123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390 |
- /*
- * exynos-rng.c - Random Number Generator driver for the Exynos
- *
- * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org>
- *
- * Loosely based on old driver from drivers/char/hw_random/exynos-rng.c:
- * Copyright (C) 2012 Samsung Electronics
- * Jonghwa Lee <jonghwa3.lee@samsung.com>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation;
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- */
- #include <linux/clk.h>
- #include <linux/crypto.h>
- #include <linux/err.h>
- #include <linux/io.h>
- #include <linux/module.h>
- #include <linux/platform_device.h>
- #include <crypto/internal/rng.h>
- #define EXYNOS_RNG_CONTROL 0x0
- #define EXYNOS_RNG_STATUS 0x10
- #define EXYNOS_RNG_SEED_BASE 0x140
- #define EXYNOS_RNG_SEED(n) (EXYNOS_RNG_SEED_BASE + (n * 0x4))
- #define EXYNOS_RNG_OUT_BASE 0x160
- #define EXYNOS_RNG_OUT(n) (EXYNOS_RNG_OUT_BASE + (n * 0x4))
- /* EXYNOS_RNG_CONTROL bit fields */
- #define EXYNOS_RNG_CONTROL_START 0x18
- /* EXYNOS_RNG_STATUS bit fields */
- #define EXYNOS_RNG_STATUS_SEED_SETTING_DONE BIT(1)
- #define EXYNOS_RNG_STATUS_RNG_DONE BIT(5)
- /* Five seed and output registers, each 4 bytes */
- #define EXYNOS_RNG_SEED_REGS 5
- #define EXYNOS_RNG_SEED_SIZE (EXYNOS_RNG_SEED_REGS * 4)
- /*
- * Driver re-seeds itself with generated random numbers to increase
- * the randomness.
- *
- * Time for next re-seed in ms.
- */
- #define EXYNOS_RNG_RESEED_TIME 100
- /*
- * In polling mode, do not wait infinitely for the engine to finish the work.
- */
- #define EXYNOS_RNG_WAIT_RETRIES 100
- /* Context for crypto */
- struct exynos_rng_ctx {
- struct exynos_rng_dev *rng;
- };
- /* Device associated memory */
- struct exynos_rng_dev {
- struct device *dev;
- void __iomem *mem;
- struct clk *clk;
- /* Generated numbers stored for seeding during resume */
- u8 seed_save[EXYNOS_RNG_SEED_SIZE];
- unsigned int seed_save_len;
- /* Time of last seeding in jiffies */
- unsigned long last_seeding;
- };
- static struct exynos_rng_dev *exynos_rng_dev;
- static u32 exynos_rng_readl(struct exynos_rng_dev *rng, u32 offset)
- {
- return readl_relaxed(rng->mem + offset);
- }
- static void exynos_rng_writel(struct exynos_rng_dev *rng, u32 val, u32 offset)
- {
- writel_relaxed(val, rng->mem + offset);
- }
- static int exynos_rng_set_seed(struct exynos_rng_dev *rng,
- const u8 *seed, unsigned int slen)
- {
- u32 val;
- int i;
- /* Round seed length because loop iterates over full register size */
- slen = ALIGN_DOWN(slen, 4);
- if (slen < EXYNOS_RNG_SEED_SIZE)
- return -EINVAL;
- for (i = 0; i < slen ; i += 4) {
- unsigned int seed_reg = (i / 4) % EXYNOS_RNG_SEED_REGS;
- val = seed[i] << 24;
- val |= seed[i + 1] << 16;
- val |= seed[i + 2] << 8;
- val |= seed[i + 3] << 0;
- exynos_rng_writel(rng, val, EXYNOS_RNG_SEED(seed_reg));
- }
- val = exynos_rng_readl(rng, EXYNOS_RNG_STATUS);
- if (!(val & EXYNOS_RNG_STATUS_SEED_SETTING_DONE)) {
- dev_warn(rng->dev, "Seed setting not finished\n");
- return -EIO;
- }
- rng->last_seeding = jiffies;
- return 0;
- }
- /*
- * Read from output registers and put the data under 'dst' array,
- * up to dlen bytes.
