1 // SPDX-License-Identifier: GPL-2.0
3 * exynos-rng.c - Random Number Generator driver for the Exynos
5 * Copyright (c) 2017 Krzysztof Kozlowski <krzk@kernel.org>
7 * Loosely based on old driver from drivers/char/hw_random/exynos-rng.c:
8 * Copyright (C) 2012 Samsung Electronics
9 * Jonghwa Lee <jonghwa3.lee@samsung.com>
12 #include <linux/clk.h>
13 #include <linux/crypto.h>
14 #include <linux/err.h>
16 #include <linux/module.h>
17 #include <linux/mutex.h>
18 #include <linux/of_device.h>
19 #include <linux/platform_device.h>
21 #include <crypto/internal/rng.h>
23 #define EXYNOS_RNG_CONTROL 0x0
24 #define EXYNOS_RNG_STATUS 0x10
26 #define EXYNOS_RNG_SEED_CONF 0x14
27 #define EXYNOS_RNG_GEN_PRNG BIT(1)
29 #define EXYNOS_RNG_SEED_BASE 0x140
30 #define EXYNOS_RNG_SEED(n) (EXYNOS_RNG_SEED_BASE + (n * 0x4))
31 #define EXYNOS_RNG_OUT_BASE 0x160
32 #define EXYNOS_RNG_OUT(n) (EXYNOS_RNG_OUT_BASE + (n * 0x4))
34 /* EXYNOS_RNG_CONTROL bit fields */
35 #define EXYNOS_RNG_CONTROL_START 0x18
36 /* EXYNOS_RNG_STATUS bit fields */
37 #define EXYNOS_RNG_STATUS_SEED_SETTING_DONE BIT(1)
38 #define EXYNOS_RNG_STATUS_RNG_DONE BIT(5)
40 /* Five seed and output registers, each 4 bytes */
41 #define EXYNOS_RNG_SEED_REGS 5
42 #define EXYNOS_RNG_SEED_SIZE (EXYNOS_RNG_SEED_REGS * 4)
44 enum exynos_prng_type
{
45 EXYNOS_PRNG_UNKNOWN
= 0,
51 * Driver re-seeds itself with generated random numbers to hinder
52 * backtracking of the original seed.
54 * Time for next re-seed in ms.
56 #define EXYNOS_RNG_RESEED_TIME 1000
57 #define EXYNOS_RNG_RESEED_BYTES 65536
60 * In polling mode, do not wait infinitely for the engine to finish the work.
62 #define EXYNOS_RNG_WAIT_RETRIES 100
64 /* Context for crypto */
65 struct exynos_rng_ctx
{
66 struct exynos_rng_dev
*rng
;
69 /* Device associated memory */
70 struct exynos_rng_dev
{
72 enum exynos_prng_type type
;
76 /* Generated numbers stored for seeding during resume */
77 u8 seed_save
[EXYNOS_RNG_SEED_SIZE
];
78 unsigned int seed_save_len
;
79 /* Time of last seeding in jiffies */
80 unsigned long last_seeding
;
81 /* Bytes generated since last seeding */
82 unsigned long bytes_seeding
;
85 static struct exynos_rng_dev
*exynos_rng_dev
;
87 static u32
exynos_rng_readl(struct exynos_rng_dev
*rng
, u32 offset
)
89 return readl_relaxed(rng
->mem
+ offset
);
92 static void exynos_rng_writel(struct exynos_rng_dev
*rng
, u32 val
, u32 offset
)
94 writel_relaxed(val
, rng
->mem
+ offset
);
97 static int exynos_rng_set_seed(struct exynos_rng_dev
*rng
,
98 const u8
*seed
, unsigned int slen
)
103 /* Round seed length because loop iterates over full register size */
104 slen
= ALIGN_DOWN(slen
, 4);
106 if (slen
< EXYNOS_RNG_SEED_SIZE
)
109 for (i
= 0; i
< slen
; i
+= 4) {
110 unsigned int seed_reg
= (i
/ 4) % EXYNOS_RNG_SEED_REGS
;
113 val
|= seed
[i
+ 1] << 16;
114 val
|= seed
[i
+ 2] << 8;
115 val
|= seed
[i
+ 3] << 0;
117 exynos_rng_writel(rng
, val
, EXYNOS_RNG_SEED(seed_reg
));
120 val
= exynos_rng_readl(rng
, EXYNOS_RNG_STATUS
);
121 if (!(val
& EXYNOS_RNG_STATUS_SEED_SETTING_DONE
)) {
122 dev_warn(rng
->dev
, "Seed setting not finished\n");
126 rng
->last_seeding
= jiffies
;
127 rng
->bytes_seeding
= 0;
133 * Start the engine and poll for finish. Then read from output registers
134 * filling the 'dst' buffer up to 'dlen' bytes or up to size of generated
135 * random data (EXYNOS_RNG_SEED_SIZE).
