]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/char/hw_random/core.c
sched/headers: Prepare to move signal wakeup & sigpending methods from <linux/sched...
[mirror_ubuntu-artful-kernel.git] / drivers / char / hw_random / core.c
CommitLineData
844dd05f 1/*
dd801483
CL
2 * hw_random/core.c: HWRNG core API
3 *
4 * Copyright 2006 Michael Buesch <m@bues.ch>
5 * Copyright 2005 (c) MontaVista Software, Inc.
6 *
7 * Please read Documentation/hw_random.txt for details on use.
8 *
9 * This software may be used and distributed according to the terms
10 * of the GNU General Public License, incorporated herein by reference.
844dd05f
MB
11 */
12
affdec58 13#include <linux/delay.h>
844dd05f 14#include <linux/device.h>
affdec58
CL
15#include <linux/err.h>
16#include <linux/fs.h>
844dd05f 17#include <linux/hw_random.h>
844dd05f 18#include <linux/kernel.h>
be4000bc 19#include <linux/kthread.h>
174cd4b1 20#include <linux/sched/signal.h>
affdec58
CL
21#include <linux/miscdevice.h>
22#include <linux/module.h>
d9e79726 23#include <linux/random.h>
affdec58
CL
24#include <linux/sched.h>
25#include <linux/slab.h>
7c0f6ba6 26#include <linux/uaccess.h>
844dd05f 27
844dd05f 28#define RNG_MODULE_NAME "hw_random"
844dd05f
MB
29
30static struct hwrng *current_rng;
be4000bc 31static struct task_struct *hwrng_fill;
844dd05f 32static LIST_HEAD(rng_list);
9372b35e 33/* Protects rng_list and current_rng */
844dd05f 34static DEFINE_MUTEX(rng_mutex);
9372b35e
RR
35/* Protects rng read functions, data_avail, rng_buffer and rng_fillbuf */
36static DEFINE_MUTEX(reading_mutex);
9996508b 37static int data_avail;
be4000bc 38static u8 *rng_buffer, *rng_fillbuf;
0f734e6e
TD
39static unsigned short current_quality;
40static unsigned short default_quality; /* = 0; default to "off" */
be4000bc
TD
41
42module_param(current_quality, ushort, 0644);
43MODULE_PARM_DESC(current_quality,
44 "current hwrng entropy estimation per mill");
0f734e6e
TD
45module_param(default_quality, ushort, 0644);
46MODULE_PARM_DESC(default_quality,
47 "default entropy content of hwrng per mill");
be4000bc 48
ff77c150 49static void drop_current_rng(void);
90ac41bd 50static int hwrng_init(struct hwrng *rng);
be4000bc 51static void start_khwrngd(void);
f7f154f1 52
d3cc7996
AS
53static inline int rng_get_data(struct hwrng *rng, u8 *buffer, size_t size,
54 int wait);
55
f7f154f1
RR
56static size_t rng_buffer_size(void)
57{
58 return SMP_CACHE_BYTES < 32 ? 32 : SMP_CACHE_BYTES;
59}
844dd05f 60
d3cc7996
AS
61static void add_early_randomness(struct hwrng *rng)
62{
d3cc7996 63 int bytes_read;
6d4952d9 64 size_t size = min_t(size_t, 16, rng_buffer_size());
d3cc7996 65
9372b35e 66 mutex_lock(&reading_mutex);
6d4952d9 67 bytes_read = rng_get_data(rng, rng_buffer, size, 1);
9372b35e 68 mutex_unlock(&reading_mutex);
d3cc7996 69 if (bytes_read > 0)
6d4952d9 70 add_device_randomness(rng_buffer, bytes_read);
d3cc7996
AS
71}
72
3a2c0ba5
RR
73static inline void cleanup_rng(struct kref *kref)
74{
75 struct hwrng *rng = container_of(kref, struct hwrng, ref);
76
77 if (rng->cleanup)
78 rng->cleanup(rng);
a027f30d 79
77584ee5 80 complete(&rng->cleanup_done);
3a2c0ba5
RR
81}
82
90ac41bd 83static int set_current_rng(struct hwrng *rng)
3a2c0ba5 84{
90ac41bd
HX
85 int err;
86
3a2c0ba5 87 BUG_ON(!mutex_is_locked(&rng_mutex));
90ac41bd
HX
88
89 err = hwrng_init(rng);
90 if (err)
91 return err;
92
ff77c150 93 drop_current_rng();
3a2c0ba5 94 current_rng = rng;
90ac41bd
HX
95
96 return 0;
3a2c0ba5
RR
97}
98
99static void drop_current_rng(void)
100{
101 BUG_ON(!mutex_is_locked(&rng_mutex));
102 if (!current_rng)
103 return;
104
105 /* decrease last reference for triggering the cleanup */
106 kref_put(&current_rng->ref, cleanup_rng);
107 current_rng = NULL;
108}
109
110/* Returns ERR_PTR(), NULL or refcounted hwrng */
111static struct hwrng *get_current_rng(void)
112{
113 struct hwrng *rng;
114
115 if (mutex_lock_interruptible(&rng_mutex))
116 return ERR_PTR(-ERESTARTSYS);
117
118 rng = current_rng;
119 if (rng)
120 kref_get(&rng->ref);
121
122 mutex_unlock(&rng_mutex);
123 return rng;
124}
125
126static void put_rng(struct hwrng *rng)
127{
128 /*
129 * Hold rng_mutex here so we serialize in case they set_current_rng
130 * on rng again immediately.
