]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - include/linux/random.h
ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion()
[mirror_ubuntu-bionic-kernel.git] / include / linux / random.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2/*
3 * include/linux/random.h
4 *
5 * Include file for the random number generator.
6 */
1da177e4
LT
7#ifndef _LINUX_RANDOM_H
8#define _LINUX_RANDOM_H
9
205a525c 10#include <linux/list.h>
897ece56
DB
11#include <linux/once.h>
12
607ca46e 13#include <uapi/linux/random.h>
1da177e4 14
205a525c
HX
15struct random_ready_callback {
16 struct list_head list;
17 void (*func)(struct random_ready_callback *rdy);
18 struct module *owner;
19};
20
a2080a67 21extern void add_device_randomness(const void *, unsigned int);
38addce8
ER
22
23#if defined(CONFIG_GCC_PLUGIN_LATENT_ENTROPY) && !defined(__CHECKER__)
24static inline void add_latent_entropy(void)
25{
26 add_device_randomness((const void *)&latent_entropy,
27 sizeof(latent_entropy));
28}
29#else
30static inline void add_latent_entropy(void) {}
31#endif
32
1da177e4 33extern void add_input_randomness(unsigned int type, unsigned int code,
0766f788
ER
34 unsigned int value) __latent_entropy;
35extern void add_interrupt_randomness(int irq, int irq_flags) __latent_entropy;
1da177e4
LT
36
37extern void get_random_bytes(void *buf, int nbytes);
e297a783 38extern int wait_for_random_bytes(void);
205a525c
HX
39extern int add_random_ready_callback(struct random_ready_callback *rdy);
40extern void del_random_ready_callback(struct random_ready_callback *rdy);
c2557a30 41extern void get_random_bytes_arch(void *buf, int nbytes);
1da177e4 42
1da177e4 43#ifndef MODULE
54047320 44extern const struct file_operations random_fops, urandom_fops;
1da177e4
LT
45#endif
46
c440408c
JD
47u32 get_random_u32(void);
48u64 get_random_u64(void);
49static inline unsigned int get_random_int(void)
50{
51 return get_random_u32();
52}
53static inline unsigned long get_random_long(void)
54{
55#if BITS_PER_LONG == 64
56 return get_random_u64();
57#else
58 return get_random_u32();
59#endif
60}
61
022c2040
RR
62/*
63 * On 64-bit architectures, protect against non-terminated C string overflows
64 * by zeroing out the first byte of the canary; this leaves 56 bits of entropy.
65 */
66#ifdef CONFIG_64BIT
67# ifdef __LITTLE_ENDIAN
68# define CANARY_MASK 0xffffffffffffff00UL
69# else /* big endian, 64 bits: */
70# define CANARY_MASK 0x00ffffffffffffffUL
71# endif
72#else /* 32 bits: */
73# define CANARY_MASK 0xffffffffUL
74#endif
75
76static inline unsigned long get_random_canary(void)
77{
78 unsigned long val = get_random_long();
79
80 return val & CANARY_MASK;
81}
82
da9ba564
JD
83/* Calls wait_for_random_bytes() and then calls get_random_bytes(buf, nbytes).
