Line data Source code
1 : /*
2 : * hw_random/core.c: HWRNG core API
3 : *
4 : * Copyright 2006 Michael Buesch <m@bues.ch>
5 : * Copyright 2005 (c) MontaVista Software, Inc.
6 : *
7 : * Please read Documentation/admin-guide/hw_random.rst for details on use.
8 : *
9 : * This software may be used and distributed according to the terms
10 : * of the GNU General Public License, incorporated herein by reference.
11 : */
12 :
13 : #include <linux/delay.h>
14 : #include <linux/device.h>
15 : #include <linux/err.h>
16 : #include <linux/fs.h>
17 : #include <linux/hw_random.h>
18 : #include <linux/random.h>
19 : #include <linux/kernel.h>
20 : #include <linux/kthread.h>
21 : #include <linux/sched/signal.h>
22 : #include <linux/miscdevice.h>
23 : #include <linux/module.h>
24 : #include <linux/random.h>
25 : #include <linux/sched.h>
26 : #include <linux/slab.h>
27 : #include <linux/uaccess.h>
28 :
29 : #define RNG_MODULE_NAME "hw_random"
30 :
31 : static struct hwrng *current_rng;
32 : /* the current rng has been explicitly chosen by user via sysfs */
33 : static int cur_rng_set_by_user;
34 : static struct task_struct *hwrng_fill;
35 : /* list of registered rngs */
36 : static LIST_HEAD(rng_list);
37 : /* Protects rng_list and current_rng */
38 : static DEFINE_MUTEX(rng_mutex);
39 : /* Protects rng read functions, data_avail, rng_buffer and rng_fillbuf */
40 : static DEFINE_MUTEX(reading_mutex);
41 : static int data_avail;
42 : static u8 *rng_buffer, *rng_fillbuf;
43 : static unsigned short current_quality;
44 : static unsigned short default_quality = 1024; /* default to maximum */
45 :
46 : module_param(current_quality, ushort, 0644);
47 : MODULE_PARM_DESC(current_quality,
48 : "current hwrng entropy estimation per 1024 bits of input -- obsolete, use rng_quality instead");
49 : module_param(default_quality, ushort, 0644);
50 : MODULE_PARM_DESC(default_quality,
51 : "default maximum entropy content of hwrng per 1024 bits of input");
52 :
53 : static void drop_current_rng(void);
54 : static int hwrng_init(struct hwrng *rng);
55 : static int hwrng_fillfn(void *unused);
56 :
57 : static inline int rng_get_data(struct hwrng *rng, u8 *buffer, size_t size,
58 : int wait);
59 :
60 : static size_t rng_buffer_size(void)
61 : {
62 : return SMP_CACHE_BYTES < 32 ? 32 : SMP_CACHE_BYTES;
63 : }
64 :
65 0 : static void add_early_randomness(struct hwrng *rng)
66 : {
67 : int bytes_read;
68 :
69 0 : mutex_lock(&reading_mutex);
70 0 : bytes_read = rng_get_data(rng, rng_fillbuf, 32, 0);
71 0 : mutex_unlock(&reading_mutex);
72 0 : if (bytes_read > 0) {
73 0 : size_t entropy = bytes_read * 8 * rng->quality / 1024;
74 0 : add_hwgenerator_randomness(rng_fillbuf, bytes_read, entropy, false);
75 : }
76 0 : }
77 :
78 0 : static inline void cleanup_rng(struct kref *kref)
79 : {
80 0 : struct hwrng *rng = container_of(kref, struct hwrng, ref);
81 :
82 0 : if (rng->cleanup)
83 0 : rng->cleanup(rng);
84 :
85 0 : complete(&rng->cleanup_done);
86 0 : }
87 :
88 0 : static int set_current_rng(struct hwrng *rng)
89 : {
90 : int err;
91 :
92 0 : BUG_ON(!mutex_is_locked(&rng_mutex));
93 :
94 0 : err = hwrng_init(rng);
95 0 : if (err)
96 : return err;
97 :
98 0 : drop_current_rng();