131 */
132 mutex_lock(&rng_mutex);
133 if (rng)
134 kref_put(&rng->ref, cleanup_rng);
135 mutex_unlock(&rng_mutex);
136}
137
90ac41bd 138static int hwrng_init(struct hwrng *rng)
844dd05f 139{
15b66cd5
HX
140 if (kref_get_unless_zero(&rng->ref))
141 goto skip_init;
142
d3cc7996
AS
143 if (rng->init) {
144 int ret;
145
146 ret = rng->init(rng);
147 if (ret)
148 return ret;
149 }
15b66cd5
HX
150
151 kref_init(&rng->ref);
152 reinit_completion(&rng->cleanup_done);
153
154skip_init:
d3cc7996 155 add_early_randomness(rng);
be4000bc 156
0f734e6e 157 current_quality = rng->quality ? : default_quality;
506bf0c0
KP
158 if (current_quality > 1024)
159 current_quality = 1024;
0f734e6e
TD
160
161 if (current_quality == 0 && hwrng_fill)
162 kthread_stop(hwrng_fill);
be4000bc
TD
163 if (current_quality > 0 && !hwrng_fill)
164 start_khwrngd();
165
d3cc7996 166 return 0;
844dd05f
MB
167}
168
844dd05f
MB
169static int rng_dev_open(struct inode *inode, struct file *filp)
170{
171 /* enforce read-only access to this chrdev */
172 if ((filp->f_mode & FMODE_READ) == 0)
173 return -EINVAL;
174 if (filp->f_mode & FMODE_WRITE)
175 return -EINVAL;
176 return 0;
177}
178
9996508b
IM
179static inline int rng_get_data(struct hwrng *rng, u8 *buffer, size_t size,
180 int wait) {
181 int present;
182
9372b35e 183 BUG_ON(!mutex_is_locked(&reading_mutex));
9996508b
IM
184 if (rng->read)
185 return rng->read(rng, (void *)buffer, size, wait);
186
187 if (rng->data_present)
188 present = rng->data_present(rng, wait);
189 else
190 present = 1;
191
192 if (present)
193 return rng->data_read(rng, (u32 *)buffer);
194
195 return 0;
196}
197
844dd05f
MB
198static ssize_t rng_dev_read(struct file *filp, char __user *buf,
199 size_t size, loff_t *offp)
200{
844dd05f 201 ssize_t ret = 0;
984e976f 202 int err = 0;
9996508b 203 int bytes_read, len;
3a2c0ba5 204 struct hwrng *rng;
844dd05f
MB
205
206 while (size) {
3a2c0ba5
RR
207 rng = get_current_rng();
208 if (IS_ERR(rng)) {
209 err = PTR_ERR(rng);
844dd05f 210 goto out;
9996508b 211 }
3a2c0ba5 212 if (!rng) {
844dd05f 213 err = -ENODEV;
3a2c0ba5 214 goto out;
844dd05f 215 }
984e976f 216
1ab87298
JS
217 if (mutex_lock_interruptible(&reading_mutex)) {
218 err = -ERESTARTSYS;
219 goto out_put;
220 }
9996508b 221 if (!data_avail) {
3a2c0ba5 222 bytes_read = rng_get_data(rng, rng_buffer,
f7f154f1 223 rng_buffer_size(),
9996508b
IM
224 !(filp->f_flags & O_NONBLOCK));
225 if (bytes_read < 0) {
226 err = bytes_read;
9372b35e 227 goto out_unlock_reading;
9996508b
IM
228 }
229 data_avail = bytes_read;
893f1128 230 }
844dd05f 231
9996508b
IM
232 if (!data_avail) {
233 if (filp->f_flags & O_NONBLOCK) {
234 err = -EAGAIN;
9372b35e 235 goto out_unlock_reading;
9996508b
IM
236 }
237 } else {
238 len = data_avail;
239 if (len > size)
240 len = size;
241
242 data_avail -= len;
243
244 if (copy_to_user(buf + ret, rng_buffer + data_avail,
245 len)) {
246 err = -EFAULT;
9372b35e 247 goto out_unlock_reading;
9996508b
IM
248 }
249
250 size -= len;
251 ret += len;
844dd05f
MB
252 }
253
9372b35e 254 mutex_unlock(&reading_mutex);
3a2c0ba5 255 put_rng(rng);