84 * Returns the result of the call to wait_for_random_bytes. */
85static inline int get_random_bytes_wait(void *buf, int nbytes)
86{
87 int ret = wait_for_random_bytes();
88 if (unlikely(ret))
89 return ret;
90 get_random_bytes(buf, nbytes);
91 return 0;
92}
93
94#define declare_get_random_var_wait(var) \
95 static inline int get_random_ ## var ## _wait(var *out) { \
96 int ret = wait_for_random_bytes(); \
97 if (unlikely(ret)) \
98 return ret; \
99 *out = get_random_ ## var(); \
100 return 0; \
101 }
102declare_get_random_var_wait(u32)
103declare_get_random_var_wait(u64)
104declare_get_random_var_wait(int)
105declare_get_random_var_wait(long)
106#undef declare_get_random_var
107
99fdafde 108unsigned long randomize_page(unsigned long start, unsigned long range);
1da177e4 109
496f2f93 110u32 prandom_u32(void);
a98406e2 111void prandom_bytes(void *buf, size_t nbytes);
496f2f93 112void prandom_seed(u32 seed);
4af712e8 113void prandom_reseed_late(void);
aaa248f6 114
38e9efcd 115struct rnd_state {
a98814ce 116 __u32 s1, s2, s3, s4;
38e9efcd
DB
117};
118
a98814ce 119u32 prandom_u32_state(struct rnd_state *state);
a98406e2 120void prandom_bytes_state(struct rnd_state *state, void *buf, size_t nbytes);
897ece56
DB
121void prandom_seed_full_state(struct rnd_state __percpu *pcpu_state);
122
123#define prandom_init_once(pcpu_state) \
124 DO_ONCE(prandom_seed_full_state, (pcpu_state))
5960164f 125
f337db64
DB
126/**
127 * prandom_u32_max - returns a pseudo-random number in interval [0, ep_ro)
128 * @ep_ro: right open interval endpoint
129 *
130 * Returns a pseudo-random number that is in interval [0, ep_ro). Note
131 * that the result depends on PRNG being well distributed in [0, ~0U]
132 * u32 space. Here we use maximally equidistributed combined Tausworthe
133 * generator, that is, prandom_u32(). This is useful when requesting a
134 * random index of an array containing ep_ro elements, for example.
135 *
136 * Returns: pseudo-random number in interval [0, ep_ro)
137 */
138static inline u32 prandom_u32_max(u32 ep_ro)
139{
140 return (u32)(((u64) prandom_u32() * ep_ro) >> 32);
141}
142
5960164f
JE
143/*
144 * Handle minimum values for seeds
145 */
146static inline u32 __seed(u32 x, u32 m)
147{
148 return (x < m) ? x + m : x;
149}
150
151/**
496f2f93 152 * prandom_seed_state - set seed for prandom_u32_state().
5960164f
JE
153 * @state: pointer to state structure to receive the seed.
154 * @seed: arbitrary 64-bit value to use as a seed.
155 */
496f2f93 156static inline void prandom_seed_state(struct rnd_state *state, u64 seed)
5960164f
JE
157{
158 u32 i = (seed >> 32) ^ (seed << 10) ^ seed;
159
a98814ce
DB
160 state->s1 = __seed(i, 2U);
161 state->s2 = __seed(i, 8U);
162 state->s3 = __seed(i, 16U);
163 state->s4 = __seed(i, 128U);
5960164f
JE
164}
165
63d77173
PA
166#ifdef CONFIG_ARCH_RANDOM
167# include <asm/archrandom.h>
168#else
117780ee 169static inline bool arch_get_random_long(unsigned long *v)
63d77173
PA
170{
171 return 0;
172}
117780ee 173static inline bool arch_get_random_int(unsigned int *v)
63d77173
PA
174{
175 return 0;
176}
117780ee 177static inline bool arch_has_random(void)
7b878d4b
PA
178{
179 return 0;
180}
117780ee 181static inline bool arch_get_random_seed_long(unsigned long *v)
d20f78d2
PA
182{
183 return 0;
184}
117780ee 185static inline bool arch_get_random_seed_int(unsigned int *v)
d20f78d2
PA
186{
187 return 0;
188}
117780ee 189static inline bool arch_has_random_seed(void)
7b878d4b
PA
190{
191 return 0;
192}
63d77173
PA
193#endif
194
055dc21a
TH
195/* Pseudo random number generator from numerical recipes. */
196static inline u32 next_pseudo_random32(u32 seed)
197{
198 return seed * 1664525 + 1013904223;
199}
200
1da177e4 201#endif /* _LINUX_RANDOM_H */