| // SPDX-License-Identifier: GPL-2.0 |
| /* |
| * exynos-rng.c - Random Number Generator driver for the Exynos |
| * |
| * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org> |
| * |
| * Loosely based on old driver from drivers/char/hw_random/exynos-rng.c: |
| * Copyright (C) 2012 Samsung Electronics |
| * Jonghwa Lee <jonghwa3.lee@samsung.com> |
| */ |
| |
| #include <linux/clk.h> |
| #include <linux/crypto.h> |
| #include <linux/err.h> |
| #include <linux/io.h> |
| #include <linux/module.h> |
| #include <linux/mutex.h> |
| #include <linux/of.h> |
| #include <linux/platform_device.h> |
| |
| #include <crypto/internal/rng.h> |
| |
| #define EXYNOS_RNG_CONTROL 0x0 |
| #define EXYNOS_RNG_STATUS 0x10 |
| |
| #define EXYNOS_RNG_SEED_CONF 0x14 |
| #define EXYNOS_RNG_GEN_PRNG BIT(1) |
| |
| #define EXYNOS_RNG_SEED_BASE 0x140 |
| #define EXYNOS_RNG_SEED(n) (EXYNOS_RNG_SEED_BASE + (n * 0x4)) |
| #define EXYNOS_RNG_OUT_BASE 0x160 |
| #define EXYNOS_RNG_OUT(n) (EXYNOS_RNG_OUT_BASE + (n * 0x4)) |
| |
| /* EXYNOS_RNG_CONTROL bit fields */ |
| #define EXYNOS_RNG_CONTROL_START 0x18 |
| /* EXYNOS_RNG_STATUS bit fields */ |
| #define EXYNOS_RNG_STATUS_SEED_SETTING_DONE BIT(1) |
| #define EXYNOS_RNG_STATUS_RNG_DONE BIT(5) |
| |
| /* Five seed and output registers, each 4 bytes */ |
| #define EXYNOS_RNG_SEED_REGS 5 |
| #define EXYNOS_RNG_SEED_SIZE (EXYNOS_RNG_SEED_REGS * 4) |
| |
| enum exynos_prng_type { |
| EXYNOS_PRNG_UNKNOWN = 0, |
| EXYNOS_PRNG_EXYNOS4, |
| EXYNOS_PRNG_EXYNOS5, |
| }; |
| |
| /* |
| * Driver re-seeds itself with generated random numbers to hinder |
| * backtracking of the original seed. |
| * |
| * Time for next re-seed in ms. |
| */ |
| #define EXYNOS_RNG_RESEED_TIME 1000 |
| #define EXYNOS_RNG_RESEED_BYTES 65536 |
| |
| /* |
| * In polling mode, do not wait infinitely for the engine to finish the work. |
| */ |
| #define EXYNOS_RNG_WAIT_RETRIES 100 |
| |
| /* Context for crypto */ |
| struct exynos_rng_ctx { |
| struct exynos_rng_dev *rng; |
| }; |
| |
| /* Device associated memory */ |
| struct exynos_rng_dev { |
| struct device *dev; |
| enum exynos_prng_type type; |
| void __iomem *mem; |
| struct clk *clk; |
| struct mutex lock; |
| /* Generated numbers stored for seeding during resume */ |
| u8 seed_save[EXYNOS_RNG_SEED_SIZE]; |
| unsigned int seed_save_len; |
| /* Time of last seeding in jiffies */ |
| unsigned long last_seeding; |
| /* Bytes generated since last seeding */ |
| unsigned long bytes_seeding; |
| }; |
| |
| static struct exynos_rng_dev *exynos_rng_dev; |
| |
| static u32 exynos_rng_readl(struct exynos_rng_dev *rng, u32 offset) |
| { |
| return readl_relaxed(rng->mem + offset); |
| } |
| |
| static void exynos_rng_writel(struct exynos_rng_dev *rng, u32 val, u32 offset) |
| { |
| writel_relaxed(val, rng->mem + offset); |
| } |
| |
| static int exynos_rng_set_seed(struct exynos_rng_dev *rng, |
| const u8 *seed, unsigned int slen) |
| { |
| u32 val; |
| int i; |
| |
| /* Round seed length because loop iterates over full register size */ |
| slen = ALIGN_DOWN(slen, 4); |
| |
| if (slen < EXYNOS_RNG_SEED_SIZE) |
| return -EINVAL; |
| |
| for (i = 0; i < slen ; i += 4) { |
| unsigned int seed_reg = (i / 4) % EXYNOS_RNG_SEED_REGS; |
| |
| val = seed[i] << 24; |
| val |= seed[i + 1] << 16; |
| val |= seed[i + 2] << 8; |
| val |= seed[i + 3] << 0; |
| |
| exynos_rng_writel(rng, val, EXYNOS_RNG_SEED(seed_reg)); |
| } |
| |
| val = exynos_rng_readl(rng, EXYNOS_RNG_STATUS); |
| if (!(val & EXYNOS_RNG_STATUS_SEED_SETTING_DONE)) { |