99 0 : current_rng = rng;
100 :
101 : /* if necessary, start hwrng thread */
102 0 : if (!hwrng_fill) {
103 0 : hwrng_fill = kthread_run(hwrng_fillfn, NULL, "hwrng");
104 0 : if (IS_ERR(hwrng_fill)) {
105 0 : pr_err("hwrng_fill thread creation failed\n");
106 0 : hwrng_fill = NULL;
107 : }
108 : }
109 :
110 : return 0;
111 : }
112 :
113 0 : static void drop_current_rng(void)
114 : {
115 0 : BUG_ON(!mutex_is_locked(&rng_mutex));
116 0 : if (!current_rng)
117 : return;
118 :
119 : /* decrease last reference for triggering the cleanup */
120 0 : kref_put(¤t_rng->ref, cleanup_rng);
121 0 : current_rng = NULL;
122 : }
123 :
124 : /* Returns ERR_PTR(), NULL or refcounted hwrng */
125 : static struct hwrng *get_current_rng_nolock(void)
126 : {
127 0 : if (current_rng)
128 0 : kref_get(¤t_rng->ref);
129 :
130 0 : return current_rng;
131 : }
132 :
133 0 : static struct hwrng *get_current_rng(void)
134 : {
135 : struct hwrng *rng;
136 :
137 0 : if (mutex_lock_interruptible(&rng_mutex))
138 : return ERR_PTR(-ERESTARTSYS);
139 :
140 0 : rng = get_current_rng_nolock();
141 :
142 0 : mutex_unlock(&rng_mutex);
143 0 : return rng;
144 : }
145 :
146 0 : static void put_rng(struct hwrng *rng)
147 : {
148 : /*
149 : * Hold rng_mutex here so we serialize in case they set_current_rng
150 : * on rng again immediately.
151 : */
152 0 : mutex_lock(&rng_mutex);
153 0 : if (rng)
154 0 : kref_put(&rng->ref, cleanup_rng);
155 0 : mutex_unlock(&rng_mutex);
156 0 : }
157 :
158 0 : static int hwrng_init(struct hwrng *rng)
159 : {
160 0 : if (kref_get_unless_zero(&rng->ref))
161 : goto skip_init;
162 :
163 0 : if (rng->init) {
164 : int ret;
165 :
166 0 : ret = rng->init(rng);
167 0 : if (ret)
168 : return ret;
169 : }
170 :
171 0 : kref_init(&rng->ref);
172 0 : reinit_completion(&rng->cleanup_done);
173 :
174 : skip_init:
175 0 : rng->quality = min_t(u16, min_t(u16, default_quality, 1024), rng->quality ?: 1024);
176 0 : current_quality = rng->quality; /* obsolete */
177 :
178 0 : return 0;
179 : }
180 :
181 0 : static int rng_dev_open(struct inode *inode, struct file *filp)
182 : {
183 : /* enforce read-only access to this chrdev */
184 0 : if ((filp->f_mode & FMODE_READ) == 0)
185 : return -EINVAL;
186 0 : if (filp->f_mode & FMODE_WRITE)
187 : return -EINVAL;
188 0 : return 0;
189 : }
190 :
191 0 : static inline int rng_get_data(struct hwrng *rng, u8 *buffer, size_t size,
192 : int wait) {
193 : int present;
194 :
195 0 : BUG_ON(!mutex_is_locked(&reading_mutex));
196 0 : if (rng->read)
197 0 : return rng->read(rng, (void *)buffer, size, wait);
198 :
199 0 : if (rng->data_present)
200 0 : present = rng->data_present(rng, wait);
201 : else
202 : present = 1;
203 :
204 0 : if (present)
205 0 : return rng->data_read(rng, (u32 *)buffer);
206 :
207 : return 0;
208 : }
209 :
210 0 : static ssize_t rng_dev_read(struct file *filp, char __user *buf,
211 : size_t size, loff_t *offp)
212 : {
213 0 : ssize_t ret = 0;
214 0 : int err = 0;
215 : int bytes_read, len;
216 : struct hwrng *rng;
217 :
218 0 : while (size) {
219 0 : rng = get_current_rng();
220 0 : if (IS_ERR(rng)) {
221 0 : err = PTR_ERR(rng);
222 0 : goto out;
223 : }
224 0 : if (!rng) {