137 * On success: return 0 and store number of read bytes under 'read' address.
138 * On error: return -ERRNO.
140 static int exynos_rng_get_random(struct exynos_rng_dev
*rng
,
141 u8
*dst
, unsigned int dlen
,
144 int retry
= EXYNOS_RNG_WAIT_RETRIES
;
146 if (rng
->type
== EXYNOS_PRNG_EXYNOS4
) {
147 exynos_rng_writel(rng
, EXYNOS_RNG_CONTROL_START
,
149 } else if (rng
->type
== EXYNOS_PRNG_EXYNOS5
) {
150 exynos_rng_writel(rng
, EXYNOS_RNG_GEN_PRNG
,
151 EXYNOS_RNG_SEED_CONF
);
154 while (!(exynos_rng_readl(rng
,
155 EXYNOS_RNG_STATUS
) & EXYNOS_RNG_STATUS_RNG_DONE
) && --retry
)
161 /* Clear status bit */
162 exynos_rng_writel(rng
, EXYNOS_RNG_STATUS_RNG_DONE
,
164 *read
= min_t(size_t, dlen
, EXYNOS_RNG_SEED_SIZE
);
165 memcpy_fromio(dst
, rng
->mem
+ EXYNOS_RNG_OUT_BASE
, *read
);
166 rng
->bytes_seeding
+= *read
;
171 /* Re-seed itself from time to time */
172 static void exynos_rng_reseed(struct exynos_rng_dev
*rng
)
174 unsigned long next_seeding
= rng
->last_seeding
+ \
175 msecs_to_jiffies(EXYNOS_RNG_RESEED_TIME
);
176 unsigned long now
= jiffies
;
177 unsigned int read
= 0;
178 u8 seed
[EXYNOS_RNG_SEED_SIZE
];
180 if (time_before(now
, next_seeding
) &&
181 rng
->bytes_seeding
< EXYNOS_RNG_RESEED_BYTES
)
184 if (exynos_rng_get_random(rng
, seed
, sizeof(seed
), &read
))
187 exynos_rng_set_seed(rng
, seed
, read
);
189 /* Let others do some of their job. */
190 mutex_unlock(&rng
->lock
);
191 mutex_lock(&rng
->lock
);
194 static int exynos_rng_generate(struct crypto_rng
*tfm
,
195 const u8
*src
, unsigned int slen
,
196 u8
*dst
, unsigned int dlen
)
198 struct exynos_rng_ctx
*ctx
= crypto_rng_ctx(tfm
);
199 struct exynos_rng_dev
*rng
= ctx
->rng
;
200 unsigned int read
= 0;
203 ret
= clk_prepare_enable(rng
->clk
);
207 mutex_lock(&rng
->lock
);
209 ret
= exynos_rng_get_random(rng
, dst
, dlen
, &read
);
216 exynos_rng_reseed(rng
);
218 mutex_unlock(&rng
->lock
);
220 clk_disable_unprepare(rng
->clk
);
225 static int exynos_rng_seed(struct crypto_rng
*tfm
, const u8
*seed
,
228 struct exynos_rng_ctx
*ctx
= crypto_rng_ctx(tfm
);
229 struct exynos_rng_dev
*rng
= ctx
->rng
;
232 ret
= clk_prepare_enable(rng
->clk
);
236 mutex_lock(&rng
->lock
);
237 ret
= exynos_rng_set_seed(ctx
->rng
, seed
, slen
);
238 mutex_unlock(&rng
->lock
);
240 clk_disable_unprepare(rng
->clk
);
245 static int exynos_rng_kcapi_init(struct crypto_tfm
*tfm
)
247 struct exynos_rng_ctx
*ctx
= crypto_tfm_ctx(tfm
);
249 ctx
->rng
= exynos_rng_dev
;
254 static struct rng_alg exynos_rng_alg
= {
255 .generate
= exynos_rng_generate
,
256 .seed
= exynos_rng_seed
,
257 .seedsize
= EXYNOS_RNG_SEED_SIZE
,
259 .cra_name
= "stdrng",
260 .cra_driver_name
= "exynos_rng",
262 .cra_ctxsize
= sizeof(struct exynos_rng_ctx
),
263 .cra_module
= THIS_MODULE
,
264 .cra_init
= exynos_rng_kcapi_init
,
268 static int exynos_rng_probe(struct platform_device