| dev_warn(rng->dev, "Seed setting not finished\n"); |
| return -EIO; |
| } |
| |
| rng->last_seeding = jiffies; |
| rng->bytes_seeding = 0; |
| |
| return 0; |
| } |
| |
| /* |
| * Start the engine and poll for finish. Then read from output registers |
| * filling the 'dst' buffer up to 'dlen' bytes or up to size of generated |
| * random data (EXYNOS_RNG_SEED_SIZE). |
| * |
| * On success: return 0 and store number of read bytes under 'read' address. |
| * On error: return -ERRNO. |
| */ |
| static int exynos_rng_get_random(struct exynos_rng_dev *rng, |
| u8 *dst, unsigned int dlen, |
| unsigned int *read) |
| { |
| int retry = EXYNOS_RNG_WAIT_RETRIES; |
| |
| if (rng->type == EXYNOS_PRNG_EXYNOS4) { |
| exynos_rng_writel(rng, EXYNOS_RNG_CONTROL_START, |
| EXYNOS_RNG_CONTROL); |
| } else if (rng->type == EXYNOS_PRNG_EXYNOS5) { |
| exynos_rng_writel(rng, EXYNOS_RNG_GEN_PRNG, |
| EXYNOS_RNG_SEED_CONF); |
| } |
| |
| while (!(exynos_rng_readl(rng, |
| EXYNOS_RNG_STATUS) & EXYNOS_RNG_STATUS_RNG_DONE) && --retry) |
| cpu_relax(); |
| |
| if (!retry) |
| return -ETIMEDOUT; |
| |
| /* Clear status bit */ |
| exynos_rng_writel(rng, EXYNOS_RNG_STATUS_RNG_DONE, |
| EXYNOS_RNG_STATUS); |
| *read = min_t(size_t, dlen, EXYNOS_RNG_SEED_SIZE); |
| memcpy_fromio(dst, rng->mem + EXYNOS_RNG_OUT_BASE, *read); |
| rng->bytes_seeding += *read; |
| |
| return 0; |
| } |
| |
| /* Re-seed itself from time to time */ |
| static void exynos_rng_reseed(struct exynos_rng_dev *rng) |
| { |
| unsigned long next_seeding = rng->last_seeding + \ |
| msecs_to_jiffies(EXYNOS_RNG_RESEED_TIME); |
| unsigned long now = jiffies; |
| unsigned int read = 0; |
| u8 seed[EXYNOS_RNG_SEED_SIZE]; |
| |
| if (time_before(now, next_seeding) && |
| rng->bytes_seeding < EXYNOS_RNG_RESEED_BYTES) |
| return; |
| |
| if (exynos_rng_get_random(rng, seed, sizeof(seed), &read)) |
| return; |
| |
| exynos_rng_set_seed(rng, seed, read); |
| |
| /* Let others do some of their job. */ |
| mutex_unlock(&rng->lock); |
| mutex_lock(&rng->lock); |
| } |
| |
| static int exynos_rng_generate(struct crypto_rng *tfm, |
| const u8 *src, unsigned int slen, |
| u8 *dst, unsigned int dlen) |
| { |
| struct exynos_rng_ctx *ctx = crypto_rng_ctx(tfm); |
| struct exynos_rng_dev *rng = ctx->rng; |
| unsigned int read = 0; |
| int ret; |
| |
| ret = clk_prepare_enable(rng->clk); |
| if (ret) |
| return ret; |
| |
| mutex_lock(&rng->lock); |
| do { |
| ret = exynos_rng_get_random(rng, dst, dlen, &read); |
| if (ret) |
| break; |
| |
| dlen -= read; |
| dst += read; |
| |
| exynos_rng_reseed(rng); |
| } while (dlen > 0); |
| mutex_unlock(&rng->lock); |
| |
| clk_disable_unprepare(rng->clk); |
| |
| return ret; |
| } |
| |
| static int exynos_rng_seed(struct crypto_rng *tfm, const u8 *seed, |
| unsigned int slen) |
| { |
| struct exynos_rng_ctx *ctx = crypto_rng_ctx(tfm); |
| struct exynos_rng_dev *rng = ctx->rng; |
| int ret; |
| |
| ret = clk_prepare_enable(rng->clk); |
| if (ret) |
| return ret; |
| |
| mutex_lock(&rng->lock); |
| ret = exynos_rng_set_seed(ctx->rng, seed, slen); |
| mutex_unlock(&rng->lock); |
| |
| clk_disable_unprepare(rng->clk); |
| |
| return ret; |
| } |
| |
| static int exynos_rng_kcapi_init(struct crypto_tfm *tfm) |
| { |
| struct exynos_rng_ctx *ctx = crypto_tfm_ctx(tfm); |
| |
| ctx->rng = exynos_rng_dev; |
| |
| return 0; |
| } |
| |
| static struct rng_alg exynos_rng_alg = { |
| .generate = exynos_rng_generate, |
| .seed = exynos_rng_seed, |
| .seedsize = EXYNOS_RNG_SEED_SIZE, |
| .base = { |