225 : err = -ENODEV;
226 : goto out;
227 : }
228 :
229 0 : if (mutex_lock_interruptible(&reading_mutex)) {
230 : err = -ERESTARTSYS;
231 : goto out_put;
232 : }
233 0 : if (!data_avail) {
234 0 : bytes_read = rng_get_data(rng, rng_buffer,
235 : rng_buffer_size(),
236 0 : !(filp->f_flags & O_NONBLOCK));
237 0 : if (bytes_read < 0) {
238 : err = bytes_read;
239 : goto out_unlock_reading;
240 : }
241 0 : data_avail = bytes_read;
242 : }
243 :
244 0 : if (!data_avail) {
245 0 : if (filp->f_flags & O_NONBLOCK) {
246 : err = -EAGAIN;
247 : goto out_unlock_reading;
248 : }
249 : } else {
250 0 : len = data_avail;
251 0 : if (len > size)
252 0 : len = size;
253 :
254 0 : data_avail -= len;
255 :
256 0 : if (copy_to_user(buf + ret, rng_buffer + data_avail,
257 : len)) {
258 : err = -EFAULT;
259 : goto out_unlock_reading;
260 : }
261 :
262 0 : size -= len;
263 0 : ret += len;
264 : }
265 :
266 0 : mutex_unlock(&reading_mutex);
267 0 : put_rng(rng);
268 :
269 0 : if (need_resched())
270 0 : schedule_timeout_interruptible(1);
271 :
272 0 : if (signal_pending(current)) {
273 : err = -ERESTARTSYS;
274 : goto out;
275 : }
276 : }
277 : out:
278 0 : return ret ? : err;
279 :
280 : out_unlock_reading:
281 0 : mutex_unlock(&reading_mutex);
282 : out_put:
283 0 : put_rng(rng);
284 0 : goto out;
285 : }
286 :
287 : static const struct file_operations rng_chrdev_ops = {
288 : .owner = THIS_MODULE,
289 : .open = rng_dev_open,
290 : .read = rng_dev_read,
291 : .llseek = noop_llseek,
292 : };
293 :
294 : static const struct attribute_group *rng_dev_groups[];
295 :
296 : static struct miscdevice rng_miscdev = {
297 : .minor = HWRNG_MINOR,
298 : .name = RNG_MODULE_NAME,
299 : .nodename = "hwrng",
300 : .fops = &rng_chrdev_ops,
301 : .groups = rng_dev_groups,
302 : };
303 :
304 0 : static int enable_best_rng(void)
305 : {
306 0 : struct hwrng *rng, *new_rng = NULL;
307 0 : int ret = -ENODEV;
308 :
309 0 : BUG_ON(!mutex_is_locked(&rng_mutex));
310 :
311 : /* no rng to use? */
312 0 : if (list_empty(&rng_list)) {
313 0 : drop_current_rng();
314 0 : cur_rng_set_by_user = 0;
315 0 : return 0;
316 : }
317 :
318 : /* use the rng which offers the best quality */
319 0 : list_for_each_entry(rng, &rng_list, list) {
320 0 : if (!new_rng || rng->quality > new_rng->quality)
321 0 : new_rng = rng;
322 : }
323 :
324 0 : ret = ((new_rng == current_rng) ? 0 : set_current_rng(new_rng));
325 0 : if (!ret)
326 0 : cur_rng_set_by_user = 0;
327 :
328 : return ret;
329 : }
330 :
331 0 : static ssize_t rng_current_store(struct device *dev,
332 : struct device_attribute *attr,
333 : const char *buf, size_t len)
334 : {
335 : int err;
336 : struct hwrng *rng, *old_rng, *new_rng;
337 :
338 0 : err = mutex_lock_interruptible(&rng_mutex);
339 0 : if (err)
340 : return -ERESTARTSYS;
341 :
342 0 : old_rng = current_rng;
343 0 : if (sysfs_streq(buf, "")) {
344 0 : err = enable_best_rng();
345 : } else {
346 0 : list_for_each_entry(rng, &rng_list, list) {
347 0 : if (sysfs_streq(rng->name, buf)) {
348 0 : err = set_current_rng(rng);
349 0 : if (!err)
350 0 : cur_rng_set_by_user = 1;
351 : break;
352 : }
353 : }
354 : }
355 0 : new_rng = get_current_rng_nolock();
356 0 : mutex_unlock(&rng_mutex);
