blob: d319f9a1e4290efbeec9bd6dc8afbb4223df0dc4 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * include/linux/random.h
4 *
5 * Include file for the random number generator.
6 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07007#ifndef _LINUX_RANDOM_H
8#define _LINUX_RANDOM_H
9
Herbert Xu205a5252015-06-09 18:19:39 +080010#include <linux/list.h>
Daniel Borkmann897ece52015-10-08 01:20:38 +020011#include <linux/once.h>
12
David Howells607ca462012-10-13 10:46:48 +010013#include <uapi/linux/random.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014
Herbert Xu205a5252015-06-09 18:19:39 +080015struct random_ready_callback {
16 struct list_head list;
17 void (*func)(struct random_ready_callback *rdy);
18 struct module *owner;
19};
20
Linus Torvaldsa2080a62012-07-04 11:16:01 -040021extern void add_device_randomness(const void *, unsigned int);
Hsin-Yi Wang428826f2019-08-23 14:24:51 +080022extern void add_bootloader_randomness(const void *, unsigned int);
Emese Revfy38addce2016-06-20 20:41:19 +020023
Vasily Gorbik7e756f42019-05-07 16:28:15 +020024#if defined(LATENT_ENTROPY_PLUGIN) && !defined(__CHECKER__)
Emese Revfy38addce2016-06-20 20:41:19 +020025static inline void add_latent_entropy(void)
26{
27 add_device_randomness((const void *)&latent_entropy,
28 sizeof(latent_entropy));
29}
30#else
31static inline void add_latent_entropy(void) {}
32#endif
33
Linus Torvalds1da177e2005-04-16 15:20:36 -070034extern void add_input_randomness(unsigned int type, unsigned int code,
Emese Revfy0766f782016-06-20 20:42:34 +020035 unsigned int value) __latent_entropy;
36extern void add_interrupt_randomness(int irq, int irq_flags) __latent_entropy;
Linus Torvalds1da177e2005-04-16 15:20:36 -070037
38extern void get_random_bytes(void *buf, int nbytes);
Jason A. Donenfelde297a782017-06-07 19:58:56 -040039extern int wait_for_random_bytes(void);
Kees Cookd5553522019-04-19 23:27:05 -040040extern int __init rand_initialize(void);
Jason A. Donenfeld9a472492018-07-31 21:11:00 +020041extern bool rng_is_initialized(void);
Herbert Xu205a5252015-06-09 18:19:39 +080042extern int add_random_ready_callback(struct random_ready_callback *rdy);
43extern void del_random_ready_callback(struct random_ready_callback *rdy);
Tobin C. Harding753d4332018-06-22 09:15:32 +100044extern int __must_check get_random_bytes_arch(void *buf, int nbytes);
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Linus Torvalds1da177e2005-04-16 15:20:36 -070046#ifndef MODULE
Arjan van de Ven54047322007-02-12 00:55:28 -080047extern const struct file_operations random_fops, urandom_fops;
Linus Torvalds1da177e2005-04-16 15:20:36 -070048#endif
49
Jason A. Donenfeldc4404082017-01-22 16:34:08 +010050u32 get_random_u32(void);
51u64 get_random_u64(void);
52static inline unsigned int get_random_int(void)
53{
54 return get_random_u32();
55}
56static inline unsigned long get_random_long(void)
57{
58#if BITS_PER_LONG == 64
59 return get_random_u64();
60#else
61 return get_random_u32();
62#endif
63}
64
Rik van Riel022c2042017-07-12 14:36:17 -070065/*
66 * On 64-bit architectures, protect against non-terminated C string overflows
67 * by zeroing out the first byte of the canary; this leaves 56 bits of entropy.
68 */
69#ifdef CONFIG_64BIT
70# ifdef __LITTLE_ENDIAN
71# define CANARY_MASK 0xffffffffffffff00UL
72# else /* big endian, 64 bits: */
73# define CANARY_MASK 0x00ffffffffffffffUL
74# endif
75#else /* 32 bits: */
76# define CANARY_MASK 0xffffffffUL
77#endif
78
79static inline unsigned long get_random_canary(void)
80{
81 unsigned long val = get_random_long();
82
83 return val & CANARY_MASK;
84}
85
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040086/* Calls wait_for_random_bytes() and then calls get_random_bytes(buf, nbytes).
