blob: cbd8ca6e52ee49e6defec1f9bb1db1eb32f7b2fc [file] [log] [blame]
Krzysztof Kozlowski9f9cf042018-01-09 18:57:35 +01001// SPDX-License-Identifier: GPL-2.0
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +02002/*
3 * exynos-rng.c - Random Number Generator driver for the Exynos
4 *
5 * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org>
6 *
7 * Loosely based on old driver from drivers/char/hw_random/exynos-rng.c:
8 * Copyright (C) 2012 Samsung Electronics
9 * Jonghwa Lee <jonghwa3.lee@samsung.com>
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020010 */
11
12#include <linux/clk.h>
13#include <linux/crypto.h>
14#include <linux/err.h>
15#include <linux/io.h>
16#include <linux/module.h>
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +010017#include <linux/mutex.h>
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +010018#include <linux/of_device.h>
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020019#include <linux/platform_device.h>
20
21#include <crypto/internal/rng.h>
22
23#define EXYNOS_RNG_CONTROL 0x0
24#define EXYNOS_RNG_STATUS 0x10
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +010025
26#define EXYNOS_RNG_SEED_CONF 0x14
27#define EXYNOS_RNG_GEN_PRNG BIT(1)
28
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020029#define EXYNOS_RNG_SEED_BASE 0x140
30#define EXYNOS_RNG_SEED(n) (EXYNOS_RNG_SEED_BASE + (n * 0x4))
31#define EXYNOS_RNG_OUT_BASE 0x160
32#define EXYNOS_RNG_OUT(n) (EXYNOS_RNG_OUT_BASE + (n * 0x4))
33
34/* EXYNOS_RNG_CONTROL bit fields */
35#define EXYNOS_RNG_CONTROL_START 0x18
36/* EXYNOS_RNG_STATUS bit fields */
37#define EXYNOS_RNG_STATUS_SEED_SETTING_DONE BIT(1)
38#define EXYNOS_RNG_STATUS_RNG_DONE BIT(5)
39
40/* Five seed and output registers, each 4 bytes */
41#define EXYNOS_RNG_SEED_REGS 5
42#define EXYNOS_RNG_SEED_SIZE (EXYNOS_RNG_SEED_REGS * 4)
43
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +010044enum exynos_prng_type {
45 EXYNOS_PRNG_UNKNOWN = 0,
46 EXYNOS_PRNG_EXYNOS4,
47 EXYNOS_PRNG_EXYNOS5,
48};
49
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020050/*
Łukasz Stelmach99c9acf2017-12-12 17:36:06 +010051 * Driver re-seeds itself with generated random numbers to hinder
52 * backtracking of the original seed.
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020053 *
54 * Time for next re-seed in ms.
55 */
Łukasz Stelmach99c9acf2017-12-12 17:36:06 +010056#define EXYNOS_RNG_RESEED_TIME 1000
57#define EXYNOS_RNG_RESEED_BYTES 65536
58
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020059/*
60 * In polling mode, do not wait infinitely for the engine to finish the work.
