diff options
author | Alex Porosanu <alexandru.porosanu@freescale.com> | 2014-08-11 08:40:16 (GMT) |
---|---|---|
committer | Matthew Weigel <Matthew.Weigel@freescale.com> | 2014-12-11 18:40:56 (GMT) |
commit | f5dad36954c74f831b962996a611e58221605b1b (patch) | |
tree | ff4af8ea5f709bbd7107b969e830833ad9c18ec6 /lib/fault-inject.c | |
parent | 6986486cabf73178a8fb72cdd1c18f84692df473 (diff) | |
download | linux-fsl-qoriq-f5dad36954c74f831b962996a611e58221605b1b.tar.xz |
crypto: caam - change starting entropy delay value
The entropy delay (the length in system clocks of each
entropy sample) for the RNG4 block of CAAM is dependent
on the frequency of the SoC. By elaborate methods, it
has been determined that a good starting value for all
platforms integrating the CAAM IP is 3200. Using a
higher value has additional benefit of speeding up
the process of instantiating the RNG, since the entropy
delay will be increased and instantiation of the RNG
state handles will be reattempted by the driver. If the
starting value is low, for certain platforms, this can
lead to a quite lengthy process.
This patch changes the starting value of the length of
the entropy sample to 3200 system clocks.
In addition to this change, the attempted entropy delay
values are now printed on the console upon initialization
of the RNG block.
While here, a safeguard for yielding the processor was
added for ensuring that in very adverse cases,
the CPU isn't hogged by the instantiation loop.
Signed-off-by: Alex Porosanu <alexandru.porosanu@freescale.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
(cherry picked from commit eeaa1724a2e9c8958a8621b3c10d5ca0667e78fa)
Conflicts:
drivers/crypto/caam/ctrl.c
Change-Id: Ibc271d629cef3cab291ac8e5c8e7b68b0dc7c1e3
Reviewed-on: http://git.am.freescale.net:8181/23840
Tested-by: Review Code-CDREVIEW <CDREVIEW@freescale.com>
Reviewed-by: Horia Ioan Geanta Neag <horia.geanta@freescale.com>
Reviewed-by: Matthew Weigel <Matthew.Weigel@freescale.com>
Diffstat (limited to 'lib/fault-inject.c')
0 files changed, 0 insertions, 0 deletions