87 * Returns the result of the call to wait_for_random_bytes. */
88static inline int get_random_bytes_wait(void *buf, int nbytes)
89{
90 int ret = wait_for_random_bytes();
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040091 get_random_bytes(buf, nbytes);
Jason A. Donenfeld25e3fca2018-02-04 23:07:46 +010092 return ret;
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040093}
94
95#define declare_get_random_var_wait(var) \
96 static inline int get_random_ ## var ## _wait(var *out) { \
97 int ret = wait_for_random_bytes(); \
98 if (unlikely(ret)) \
99 return ret; \
100 *out = get_random_ ## var(); \
101 return 0; \
102 }
103declare_get_random_var_wait(u32)
104declare_get_random_var_wait(u64)
105declare_get_random_var_wait(int)
106declare_get_random_var_wait(long)
107#undef declare_get_random_var
108
Jason Cooper99fdafd2016-10-11 13:53:52 -0700109unsigned long randomize_page(unsigned long start, unsigned long range);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110
Akinobu Mita496f2f92012-12-17 16:04:23 -0800111u32 prandom_u32(void);
Daniel Borkmanna98406e2014-08-23 17:03:28 +0200112void prandom_bytes(void *buf, size_t nbytes);
Akinobu Mita496f2f92012-12-17 16:04:23 -0800113void prandom_seed(u32 seed);
Hannes Frederic Sowa4af712e2013-11-11 12:20:34 +0100114void prandom_reseed_late(void);
Stephen Hemmingeraaa248f2006-10-17 00:09:42 -0700115
Daniel Borkmann38e9efc2013-11-11 12:20:35 +0100116struct rnd_state {
Daniel Borkmanna98814c2013-11-11 12:20:36 +0100117 __u32 s1, s2, s3, s4;
Daniel Borkmann38e9efc2013-11-11 12:20:35 +0100118};
119
Daniel Borkmanna98814c2013-11-11 12:20:36 +0100120u32 prandom_u32_state(struct rnd_state *state);
Daniel Borkmanna98406e2014-08-23 17:03:28 +0200121void prandom_bytes_state(struct rnd_state *state, void *buf, size_t nbytes);
Daniel Borkmann897ece52015-10-08 01:20:38 +0200122void prandom_seed_full_state(struct rnd_state __percpu *pcpu_state);
123
124#define prandom_init_once(pcpu_state) \
125 DO_ONCE(prandom_seed_full_state, (pcpu_state))
Joe Eykholt59601642010-05-26 14:44:13 -0700126
Daniel Borkmannf337db62014-01-22 02:29:39 +0100127/**
128 * prandom_u32_max - returns a pseudo-random number in interval [0, ep_ro)
129 * @ep_ro: right open interval endpoint
130 *
131 * Returns a pseudo-random number that is in interval [0, ep_ro). Note
132 * that the result depends on PRNG being well distributed in [0, ~0U]
133 * u32 space. Here we use maximally equidistributed combined Tausworthe
134 * generator, that is, prandom_u32(). This is useful when requesting a
135 * random index of an array containing ep_ro elements, for example.
136 *
137 * Returns: pseudo-random number in interval [0, ep_ro)
138 */
139static inline u32 prandom_u32_max(u32 ep_ro)
140{
141 return (u32)(((u64) prandom_u32() * ep_ro) >> 32);
142}
143
Joe Eykholt59601642010-05-26 14:44:13 -0700144/*
145 * Handle minimum values for seeds
146 */
147static inline u32 __seed(u32 x, u32 m)
148{
149 return (x < m) ? x + m : x;
150}
151
152/**
Akinobu Mita496f2f92012-12-17 16:04:23 -0800153 * prandom_seed_state - set seed for prandom_u32_state().
Joe Eykholt59601642010-05-26 14:44:13 -0700154 * @state: pointer to state structure to receive the seed.
155 * @seed: arbitrary 64-bit value to use as a seed.
156 */
Akinobu Mita496f2f92012-12-17 16:04:23 -0800157static inline void prandom_seed_state(struct rnd_state *state, u64 seed)
Joe Eykholt59601642010-05-26 14:44:13 -0700158{
159 u32 i = (seed >> 32) ^ (seed << 10) ^ seed;
160
Daniel Borkmanna98814c2013-11-11 12:20:36 +0100161 state->s1 = __seed(i, 2U);
162 state->s2 = __seed(i, 8U);
163 state->s3 = __seed(i, 16U);
164 state->s4 = __seed(i, 128U);
Joe Eykholt59601642010-05-26 14:44:13 -0700165}
166
H. Peter Anvin63d77172011-07-31 13:54:50 -0700167#ifdef CONFIG_ARCH_RANDOM
168# include <asm/archrandom.h>
169#else
Richard Henderson904caa62020-01-10 14:54:18 +0000170static inline bool __must_check arch_get_random_long(unsigned long *v)
H. Peter Anvin63d77172011-07-31 13:54:50 -0700171{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000172 return false;
H. Peter Anvin63d77172011-07-31 13:54:50 -0700173}
Richard Henderson904caa62020-01-10 14:54:18 +0000174static inline bool __must_check arch_get_random_int(unsigned int *v)
H. Peter Anvin63d77172011-07-31 13:54:50 -0700175{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000176 return false;
H. Peter Anvin63d77172011-07-31 13:54:50 -0700177}
Richard Henderson904caa62020-01-10 14:54:18 +0000178static inline bool __must_check arch_get_random_seed_long(unsigned long *v)
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700179{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000180 return false;
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700181}
Richard Henderson904caa62020-01-10 14:54:18 +0000182static inline bool __must_check arch_get_random_seed_int(unsigned int *v)
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700183{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000184 return false;
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700185}
H. Peter Anvin63d77172011-07-31 13:54:50 -0700186#endif
187
Tom Herbert055dc212013-01-22 09:49:50 +0000188/* Pseudo random number generator from numerical recipes. */
189static inline u32 next_pseudo_random32(u32 seed)
190{
191 return seed * 1664525 + 1013904223;
192}
193
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194#endif /* _LINUX_RANDOM_H */