357 :
358 0 : if (new_rng) {
359 0 : if (new_rng != old_rng)
360 0 : add_early_randomness(new_rng);
361 0 : put_rng(new_rng);
362 : }
363 :
364 0 : return err ? : len;
365 : }
366 :
367 0 : static ssize_t rng_current_show(struct device *dev,
368 : struct device_attribute *attr,
369 : char *buf)
370 : {
371 : ssize_t ret;
372 : struct hwrng *rng;
373 :
374 0 : rng = get_current_rng();
375 0 : if (IS_ERR(rng))
376 0 : return PTR_ERR(rng);
377 :
378 0 : ret = snprintf(buf, PAGE_SIZE, "%s\n", rng ? rng->name : "none");
379 0 : put_rng(rng);
380 :
381 0 : return ret;
382 : }
383 :
384 0 : static ssize_t rng_available_show(struct device *dev,
385 : struct device_attribute *attr,
386 : char *buf)
387 : {
388 : int err;
389 : struct hwrng *rng;
390 :
391 0 : err = mutex_lock_interruptible(&rng_mutex);
392 0 : if (err)
393 : return -ERESTARTSYS;
394 0 : buf[0] = '\0';
395 0 : list_for_each_entry(rng, &rng_list, list) {
396 0 : strlcat(buf, rng->name, PAGE_SIZE);
397 0 : strlcat(buf, " ", PAGE_SIZE);
398 : }
399 0 : strlcat(buf, "\n", PAGE_SIZE);
400 0 : mutex_unlock(&rng_mutex);
401 :
402 0 : return strlen(buf);
403 : }
404 :
405 0 : static ssize_t rng_selected_show(struct device *dev,
406 : struct device_attribute *attr,
407 : char *buf)
408 : {
409 0 : return sysfs_emit(buf, "%d\n", cur_rng_set_by_user);
410 : }
411 :
412 0 : static ssize_t rng_quality_show(struct device *dev,
413 : struct device_attribute *attr,
414 : char *buf)
415 : {
416 : ssize_t ret;
417 : struct hwrng *rng;
418 :
419 0 : rng = get_current_rng();
420 0 : if (IS_ERR(rng))
421 0 : return PTR_ERR(rng);
422 :
423 0 : if (!rng) /* no need to put_rng */
424 : return -ENODEV;
425 :
426 0 : ret = sysfs_emit(buf, "%hu\n", rng->quality);
427 0 : put_rng(rng);
428 :
429 0 : return ret;
430 : }
431 :
432 0 : static ssize_t rng_quality_store(struct device *dev,
433 : struct device_attribute *attr,
434 : const char *buf, size_t len)
435 : {
436 : u16 quality;
437 0 : int ret = -EINVAL;
438 :
439 0 : if (len < 2)
440 : return -EINVAL;
441 :
442 0 : ret = mutex_lock_interruptible(&rng_mutex);
443 0 : if (ret)
444 : return -ERESTARTSYS;
445 :
446 0 : ret = kstrtou16(buf, 0, &quality);
447 0 : if (ret || quality > 1024) {
448 : ret = -EINVAL;
449 : goto out;
450 : }
451 :
452 0 : if (!current_rng) {
453 : ret = -ENODEV;
454 : goto out;
455 : }
456 :
457 0 : current_rng->quality = quality;
458 0 : current_quality = quality; /* obsolete */
459 :
460 : /* the best available RNG may have changed */
461 0 : ret = enable_best_rng();
462 :
463 : out:
464 0 : mutex_unlock(&rng_mutex);
465 0 : return ret ? ret : len;
466 : }
467 :
468 : static DEVICE_ATTR_RW(rng_current);
469 : static DEVICE_ATTR_RO(rng_available);
470 : static DEVICE_ATTR_RO(rng_selected);
471 : static DEVICE_ATTR_RW(rng_quality);
472 :
473 : static struct attribute *rng_dev_attrs[] = {
474 : &dev_attr_rng_current.attr,
475 : &dev_attr_rng_available.attr,
476 : &dev_attr_rng_selected.attr,
477 : &dev_attr_rng_quality.attr,
478 : NULL
479 : };
480 :
481 : ATTRIBUTE_GROUPS(rng_dev);
482 :
483 0 : static void __exit unregister_miscdev(void)
484 : {
485 0 : misc_deregister(&rng_miscdev);
486 0 : }
487 :