*pdev
)
270 struct exynos_rng_dev
*rng
;
271 struct resource
*res
;
277 rng
= devm_kzalloc(&pdev
->dev
, sizeof(*rng
), GFP_KERNEL
);
281 rng
->type
= (enum exynos_prng_type
)of_device_get_match_data(&pdev
->dev
);
283 mutex_init(&rng
->lock
);
285 rng
->dev
= &pdev
->dev
;
286 rng
->clk
= devm_clk_get(&pdev
->dev
, "secss");
287 if (IS_ERR(rng
->clk
)) {
288 dev_err(&pdev
->dev
, "Couldn't get clock.\n");
289 return PTR_ERR(rng
->clk
);
292 res
= platform_get_resource(pdev
, IORESOURCE_MEM
, 0);
293 rng
->mem
= devm_ioremap_resource(&pdev
->dev
, res
);
294 if (IS_ERR(rng
->mem
))
295 return PTR_ERR(rng
->mem
);
297 platform_set_drvdata(pdev
, rng
);
299 exynos_rng_dev
= rng
;
301 ret
= crypto_register_rng(&exynos_rng_alg
);
304 "Couldn't register rng crypto alg: %d\n", ret
);
305 exynos_rng_dev
= NULL
;
311 static int exynos_rng_remove(struct platform_device
*pdev
)
313 crypto_unregister_rng(&exynos_rng_alg
);
315 exynos_rng_dev
= NULL
;
320 static int __maybe_unused
exynos_rng_suspend(struct device
*dev
)
322 struct exynos_rng_dev
*rng
= dev_get_drvdata(dev
);
325 /* If we were never seeded then after resume it will be the same */
326 if (!rng
->last_seeding
)
329 rng
->seed_save_len
= 0;
330 ret
= clk_prepare_enable(rng
->clk
);
334 mutex_lock(&rng
->lock
);
336 /* Get new random numbers and store them for seeding on resume. */
337 exynos_rng_get_random(rng
, rng
->seed_save
, sizeof(rng
->seed_save
),
338 &(rng
->seed_save_len
));
340 mutex_unlock(&rng
->lock
);
342 dev_dbg(rng
->dev
, "Stored %u bytes for seeding on system resume\n",
345 clk_disable_unprepare(rng
->clk
);
350 static int __maybe_unused
exynos_rng_resume(struct device
*dev
)
352 struct exynos_rng_dev
*rng
= dev_get_drvdata(dev
);
355 /* Never seeded so nothing to do */
356 if (!rng
->last_seeding
)
359 ret
= clk_prepare_enable(rng
->clk
);
363 mutex_lock(&rng
->lock
);
365 ret
= exynos_rng_set_seed(rng
, rng
->seed_save
, rng
->seed_save_len
);
367 mutex_unlock(&rng
->lock
);
369 clk_disable_unprepare(rng
->clk
);
374 static SIMPLE_DEV_PM_OPS(exynos_rng_pm_ops
, exynos_rng_suspend
,
377 static const struct of_device_id exynos_rng_dt_match
[] = {
379 .compatible
= "samsung,exynos4-rng",
380 .data
= (const void *)EXYNOS_PRNG_EXYNOS4
,
382 .compatible
= "samsung,exynos5250-prng",
383 .data
= (const void *)EXYNOS_PRNG_EXYNOS5
,
387 MODULE_DEVICE_TABLE(of
, exynos_rng_dt_match
);
389 static struct platform_driver exynos_rng_driver
= {
391 .name
= "exynos-rng",
392 .pm
= &exynos_rng_pm_ops
,
393 .of_match_table
= exynos_rng_dt_match
,
395 .probe
= exynos_rng_probe
,
396 .remove
= exynos_rng_remove
,
399 module_platform_driver(exynos_rng_driver
);
401 MODULE_DESCRIPTION("Exynos H/W Random Number Generator driver");
402 MODULE_AUTHOR("Krzysztof Kozlowski <krzk@kernel.org>");
403 MODULE_LICENSE("GPL v2");