- *
- * Returns number of bytes actually stored in 'dst' (dlen
- * or EXYNOS_RNG_SEED_SIZE).
- */
- static unsigned int exynos_rng_copy_random(struct exynos_rng_dev *rng,
- u8 *dst, unsigned int dlen)
- {
- unsigned int cnt = 0;
- int i, j;
- u32 val;
- for (j = 0; j < EXYNOS_RNG_SEED_REGS; j++) {
- val = exynos_rng_readl(rng, EXYNOS_RNG_OUT(j));
- for (i = 0; i < 4; i++) {
- dst[cnt] = val & 0xff;
- val >>= 8;
- if (++cnt >= dlen)
- return cnt;
- }
- }
- return cnt;
- }
- /*
- * Start the engine and poll for finish. Then read from output registers
- * filling the 'dst' buffer up to 'dlen' bytes or up to size of generated
- * random data (EXYNOS_RNG_SEED_SIZE).
- *
- * On success: return 0 and store number of read bytes under 'read' address.
- * On error: return -ERRNO.
- */
- static int exynos_rng_get_random(struct exynos_rng_dev *rng,
- u8 *dst, unsigned int dlen,
- unsigned int *read)
- {
- int retry = EXYNOS_RNG_WAIT_RETRIES;
- exynos_rng_writel(rng, EXYNOS_RNG_CONTROL_START,
- EXYNOS_RNG_CONTROL);
- while (!(exynos_rng_readl(rng,
- EXYNOS_RNG_STATUS) & EXYNOS_RNG_STATUS_RNG_DONE) && --retry)
- cpu_relax();
- if (!retry)
- return -ETIMEDOUT;
- /* Clear status bit */
- exynos_rng_writel(rng, EXYNOS_RNG_STATUS_RNG_DONE,
- EXYNOS_RNG_STATUS);
- *read = exynos_rng_copy_random(rng, dst, dlen);
- return 0;
- }
- /* Re-seed itself from time to time */
- static void exynos_rng_reseed(struct exynos_rng_dev *rng)
- {
- unsigned long next_seeding = rng->last_seeding + \
- msecs_to_jiffies(EXYNOS_RNG_RESEED_TIME);
- unsigned long now = jiffies;
- unsigned int read = 0;
- u8 seed[EXYNOS_RNG_SEED_SIZE];
- if (time_before(now, next_seeding))
- return;
- if (exynos_rng_get_random(rng, seed, sizeof(seed), &read))
- return;
- exynos_rng_set_seed(rng, seed, read);
- }
- static int exynos_rng_generate(struct crypto_rng *tfm,
- const u8 *src, unsigned int slen,
- u8 *dst, unsigned int dlen)
- {
- struct exynos_rng_ctx *ctx = crypto_rng_ctx(tfm);
- struct exynos_rng_dev *rng = ctx->rng;
- unsigned int read = 0;
- int ret;
- ret = clk_prepare_enable(rng->clk);
- if (ret)
- return ret;
- do {
- ret = exynos_rng_get_random(rng, dst, dlen, &read);
- if (ret)
- break;
- dlen -= read;
- dst += read;
- exynos_rng_reseed(rng);
- } while (dlen > 0);
- clk_disable_unprepare(rng->clk);
- return ret;
- }
- static int exynos_rng_seed(struct crypto_rng *tfm, const u8 *seed,
- unsigned int slen)
- {
- struct exynos_rng_ctx *ctx = crypto_rng_ctx(tfm);
- struct exynos_rng_dev *rng = ctx->rng;
- int ret;
- ret = clk_prepare_enable(rng->clk);
- if (ret)
- return ret;
- ret = exynos_rng_set_seed(ctx->rng, seed, slen);
- clk_disable_unprepare(rng->clk);
- return ret;
- }
- static int exynos_rng_kcapi_init(struct crypto_tfm *tfm)
- {
- struct exynos_rng_ctx *ctx = crypto_tfm_ctx(tfm);
- ctx->rng = exynos_rng_dev;
- return 0;
- }
- static struct rng_alg exynos_rng_alg = {
- .generate = exynos_rng_generate,
- .seed = exynos_rng_seed,
- .seedsize = EXYNOS_RNG_SEED_SIZE,
- .base = {
- .cra_name = "stdrng",