488 1 : static int __init register_miscdev(void)
489 : {
490 1 : return misc_register(&rng_miscdev);
491 : }
492 :
493 0 : static int hwrng_fillfn(void *unused)
494 : {
495 0 : size_t entropy, entropy_credit = 0; /* in 1/1024 of a bit */
496 : long rc;
497 :
498 0 : while (!kthread_should_stop()) {
499 : unsigned short quality;
500 : struct hwrng *rng;
501 :
502 0 : rng = get_current_rng();
503 0 : if (IS_ERR(rng) || !rng)
504 : break;
505 0 : mutex_lock(&reading_mutex);
506 0 : rc = rng_get_data(rng, rng_fillbuf,
507 : rng_buffer_size(), 1);
508 0 : if (current_quality != rng->quality)
509 0 : rng->quality = current_quality; /* obsolete */
510 0 : quality = rng->quality;
511 0 : mutex_unlock(&reading_mutex);
512 :
513 0 : if (rc <= 0)
514 : hwrng_msleep(rng, 10000);
515 :
516 0 : put_rng(rng);
517 :
518 0 : if (rc <= 0)
519 0 : continue;
520 :
521 : /* If we cannot credit at least one bit of entropy,
522 : * keep track of the remainder for the next iteration
523 : */
524 0 : entropy = rc * quality * 8 + entropy_credit;
525 0 : if ((entropy >> 10) == 0)
526 0 : entropy_credit = entropy;
527 :
528 : /* Outside lock, sure, but y'know: randomness. */
529 0 : add_hwgenerator_randomness((void *)rng_fillbuf, rc,
530 : entropy >> 10, true);
531 : }
532 0 : hwrng_fill = NULL;
533 0 : return 0;
534 : }
535 :
536 0 : int hwrng_register(struct hwrng *rng)
537 : {
538 0 : int err = -EINVAL;
539 : struct hwrng *tmp;
540 0 : bool is_new_current = false;
541 :
542 0 : if (!rng->name || (!rng->data_read && !rng->read))
543 : goto out;
544 :
545 0 : mutex_lock(&rng_mutex);
546 :
547 : /* Must not register two RNGs with the same name. */
548 0 : err = -EEXIST;
549 0 : list_for_each_entry(tmp, &rng_list, list) {
550 0 : if (strcmp(tmp->name, rng->name) == 0)
551 : goto out_unlock;
552 : }
553 0 : list_add_tail(&rng->list, &rng_list);
554 :
555 0 : init_completion(&rng->cleanup_done);
556 0 : complete(&rng->cleanup_done);
557 0 : init_completion(&rng->dying);
558 :
559 0 : if (!current_rng ||
560 0 : (!cur_rng_set_by_user && rng->quality > current_rng->quality)) {
561 : /*
562 : * Set new rng as current as the new rng source
563 : * provides better entropy quality and was not
564 : * chosen by userspace.
565 : */
566 0 : err = set_current_rng(rng);
567 0 : if (err)
568 : goto out_unlock;
569 : /* to use current_rng in add_early_randomness() we need
570 : * to take a ref
571 : */
572 0 : is_new_current = true;
573 0 : kref_get(&rng->ref);
574 : }
575 0 : mutex_unlock(&rng_mutex);
576 0 : if (is_new_current || !rng->init) {
577 : /*
578 : * Use a new device's input to add some randomness to
579 : * the system. If this rng device isn't going to be
580 : * used right away, its init function hasn't been
581 : * called yet by set_current_rng(); so only use the
582 : * randomness from devices that don't need an init callback
583 : */
584 0 : add_early_randomness(rng);
585 : }
586 0 : if (is_new_current)
587 0 : put_rng(rng);
588 : return 0;
589 : out_unlock:
590 0 : mutex_unlock(&rng_mutex);
591 : out:
592 : return err;
593 : }
594 : EXPORT_SYMBOL_GPL(hwrng_register);
595 :
596 0 : void hwrng_unregister(struct hwrng *rng)
597 : {
598 : struct hwrng *old_rng, *new_rng;