61 */
62#define EXYNOS_RNG_WAIT_RETRIES 100
63
64/* Context for crypto */
65struct exynos_rng_ctx {
66 struct exynos_rng_dev *rng;
67};
68
69/* Device associated memory */
70struct exynos_rng_dev {
71 struct device *dev;
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +010072 enum exynos_prng_type type;
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020073 void __iomem *mem;
74 struct clk *clk;
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +010075 struct mutex lock;
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020076 /* Generated numbers stored for seeding during resume */
77 u8 seed_save[EXYNOS_RNG_SEED_SIZE];
78 unsigned int seed_save_len;
79 /* Time of last seeding in jiffies */
80 unsigned long last_seeding;
Łukasz Stelmach99c9acf2017-12-12 17:36:06 +010081 /* Bytes generated since last seeding */
82 unsigned long bytes_seeding;
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +020083};
84
85static struct exynos_rng_dev *exynos_rng_dev;
86
87static u32 exynos_rng_readl(struct exynos_rng_dev *rng, u32 offset)
88{
89 return readl_relaxed(rng->mem + offset);
90}
91
92static void exynos_rng_writel(struct exynos_rng_dev *rng, u32 val, u32 offset)
93{
94 writel_relaxed(val, rng->mem + offset);
95}
96
97static int exynos_rng_set_seed(struct exynos_rng_dev *rng,
98 const u8 *seed, unsigned int slen)
99{
100 u32 val;
101 int i;
102
103 /* Round seed length because loop iterates over full register size */
104 slen = ALIGN_DOWN(slen, 4);
105
106 if (slen < EXYNOS_RNG_SEED_SIZE)
107 return -EINVAL;
108
109 for (i = 0; i < slen ; i += 4) {
110 unsigned int seed_reg = (i / 4) % EXYNOS_RNG_SEED_REGS;
111
112 val = seed[i] << 24;
113 val |= seed[i + 1] << 16;
114 val |= seed[i + 2] << 8;
115 val |= seed[i + 3] << 0;
116
117 exynos_rng_writel(rng, val, EXYNOS_RNG_SEED(seed_reg));
118 }
119
120 val = exynos_rng_readl(rng, EXYNOS_RNG_STATUS);
121 if (!(val & EXYNOS_RNG_STATUS_SEED_SETTING_DONE)) {
122 dev_warn(rng->dev, "Seed setting not finished\n");
123 return -EIO;
124 }
125
126 rng->last_seeding = jiffies;
Łukasz Stelmach99c9acf2017-12-12 17:36:06 +0100127 rng->bytes_seeding = 0;
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200128
129 return 0;
130}
131
132/*
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200133 * Start the engine and poll for finish. Then read from output registers
134 * filling the 'dst' buffer up to 'dlen' bytes or up to size of generated
135 * random data (EXYNOS_RNG_SEED_SIZE).
136 *
137 * On success: return 0 and store number of read bytes under 'read' address.
138 * On error: return -ERRNO.
139 */
140static int exynos_rng_get_random(struct exynos_rng_dev *rng,
141 u8 *dst, unsigned int dlen,
142 unsigned int *read)
143{
144 int retry = EXYNOS_RNG_WAIT_RETRIES;
145
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +0100146 if (rng->type == EXYNOS_PRNG_EXYNOS4) {
147 exynos_rng_writel(rng, EXYNOS_RNG_CONTROL_START,
148 EXYNOS_RNG_CONTROL);
149 } else if (rng->type == EXYNOS_PRNG_EXYNOS5) {
150 exynos_rng_writel(rng, EXYNOS_RNG_GEN_PRNG,
151 EXYNOS_RNG_SEED_CONF);
152 }
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200153
154 while (!(exynos_rng_readl(rng,
155 EXYNOS_RNG_STATUS) & EXYNOS_RNG_STATUS_RNG_DONE) && --retry)
156 cpu_relax();
157
158 if (!retry)
159 return -ETIMEDOUT;
160
161 /* Clear status bit */
162 exynos_rng_writel(rng, EXYNOS_RNG_STATUS_RNG_DONE,
163 EXYNOS_RNG_STATUS);
Łukasz Stelmach3a5a5e52017-12-12 17:36:05 +0100164 *read = min_t(size_t, dlen, EXYNOS_RNG_SEED_SIZE);
165 memcpy_fromio(dst, rng->mem + EXYNOS_RNG_OUT_BASE, *read);
Łukasz Stelmach99c9acf2017-12-12 17:36:06 +0100166 rng->bytes_seeding += *read;
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200167
168 return 0;
169}
170