- .cra_driver_name = "exynos_rng",
- .cra_priority = 100,
- .cra_ctxsize = sizeof(struct exynos_rng_ctx),
- .cra_module = THIS_MODULE,
- .cra_init = exynos_rng_kcapi_init,
- }
- };
- static int exynos_rng_probe(struct platform_device *pdev)
- {
- struct exynos_rng_dev *rng;
- struct resource *res;
- int ret;
- if (exynos_rng_dev)
- return -EEXIST;
- rng = devm_kzalloc(&pdev->dev, sizeof(*rng), GFP_KERNEL);
- if (!rng)
- return -ENOMEM;
- rng->dev = &pdev->dev;
- rng->clk = devm_clk_get(&pdev->dev, "secss");
- if (IS_ERR(rng->clk)) {
- dev_err(&pdev->dev, "Couldn't get clock.\n");
- return PTR_ERR(rng->clk);
- }
- res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
- rng->mem = devm_ioremap_resource(&pdev->dev, res);
- if (IS_ERR(rng->mem))
- return PTR_ERR(rng->mem);
- platform_set_drvdata(pdev, rng);
- exynos_rng_dev = rng;
- ret = crypto_register_rng(&exynos_rng_alg);
- if (ret) {
- dev_err(&pdev->dev,
- "Couldn't register rng crypto alg: %d\n", ret);
- exynos_rng_dev = NULL;
- }
- return ret;
- }
- static int exynos_rng_remove(struct platform_device *pdev)
- {
- crypto_unregister_rng(&exynos_rng_alg);
- exynos_rng_dev = NULL;
- return 0;
- }
- static int __maybe_unused exynos_rng_suspend(struct device *dev)
- {
- struct platform_device *pdev = to_platform_device(dev);
- struct exynos_rng_dev *rng = platform_get_drvdata(pdev);
- int ret;
- /* If we were never seeded then after resume it will be the same */
- if (!rng->last_seeding)
- return 0;
- rng->seed_save_len = 0;
- ret = clk_prepare_enable(rng->clk);
- if (ret)
- return ret;
- /* Get new random numbers and store them for seeding on resume. */
- exynos_rng_get_random(rng, rng->seed_save, sizeof(rng->seed_save),
- &(rng->seed_save_len));
- dev_dbg(rng->dev, "Stored %u bytes for seeding on system resume\n",
- rng->seed_save_len);
- clk_disable_unprepare(rng->clk);
- return 0;
- }
- static int __maybe_unused exynos_rng_resume(struct device *dev)
- {
- struct platform_device *pdev = to_platform_device(dev);
- struct exynos_rng_dev *rng = platform_get_drvdata(pdev);
- int ret;
- /* Never seeded so nothing to do */
- if (!rng->last_seeding)
- return 0;
- ret = clk_prepare_enable(rng->clk);
- if (ret)
- return ret;
- ret = exynos_rng_set_seed(rng, rng->seed_save, rng->seed_save_len);
- clk_disable_unprepare(rng->clk);
- return ret;
- }
- static SIMPLE_DEV_PM_OPS(exynos_rng_pm_ops, exynos_rng_suspend,
- exynos_rng_resume);
- static const struct of_device_id exynos_rng_dt_match[] = {
- {
- .compatible = "samsung,exynos4-rng",
- },
- { },
- };
- MODULE_DEVICE_TABLE(of, exynos_rng_dt_match);
- static struct platform_driver exynos_rng_driver = {
- .driver = {
- .name = "exynos-rng",
- .pm = &exynos_rng_pm_ops,
- .of_match_table = exynos_rng_dt_match,
- },
- .probe = exynos_rng_probe,
- .remove = exynos_rng_remove,
- };
- module_platform_driver(exynos_rng_driver);
- MODULE_DESCRIPTION("Exynos H/W Random Number Generator driver");
- MODULE_AUTHOR("Krzysztof Kozlowski <krzk@kernel.org>");
- MODULE_LICENSE("GPL");
|