| .cra_name = "stdrng", |
| .cra_driver_name = "exynos_rng", |
| .cra_priority = 300, |
| .cra_ctxsize = sizeof(struct exynos_rng_ctx), |
| .cra_module = THIS_MODULE, |
| .cra_init = exynos_rng_kcapi_init, |
| } |
| }; |
| |
| static int exynos_rng_probe(struct platform_device *pdev) |
| { |
| struct exynos_rng_dev *rng; |
| int ret; |
| |
| if (exynos_rng_dev) |
| return -EEXIST; |
| |
| rng = devm_kzalloc(&pdev->dev, sizeof(*rng), GFP_KERNEL); |
| if (!rng) |
| return -ENOMEM; |
| |
| rng->type = (uintptr_t)of_device_get_match_data(&pdev->dev); |
| |
| mutex_init(&rng->lock); |
| |
| rng->dev = &pdev->dev; |
| rng->clk = devm_clk_get(&pdev->dev, "secss"); |
| if (IS_ERR(rng->clk)) { |
| dev_err(&pdev->dev, "Couldn't get clock.\n"); |
| return PTR_ERR(rng->clk); |
| } |
| |
| rng->mem = devm_platform_ioremap_resource(pdev, 0); |
| if (IS_ERR(rng->mem)) |
| return PTR_ERR(rng->mem); |
| |
| platform_set_drvdata(pdev, rng); |
| |
| exynos_rng_dev = rng; |
| |
| ret = crypto_register_rng(&exynos_rng_alg); |
| if (ret) { |
| dev_err(&pdev->dev, |
| "Couldn't register rng crypto alg: %d\n", ret); |
| exynos_rng_dev = NULL; |
| } |
| |
| return ret; |
| } |
| |
| static void exynos_rng_remove(struct platform_device *pdev) |
| { |
| crypto_unregister_rng(&exynos_rng_alg); |
| |
| exynos_rng_dev = NULL; |
| } |
| |
| static int __maybe_unused exynos_rng_suspend(struct device *dev) |
| { |
| struct exynos_rng_dev *rng = dev_get_drvdata(dev); |
| int ret; |
| |
| /* If we were never seeded then after resume it will be the same */ |
| if (!rng->last_seeding) |
| return 0; |
| |
| rng->seed_save_len = 0; |
| ret = clk_prepare_enable(rng->clk); |
| if (ret) |
| return ret; |
| |
| mutex_lock(&rng->lock); |
| |
| /* Get new random numbers and store them for seeding on resume. */ |
| exynos_rng_get_random(rng, rng->seed_save, sizeof(rng->seed_save), |
| &(rng->seed_save_len)); |
| |
| mutex_unlock(&rng->lock); |
| |
| dev_dbg(rng->dev, "Stored %u bytes for seeding on system resume\n", |
| rng->seed_save_len); |
| |
| clk_disable_unprepare(rng->clk); |
| |
| return 0; |
| } |
| |
| static int __maybe_unused exynos_rng_resume(struct device *dev) |
| { |
| struct exynos_rng_dev *rng = dev_get_drvdata(dev); |
| int ret; |
| |
| /* Never seeded so nothing to do */ |
| if (!rng->last_seeding) |
| return 0; |
| |
| ret = clk_prepare_enable(rng->clk); |
| if (ret) |
| return ret; |
| |
| mutex_lock(&rng->lock); |
| |
| ret = exynos_rng_set_seed(rng, rng->seed_save, rng->seed_save_len); |
| |
| mutex_unlock(&rng->lock); |
| |
| clk_disable_unprepare(rng->clk); |
| |
| return ret; |
| } |
| |
| static SIMPLE_DEV_PM_OPS(exynos_rng_pm_ops, exynos_rng_suspend, |
| exynos_rng_resume); |
| |
| static const struct of_device_id exynos_rng_dt_match[] = { |
| { |
| .compatible = "samsung,exynos4-rng", |
| .data = (const void *)EXYNOS_PRNG_EXYNOS4, |
| }, { |
| .compatible = "samsung,exynos5250-prng", |
| .data = (const void *)EXYNOS_PRNG_EXYNOS5, |
| }, |
| { }, |
| }; |
| MODULE_DEVICE_TABLE(of, exynos_rng_dt_match); |
| |
| static struct platform_driver exynos_rng_driver = { |
| .driver = { |
| .name = "exynos-rng", |
| .pm = &exynos_rng_pm_ops, |
| .of_match_table = exynos_rng_dt_match, |
| }, |
| .probe = exynos_rng_probe, |
| .remove = exynos_rng_remove, |
| }; |
| |
| module_platform_driver(exynos_rng_driver); |
| |
| MODULE_DESCRIPTION("Exynos H/W Random Number Generator driver"); |
| MODULE_AUTHOR("Krzysztof Kozlowski <krzk@kernel.org>"); |
| MODULE_LICENSE("GPL v2"); |