171/* Re-seed itself from time to time */
172static void exynos_rng_reseed(struct exynos_rng_dev *rng)
173{
174 unsigned long next_seeding = rng->last_seeding + \
175 msecs_to_jiffies(EXYNOS_RNG_RESEED_TIME);
176 unsigned long now = jiffies;
177 unsigned int read = 0;
178 u8 seed[EXYNOS_RNG_SEED_SIZE];
179
Łukasz Stelmach99c9acf2017-12-12 17:36:06 +0100180 if (time_before(now, next_seeding) &&
181 rng->bytes_seeding < EXYNOS_RNG_RESEED_BYTES)
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200182 return;
183
184 if (exynos_rng_get_random(rng, seed, sizeof(seed), &read))
185 return;
186
187 exynos_rng_set_seed(rng, seed, read);
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100188
189 /* Let others do some of their job. */
190 mutex_unlock(&rng->lock);
191 mutex_lock(&rng->lock);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200192}
193
194static int exynos_rng_generate(struct crypto_rng *tfm,
195 const u8 *src, unsigned int slen,
196 u8 *dst, unsigned int dlen)
197{
198 struct exynos_rng_ctx *ctx = crypto_rng_ctx(tfm);
199 struct exynos_rng_dev *rng = ctx->rng;
200 unsigned int read = 0;
201 int ret;
202
203 ret = clk_prepare_enable(rng->clk);
204 if (ret)
205 return ret;
206
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100207 mutex_lock(&rng->lock);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200208 do {
209 ret = exynos_rng_get_random(rng, dst, dlen, &read);
210 if (ret)
211 break;
212
213 dlen -= read;
214 dst += read;
215
216 exynos_rng_reseed(rng);
217 } while (dlen > 0);
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100218 mutex_unlock(&rng->lock);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200219
220 clk_disable_unprepare(rng->clk);
221
222 return ret;
223}
224
225static int exynos_rng_seed(struct crypto_rng *tfm, const u8 *seed,
226 unsigned int slen)
227{
228 struct exynos_rng_ctx *ctx = crypto_rng_ctx(tfm);
229 struct exynos_rng_dev *rng = ctx->rng;
230 int ret;
231
232 ret = clk_prepare_enable(rng->clk);
233 if (ret)
234 return ret;
235
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100236 mutex_lock(&rng->lock);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200237 ret = exynos_rng_set_seed(ctx->rng, seed, slen);
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100238 mutex_unlock(&rng->lock);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200239
240 clk_disable_unprepare(rng->clk);
241
242 return ret;
243}
244
245static int exynos_rng_kcapi_init(struct crypto_tfm *tfm)
246{
247 struct exynos_rng_ctx *ctx = crypto_tfm_ctx(tfm);
248
249 ctx->rng = exynos_rng_dev;
250
251 return 0;
252}
253
254static struct rng_alg exynos_rng_alg = {
255 .generate = exynos_rng_generate,
256 .seed = exynos_rng_seed,
257 .seedsize = EXYNOS_RNG_SEED_SIZE,
258 .base = {
259 .cra_name = "stdrng",
260 .cra_driver_name = "exynos_rng",
Łukasz Stelmach3fc12642017-12-05 17:20:46 +0100261 .cra_priority = 300,
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200262 .cra_ctxsize = sizeof(struct exynos_rng_ctx),
263 .cra_module = THIS_MODULE,
264 .cra_init = exynos_rng_kcapi_init,
265 }
266};
267
268static int exynos_rng_probe(struct platform_device *pdev)
269{
270 struct exynos_rng_dev *rng;
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200271 int ret;
272
273 if (exynos_rng_dev)
274 return -EEXIST;
275
276 rng = devm_kzalloc(&pdev->dev, sizeof(*rng), GFP_KERNEL);
277 if (!rng)
278 return -ENOMEM;
279
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +0100280 rng->type = (enum exynos_prng_type)of_device_get_match_data(&pdev->dev);
281
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100282 mutex_init(&rng->lock);
283
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200284 rng->dev = &pdev->dev;
