mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-12 05:24:12 +08:00
16bdbae394
Most hw_random devices return entropy which is assumed to be of full quality, but driver authors don't bother setting the quality knob. Some hw_random devices return less than full quality entropy, and then driver authors set the quality knob. Therefore, the entropy crediting should be opt-out rather than opt-in per-driver, to reflect the actual reality on the ground. For example, the two Raspberry Pi RNG drivers produce full entropy randomness, and both EDK2 and U-Boot's drivers for these treat them as such. The result is that EFI then uses these numbers and passes the to Linux, and Linux credits them as boot, thereby initializing the RNG. Yet, in Linux, the quality knob was never set to anything, and so on the chance that Linux is booted without EFI, nothing is ever credited. That's annoying. The same pattern appears to repeat itself throughout various drivers. In fact, very very few drivers have bothered setting quality=1024. Looking at the git history of existing drivers and corresponding mailing list discussion, this conclusion tracks. There's been a decent amount of discussion about drivers that set quality < 1024 -- somebody read and interepreted a datasheet, or made some back of the envelope calculation somehow. But there's been very little, if any, discussion about most drivers where the quality is just set to 1024 or unset (or set to 1000 when the authors misunderstood the API and assumed it was base-10 rather than base-2); in both cases the intent was fairly clear of, "this is a hardware random device; it's fine." So let's invert this logic. A hw_random struct's quality knob now controls the maximum quality a driver can produce, or 0 to specify 1024. Then, the module-wide switch called "default_quality" is changed to represent the maximum quality of any driver. By default it's 1024, and the quality of any particular driver is then given by: min(default_quality, rng->quality ?: 1024); This way, the user can still turn this off for weird reasons (and we can replace whatever driver-specific disabling hacks existed in the past), yet we get proper crediting for relevant RNGs. Cc: Dominik Brodowski <linux@dominikbrodowski.net> Cc: Ard Biesheuvel <ardb@kernel.org> Cc: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
184 lines
3.9 KiB
C
184 lines
3.9 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Marvell CN10K RVU Hardware Random Number Generator.
|
|
*
|
|
* Copyright (C) 2021 Marvell.
|
|
*
|
|
*/
|
|
|
|
#include <linux/hw_random.h>
|
|
#include <linux/io.h>
|
|
#include <linux/module.h>
|
|
#include <linux/pci.h>
|
|
#include <linux/pci_ids.h>
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/arm-smccc.h>
|
|
|
|
/* CSRs */
|
|
#define RNM_CTL_STATUS 0x000
|
|
#define RNM_ENTROPY_STATUS 0x008
|
|
#define RNM_CONST 0x030
|
|
#define RNM_EBG_ENT 0x048
|
|
#define RNM_PF_EBG_HEALTH 0x050
|
|
#define RNM_PF_RANDOM 0x400
|
|
#define RNM_TRNG_RESULT 0x408
|
|
|
|
struct cn10k_rng {
|
|
void __iomem *reg_base;
|
|
struct hwrng ops;
|
|
struct pci_dev *pdev;
|
|
};
|
|
|
|
#define PLAT_OCTEONTX_RESET_RNG_EBG_HEALTH_STATE 0xc2000b0f
|
|
|
|
static unsigned long reset_rng_health_state(struct cn10k_rng *rng)
|
|
{
|
|
struct arm_smccc_res res;
|
|
|
|
/* Send SMC service call to reset EBG health state */
|
|
arm_smccc_smc(PLAT_OCTEONTX_RESET_RNG_EBG_HEALTH_STATE, 0, 0, 0, 0, 0, 0, 0, &res);
|
|
return res.a0;
|
|
}
|
|
|
|
static int check_rng_health(struct cn10k_rng *rng)
|
|
{
|
|
u64 status;
|
|
unsigned long err;
|
|
|
|
/* Skip checking health */
|
|
if (!rng->reg_base)
|
|
return -ENODEV;
|
|
|
|
status = readq(rng->reg_base + RNM_PF_EBG_HEALTH);
|
|
if (status & BIT_ULL(20)) {
|
|
err = reset_rng_health_state(rng);
|
|
if (err) {
|
|
dev_err(&rng->pdev->dev, "HWRNG: Health test failed (status=%llx)\n",
|
|
status);
|
|
dev_err(&rng->pdev->dev, "HWRNG: error during reset (error=%lx)\n",
|
|
err);
|
|
return -EIO;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void cn10k_read_trng(struct cn10k_rng *rng, u64 *value)
|
|
{
|
|
u64 upper, lower;
|
|
|
|
*value = readq(rng->reg_base + RNM_PF_RANDOM);
|
|
|
|
/* HW can run out of entropy if large amount random data is read in
|
|
* quick succession. Zeros may not be real random data from HW.