9996508b 256
844dd05f
MB
257 if (need_resched())
258 schedule_timeout_interruptible(1);
9996508b
IM
259
260 if (signal_pending(current)) {
261 err = -ERESTARTSYS;
844dd05f 262 goto out;
9996508b 263 }
844dd05f
MB
264 }
265out:
266 return ret ? : err;
3a2c0ba5 267
9372b35e
RR
268out_unlock_reading:
269 mutex_unlock(&reading_mutex);
1ab87298 270out_put:
3a2c0ba5
RR
271 put_rng(rng);
272 goto out;
844dd05f
MB
273}
274
62322d25 275static const struct file_operations rng_chrdev_ops = {
844dd05f
MB
276 .owner = THIS_MODULE,
277 .open = rng_dev_open,
278 .read = rng_dev_read,
6038f373 279 .llseek = noop_llseek,
844dd05f
MB
280};
281
0daa7a0a
TI
282static const struct attribute_group *rng_dev_groups[];
283
844dd05f 284static struct miscdevice rng_miscdev = {
fd50d71f 285 .minor = HWRNG_MINOR,
844dd05f 286 .name = RNG_MODULE_NAME,
e454cea2 287 .nodename = "hwrng",
844dd05f 288 .fops = &rng_chrdev_ops,
0daa7a0a 289 .groups = rng_dev_groups,
844dd05f
MB
290};
291
94fbcded
GKH
292static ssize_t hwrng_attr_current_store(struct device *dev,
293 struct device_attribute *attr,
844dd05f
MB
294 const char *buf, size_t len)
295{
296 int err;
297 struct hwrng *rng;
298
299 err = mutex_lock_interruptible(&rng_mutex);
300 if (err)
301 return -ERESTARTSYS;
302 err = -ENODEV;
303 list_for_each_entry(rng, &rng_list, list) {
d9a53b01 304 if (sysfs_streq(rng->name, buf)) {
844dd05f 305 err = 0;
90ac41bd
HX
306 if (rng != current_rng)
307 err = set_current_rng(rng);
844dd05f
MB
308 break;
309 }
310 }
311 mutex_unlock(&rng_mutex);
312
313 return err ? : len;
314}
315
94fbcded
GKH
316static ssize_t hwrng_attr_current_show(struct device *dev,
317 struct device_attribute *attr,
844dd05f
MB
318 char *buf)
319{
844dd05f 320 ssize_t ret;
3a2c0ba5 321 struct hwrng *rng;
844dd05f 322
3a2c0ba5
RR
323 rng = get_current_rng();
324 if (IS_ERR(rng))
325 return PTR_ERR(rng);
326
327 ret = snprintf(buf, PAGE_SIZE, "%s\n", rng ? rng->name : "none");
328 put_rng(rng);
844dd05f
MB
329
330 return ret;
331}
332
94fbcded
GKH
333static ssize_t hwrng_attr_available_show(struct device *dev,
334 struct device_attribute *attr,
844dd05f
MB
335 char *buf)
336{
337 int err;
844dd05f
MB
338 struct hwrng *rng;
339
340 err = mutex_lock_interruptible(&rng_mutex);
341 if (err)
342 return -ERESTARTSYS;
343 buf[0] = '\0';
344 list_for_each_entry(rng, &rng_list, list) {
61daf055
RS
345 strlcat(buf, rng->name, PAGE_SIZE);
346 strlcat(buf, " ", PAGE_SIZE);
844dd05f 347 }
61daf055 348 strlcat(buf, "\n", PAGE_SIZE);
844dd05f
MB
349 mutex_unlock(&rng_mutex);
350
61daf055 351 return strlen(buf);
844dd05f
MB
352}
353
94fbcded
GKH
354static DEVICE_ATTR(rng_current, S_IRUGO | S_IWUSR,
355 hwrng_attr_current_show,
356 hwrng_attr_current_store);
357static DEVICE_ATTR(rng_available, S_IRUGO,
358 hwrng_attr_available_show,
359 NULL);
844dd05f 360
0daa7a0a
TI
361static struct attribute *rng_dev_attrs[] = {
362 &dev_attr_rng_current.attr,
363 &dev_attr_rng_available.attr,
364 NULL
365};
366
367ATTRIBUTE_GROUPS(rng_dev);
844dd05f 368
ac3a497f 369static void __exit unregister_miscdev(void)
844dd05f 370{