285 rng->clk = devm_clk_get(&pdev->dev, "secss");
286 if (IS_ERR(rng->clk)) {
287 dev_err(&pdev->dev, "Couldn't get clock.\n");
288 return PTR_ERR(rng->clk);
289 }
290
YueHaibing6d1c0182019-08-02 21:28:00 +0800291 rng->mem = devm_platform_ioremap_resource(pdev, 0);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200292 if (IS_ERR(rng->mem))
293 return PTR_ERR(rng->mem);
294
295 platform_set_drvdata(pdev, rng);
296
297 exynos_rng_dev = rng;
298
299 ret = crypto_register_rng(&exynos_rng_alg);
300 if (ret) {
301 dev_err(&pdev->dev,
302 "Couldn't register rng crypto alg: %d\n", ret);
303 exynos_rng_dev = NULL;
304 }
305
306 return ret;
307}
308
309static int exynos_rng_remove(struct platform_device *pdev)
310{
311 crypto_unregister_rng(&exynos_rng_alg);
312
313 exynos_rng_dev = NULL;
314
315 return 0;
316}
317
318static int __maybe_unused exynos_rng_suspend(struct device *dev)
319{
Wolfram Sang8ce31dc2018-04-19 16:05:36 +0200320 struct exynos_rng_dev *rng = dev_get_drvdata(dev);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200321 int ret;
322
323 /* If we were never seeded then after resume it will be the same */
324 if (!rng->last_seeding)
325 return 0;
326
327 rng->seed_save_len = 0;
328 ret = clk_prepare_enable(rng->clk);
329 if (ret)
330 return ret;
331
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100332 mutex_lock(&rng->lock);
333
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200334 /* Get new random numbers and store them for seeding on resume. */
335 exynos_rng_get_random(rng, rng->seed_save, sizeof(rng->seed_save),
336 &(rng->seed_save_len));
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100337
338 mutex_unlock(&rng->lock);
339
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200340 dev_dbg(rng->dev, "Stored %u bytes for seeding on system resume\n",
341 rng->seed_save_len);
342
343 clk_disable_unprepare(rng->clk);
344
345 return 0;
346}
347
348static int __maybe_unused exynos_rng_resume(struct device *dev)
349{
Wolfram Sang8ce31dc2018-04-19 16:05:36 +0200350 struct exynos_rng_dev *rng = dev_get_drvdata(dev);
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200351 int ret;
352
353 /* Never seeded so nothing to do */
354 if (!rng->last_seeding)
355 return 0;
356
357 ret = clk_prepare_enable(rng->clk);
358 if (ret)
359 return ret;
360
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100361 mutex_lock(&rng->lock);
362
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200363 ret = exynos_rng_set_seed(rng, rng->seed_save, rng->seed_save_len);
364
Łukasz Stelmach25cf7f02017-12-12 17:36:07 +0100365 mutex_unlock(&rng->lock);
366
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200367 clk_disable_unprepare(rng->clk);
368
369 return ret;
370}
371
372static SIMPLE_DEV_PM_OPS(exynos_rng_pm_ops, exynos_rng_suspend,
373 exynos_rng_resume);
374
375static const struct of_device_id exynos_rng_dt_match[] = {
376 {
377 .compatible = "samsung,exynos4-rng",
Łukasz Stelmachf76d38b2017-12-12 17:36:04 +0100378 .data = (const void *)EXYNOS_PRNG_EXYNOS4,
379 }, {
380 .compatible = "samsung,exynos5250-prng",
381 .data = (const void *)EXYNOS_PRNG_EXYNOS5,
Krzysztof Kozlowskic46ea132017-04-11 20:08:35 +0200382 },
383 { },
384};
385MODULE_DEVICE_TABLE(of, exynos_rng_dt_match);
386
387static struct platform_driver exynos_rng_driver = {
388 .driver = {
389 .name = "exynos-rng",
390 .pm = &exynos_rng_pm_ops,
391 .of_match_table = exynos_rng_dt_match,
392 },
393 .probe = exynos_rng_probe,
394 .remove = exynos_rng_remove,
395};
396
397module_platform_driver(exynos_rng_driver);
398
399MODULE_DESCRIPTION("Exynos H/W Random Number Generator driver");
400MODULE_AUTHOR("Krzysztof Kozlowski <krzk@kernel.org>");
Krzysztof Kozlowski9f9cf042018-01-09 18:57:35 +0100401MODULE_LICENSE("GPL v2");