|
|
*/
|
|
if (!*value) {
|
|
upper = readq(rng->reg_base + RNM_PF_RANDOM);
|
|
lower = readq(rng->reg_base + RNM_PF_RANDOM);
|
|
while (!(upper & 0x00000000FFFFFFFFULL))
|
|
upper = readq(rng->reg_base + RNM_PF_RANDOM);
|
|
while (!(lower & 0xFFFFFFFF00000000ULL))
|
|
lower = readq(rng->reg_base + RNM_PF_RANDOM);
|
|
|
|
*value = (upper & 0xFFFFFFFF00000000) | (lower & 0xFFFFFFFF);
|
|
}
|
|
}
|
|
|
|
static int cn10k_rng_read(struct hwrng *hwrng, void *data,
|
|
size_t max, bool wait)
|
|
{
|
|
struct cn10k_rng *rng = (struct cn10k_rng *)hwrng->priv;
|
|
unsigned int size;
|
|
u8 *pos = data;
|
|
int err = 0;
|
|
u64 value;
|
|
|
|
err = check_rng_health(rng);
|
|
if (err)
|
|
return err;
|
|
|
|
size = max;
|
|
|
|
while (size >= 8) {
|
|
cn10k_read_trng(rng, &value);
|
|
|
|
*((u64 *)pos) = value;
|
|
size -= 8;
|
|
pos += 8;
|
|
}
|
|
|
|
if (size > 0) {
|
|
cn10k_read_trng(rng, &value);
|
|
|
|
while (size > 0) {
|
|
*pos = (u8)value;
|
|
value >>= 8;
|
|
size--;
|
|
pos++;
|
|
}
|
|
}
|
|
|
|
return max - size;
|
|
}
|
|
|
|
static int cn10k_rng_probe(struct pci_dev *pdev, const struct pci_device_id *id)
|
|
{
|
|
struct cn10k_rng *rng;
|
|
int err;
|
|
|
|
rng = devm_kzalloc(&pdev->dev, sizeof(*rng), GFP_KERNEL);
|
|
if (!rng)
|
|
return -ENOMEM;
|
|
|
|
rng->pdev = pdev;
|
|
pci_set_drvdata(pdev, rng);
|
|
|
|
rng->reg_base = pcim_iomap(pdev, 0, 0);
|
|
if (!rng->reg_base) {
|
|
dev_err(&pdev->dev, "Error while mapping CSRs, exiting\n");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
rng->ops.name = devm_kasprintf(&pdev->dev, GFP_KERNEL,
|
|
"cn10k-rng-%s", dev_name(&pdev->dev));
|
|
if (!rng->ops.name)
|
|
return -ENOMEM;
|
|
|
|
rng->ops.read = cn10k_rng_read;
|
|
rng->ops.priv = (unsigned long)rng;
|
|
|
|
reset_rng_health_state(rng);
|
|
|
|
err = devm_hwrng_register(&pdev->dev, &rng->ops);
|
|
if (err) {
|
|
dev_err(&pdev->dev, "Could not register hwrng device.\n");
|
|
return err;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void cn10k_rng_remove(struct pci_dev *pdev)
|
|
{
|
|
/* Nothing to do */
|
|
}
|
|
|
|
static const struct pci_device_id cn10k_rng_id_table[] = {
|
|
{ PCI_DEVICE(PCI_VENDOR_ID_CAVIUM, 0xA098) }, /* RNG PF */
|
|
{0,},
|
|
};
|
|
|
|
MODULE_DEVICE_TABLE(pci, cn10k_rng_id_table);
|
|
|
|
static struct pci_driver cn10k_rng_driver = {
|
|
.name = "cn10k_rng",
|
|
.id_table = cn10k_rng_id_table,
|
|
.probe = cn10k_rng_probe,
|
|
.remove = cn10k_rng_remove,
|
|
};
|
|
|
|
module_pci_driver(cn10k_rng_driver);
|
|
MODULE_AUTHOR("Sunil Goutham <sgoutham@marvell.com>");
|
|
MODULE_DESCRIPTION("Marvell CN10K HW RNG Driver");
|
|
MODULE_LICENSE("GPL v2");
|