599 : int err;
600 :
601 0 : mutex_lock(&rng_mutex);
602 :
603 0 : old_rng = current_rng;
604 0 : list_del(&rng->list);
605 0 : complete_all(&rng->dying);
606 0 : if (current_rng == rng) {
607 0 : err = enable_best_rng();
608 0 : if (err) {
609 0 : drop_current_rng();
610 0 : cur_rng_set_by_user = 0;
611 : }
612 : }
613 :
614 0 : new_rng = get_current_rng_nolock();
615 0 : if (list_empty(&rng_list)) {
616 0 : mutex_unlock(&rng_mutex);
617 0 : if (hwrng_fill)
618 0 : kthread_stop(hwrng_fill);
619 : } else
620 0 : mutex_unlock(&rng_mutex);
621 :
622 0 : if (new_rng) {
623 0 : if (old_rng != new_rng)
624 0 : add_early_randomness(new_rng);
625 0 : put_rng(new_rng);
626 : }
627 :
628 0 : wait_for_completion(&rng->cleanup_done);
629 0 : }
630 : EXPORT_SYMBOL_GPL(hwrng_unregister);
631 :
632 0 : static void devm_hwrng_release(struct device *dev, void *res)
633 : {
634 0 : hwrng_unregister(*(struct hwrng **)res);
635 0 : }
636 :
637 0 : static int devm_hwrng_match(struct device *dev, void *res, void *data)
638 : {
639 0 : struct hwrng **r = res;
640 :
641 0 : if (WARN_ON(!r || !*r))
642 : return 0;
643 :
644 0 : return *r == data;
645 : }
646 :
647 0 : int devm_hwrng_register(struct device *dev, struct hwrng *rng)
648 : {
649 : struct hwrng **ptr;
650 : int error;
651 :
652 0 : ptr = devres_alloc(devm_hwrng_release, sizeof(*ptr), GFP_KERNEL);
653 0 : if (!ptr)
654 : return -ENOMEM;
655 :
656 0 : error = hwrng_register(rng);
657 0 : if (error) {
658 0 : devres_free(ptr);
659 0 : return error;
660 : }
661 :
662 0 : *ptr = rng;
663 0 : devres_add(dev, ptr);
664 0 : return 0;
665 : }
666 : EXPORT_SYMBOL_GPL(devm_hwrng_register);
667 :
668 0 : void devm_hwrng_unregister(struct device *dev, struct hwrng *rng)
669 : {
670 0 : devres_release(dev, devm_hwrng_release, devm_hwrng_match, rng);
671 0 : }
672 : EXPORT_SYMBOL_GPL(devm_hwrng_unregister);
673 :
674 0 : long hwrng_msleep(struct hwrng *rng, unsigned int msecs)
675 : {
676 0 : unsigned long timeout = msecs_to_jiffies(msecs) + 1;
677 :
678 0 : return wait_for_completion_interruptible_timeout(&rng->dying, timeout);
679 : }
680 : EXPORT_SYMBOL_GPL(hwrng_msleep);
681 :
682 1 : static int __init hwrng_modinit(void)
683 : {
684 : int ret;
685 :
686 : /* kmalloc makes this safe for virt_to_page() in virtio_rng.c */
687 2 : rng_buffer = kmalloc(rng_buffer_size(), GFP_KERNEL);
688 1 : if (!rng_buffer)
689 : return -ENOMEM;
690 :
691 2 : rng_fillbuf = kmalloc(rng_buffer_size(), GFP_KERNEL);
692 1 : if (!rng_fillbuf) {
693 0 : kfree(rng_buffer);
694 0 : return -ENOMEM;
695 : }
696 :
697 1 : ret = register_miscdev();
698 1 : if (ret) {
699 0 : kfree(rng_fillbuf);
700 0 : kfree(rng_buffer);
701 : }
702 :
703 : return ret;
704 : }
705 :
706 0 : static void __exit hwrng_modexit(void)
707 : {
708 0 : mutex_lock(&rng_mutex);
709 0 : BUG_ON(current_rng);
710 0 : kfree(rng_buffer);
711 0 : kfree(rng_fillbuf);
712 0 : mutex_unlock(&rng_mutex);
713 :
714 0 : unregister_miscdev();
715 0 : }
716 :
717 : fs_initcall(hwrng_modinit); /* depends on misc_register() */
718 : module_exit(hwrng_modexit);
719 :
720 : MODULE_DESCRIPTION("H/W Random Number Generator (RNG) driver");
721 : MODULE_LICENSE("GPL");
|