From: Linus Walleij Date: Thu, 5 Sep 2013 07:29:18 +0000 (+0200) Subject: ARM: OMAP2+: throw the die id into the entropy pool X-Git-Url: https://git.karo-electronics.de/?a=commitdiff_plain;h=de26804b60d460a5ad13400d86c367ed16c6393d;p=linux-beck.git ARM: OMAP2+: throw the die id into the entropy pool At least eight bytes of this number are totally unique for the device it seems, so this is a perfect candidate for feeding the entropy pool. One byte more or less of constants does not matter so feed in the entire OID struct. This fixes the issue of similar devices initializing to the same state initially. Further registers could be added too, such as OMAP4 CONTROL_STD_FUSE_OPP* and CONTROL_DPLL_NWELL_TRIM* registers, but those vary based on the SoC generation. Cc: Theodore Ts'o Cc: Paul Walmsley Reviewed-by: Kevin Hilman Reviewed-by: Paul Walmsley Signed-off-by: Linus Walleij [tony@atomide.com: updated comments per mailing list discussion] Signed-off-by: Tony Lindgren --- diff --git a/arch/arm/mach-omap2/id.c b/arch/arm/mach-omap2/id.c index 0289adcb6efb..ef32d11c4bca 100644 --- a/arch/arm/mach-omap2/id.c +++ b/arch/arm/mach-omap2/id.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #ifdef CONFIG_SOC_BUS @@ -130,6 +131,17 @@ void omap_get_die_id(struct omap_die_id *odi) odi->id_3 = read_tap_reg(OMAP_TAP_DIE_ID_3); } +static int __init omap_feed_randpool(void) +{ + struct omap_die_id odi; + + /* Throw the die ID into the entropy pool at boot */ + omap_get_die_id(&odi); + add_device_randomness(&odi, sizeof(odi)); + return 0; +} +omap_device_initcall(omap_feed_randpool); + void __init omap2xxx_check_revision(void) { int i, j;