b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id A135484400 for ; Fri, 17 Jun 2022 17:37:45 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=etienne.carriere@linaro.org Received: by mail-wm1-x32b.google.com with SMTP id m16-20020a7bca50000000b0039c8a224c95so2590300wml.2 for ; Fri, 17 Jun 2022 08:37:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=FRtFCuAAMd0KZp44WuTAEljjQ3FEsQzSVsCbT01QCCU=; b=Kxj+1DWddEbjJ01MAyoP9pb7UVDNqw9+t1CYtXeb+Ri7CuHw/FkkeCnhp9sRRcCEjt PMolys5pASwz4qVyM5fba8ke4GXrryfse7HOBndzj1o2hP6r1iGHLwv61wtqi9trKk1I 9jS1KDVOlCfclk7PlrnKTOHcGTarHFVf589LeEUksWZiO4b6WGQ6NYK/xYnldXXCEvEU SCSi/W6yqPvuyWs80LQjFLwAAqrpav5sRKQzoVv5PqnZYqCaSEoQ6TIPHEfyArXa4Dmn We59ugRySsfvig0l5iG4wrn47QNiwjnd2yN2+0jE465oe6YnVmah7FoE6Uft4GSA+BJ0 NBGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=FRtFCuAAMd0KZp44WuTAEljjQ3FEsQzSVsCbT01QCCU=; b=U7iay55yE1Q0DLBcEHGW0PiyI0hWVK9vsMKqwS1EX2RCQNqEBd6OsSIduYm1fbu3Ho RvAWVSe78/tW7X4kd88RLNNXAm85Y4Nd4YPEC7Wm1Yn9TNHUCArrFZZbL1UUnO1ePf6U TP3JIN1FJVACjGMtQwxjbK3FbzaFgxigyahlZgjy6k1SUPuh2dSFj2Qs2go+dFnZw1SW nhiYfYRAU0VIE+iL3ZXojDXzoXmzUq6Yb+/qjZ4wJ3BtPfN4BivS9zIMcZOtevzbnfFj 5A7e5wWB+limYcBzPykSbb4bWLfZBIoNTRg5gZTUrc0RJ4OkX586bOGKWPlzFU5R1d45 9bcw== X-Gm-Message-State: AJIora8k73iUIO70cSmoxdBEgWkDv8CBrTtBOptqKJms/d28114FcC5P aTpe7iOwouyIUWwSj+eVD6fvhK+Ciq47/Q== X-Google-Smtp-Source: AGRyM1tpVXQWAtqUMmMPCvSJeJ4zXMX4FbULk606wmAPzQF7J2GFd8z0FbEy/GFFDOi84qiudRu2Xw== X-Received: by 2002:a05:600c:1990:b0:39c:9469:5217 with SMTP id t16-20020a05600c199000b0039c94695217mr10856098wmq.49.1655480264947; Fri, 17 Jun 2022 08:37:44 -0700 (PDT) Received: from lmecxl1178.lme.st.com ([2a04:cec0:1019:294c:22b8:b283:9bfe:2096]) by smtp.gmail.com with ESMTPSA id m13-20020a5d4a0d000000b0021a2c923c72sm5069545wrq.69.2022.06.17.08.37.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Jun 2022 08:37:44 -0700 (PDT) From: Etienne Carriere To: u-boot@lists.denx.de Cc: Etienne Carriere , Sughosh Ganu , Patrick Delaunay Subject: [PATCH v4 3/3] drivers: rng: optee_rng: register to CONFIG_OPTEE_SERVICE_DISCOVERY Date: Fri, 17 Jun 2022 17:36:53 +0200 Message-Id: <20220617153653.1307687-3-etienne.carriere@linaro.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220617153653.1307687-1-etienne.carriere@linaro.org> References: <20220617153653.1307687-1-etienne.carriere@linaro.org> MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean Changes optee_rng driver to register itself has a OP-TEE service so that a device is bound for the driver when OP-TEE enumerates the PTA RNG service. Cc: Sughosh Ganu Cc: Patrick Delaunay Signed-off-by: Etienne Carriere Reviewed-by: Patrick Delaunay --- Changes since v3: - Unconditionally register driver with OPTEE_SERVICE_DRIVER() since the macro is now stubbed when CONFIG_OPTEE_SERVICE_DISCOVERY is disable. No change since v2. No change since v1. --- drivers/rng/Kconfig | 1 + drivers/rng/optee_rng.c | 7 ++++++- 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/rng/Kconfig b/drivers/rng/Kconfig index c10f7d345b..14e95a6213 100644 --- a/drivers/rng/Kconfig +++ b/drivers/rng/Kconfig @@ -34,6 +34,7 @@ config RNG_MSM config RNG_OPTEE bool "OP-TEE based Random Number Generator support" depends on DM_RNG && OPTEE + default y if OPTEE_SERVICE_DISCOVERY help This driver provides support for the OP-TEE based Random Number Generator on ARM SoCs where hardware entropy sources are not diff --git a/drivers/rng/optee_rng.c b/drivers/rng/optee_rng.c index aa8ce864d3..410dfc053f 100644 --- a/drivers/rng/optee_rng.c +++ b/drivers/rng/optee_rng.c @@ -11,6 +11,9 @@ #include #include #include +#include + +#define DRIVER_NAME "optee-rng" #define TEE_ERROR_HEALTH_TEST_FAIL 0x00000001 @@ -35,6 +38,8 @@ #define TA_HWRNG_UUID { 0xab7a617c, 0xb8e7, 0x4d8f, \ { 0x83, 0x01, 0xd0, 0x9b, 0x61, 0x03, 0x6b, 0x64 } } +OPTEE_SERVICE_DRIVER(optee_rng, TA_HWRNG_UUID, DRIVER_NAME); + /** open_session_ta_hwrng() - Open session with hwrng Trusted App * * @dev: device @@ -177,7 +182,7 @@ static const struct dm_rng_ops optee_rng_ops = { }; U_BOOT_DRIVER(optee_rng) = { - .name = "optee-rng", + .name = DRIVER_NAME, .id = UCLASS_RNG, .ops = &optee_rng_ops, .probe = optee_rng_probe,