b844eba2 371 misc_deregister(&rng_miscdev);
844dd05f
MB
372}
373
ac3a497f 374static int __init register_miscdev(void)
844dd05f 375{
0daa7a0a 376 return misc_register(&rng_miscdev);
844dd05f
MB
377}
378
be4000bc
TD
379static int hwrng_fillfn(void *unused)
380{
381 long rc;
382
383 while (!kthread_should_stop()) {
3a2c0ba5
RR
384 struct hwrng *rng;
385
386 rng = get_current_rng();
387 if (IS_ERR(rng) || !rng)
be4000bc 388 break;
9372b35e 389 mutex_lock(&reading_mutex);
3a2c0ba5 390 rc = rng_get_data(rng, rng_fillbuf,
be4000bc 391 rng_buffer_size(), 1);
9372b35e 392 mutex_unlock(&reading_mutex);
3a2c0ba5 393 put_rng(rng);
be4000bc
TD
394 if (rc <= 0) {
395 pr_warn("hwrng: no data available\n");
396 msleep_interruptible(10000);
397 continue;
398 }
9372b35e 399 /* Outside lock, sure, but y'know: randomness. */
be4000bc 400 add_hwgenerator_randomness((void *)rng_fillbuf, rc,
e02b8765 401 rc * current_quality * 8 >> 10);
be4000bc 402 }
9dda727d 403 hwrng_fill = NULL;
be4000bc
TD
404 return 0;
405}
406
407static void start_khwrngd(void)
408{
409 hwrng_fill = kthread_run(hwrng_fillfn, NULL, "hwrng");
17fb874d 410 if (IS_ERR(hwrng_fill)) {
be4000bc
TD
411 pr_err("hwrng_fill thread creation failed");
412 hwrng_fill = NULL;
413 }
414}
415
844dd05f
MB
416int hwrng_register(struct hwrng *rng)
417{
844dd05f
MB
418 int err = -EINVAL;
419 struct hwrng *old_rng, *tmp;
420
2a971e3b 421 if (!rng->name || (!rng->data_read && !rng->read))
844dd05f
MB
422 goto out;
423
424 mutex_lock(&rng_mutex);
844dd05f
MB
425 /* Must not register two RNGs with the same name. */
426 err = -EEXIST;
427 list_for_each_entry(tmp, &rng_list, list) {
428 if (strcmp(tmp->name, rng->name) == 0)
429 goto out_unlock;
430 }
431
15b66cd5
HX
432 init_completion(&rng->cleanup_done);
433 complete(&rng->cleanup_done);
434
844dd05f 435 old_rng = current_rng;
ebbbfa24 436 err = 0;
844dd05f 437 if (!old_rng) {
90ac41bd 438 err = set_current_rng(rng);
844dd05f
MB
439 if (err)
440 goto out_unlock;
844dd05f 441 }
844dd05f 442 list_add_tail(&rng->list, &rng_list);
d9e79726 443
d3cc7996
AS
444 if (old_rng && !rng->init) {
445 /*
446 * Use a new device's input to add some randomness to
447 * the system. If this rng device isn't going to be
448 * used right away, its init function hasn't been
449 * called yet; so only use the randomness from devices
450 * that don't need an init callback.
451 */
452 add_early_randomness(rng);
453 }
454
844dd05f
MB
455out_unlock:
456 mutex_unlock(&rng_mutex);
457out:
458 return err;
459}
460EXPORT_SYMBOL_GPL(hwrng_register);
461
b844eba2 462void hwrng_unregister(struct hwrng *rng)
844dd05f 463{
844dd05f
MB
464 mutex_lock(&rng_mutex);
465
466 list_del(&rng->list);
467 if (current_rng == rng) {
3a2c0ba5
RR
468 drop_current_rng();
469 if (!list_empty(&rng_list)) {
470 struct hwrng *tail;
471
472 tail = list_entry(rng_list.prev, struct hwrng, list);
473
90ac41bd 474 set_current_rng(tail);
844dd05f
MB
475 }
476 }
3a2c0ba5 477
be4000bc 478 if (list_empty(&rng_list)) {
1dacb395 479 mutex_unlock(&rng_mutex);
be4000bc
TD
480 if (hwrng_fill)
481 kthread_stop(hwrng_fill);
1dacb395
AK
482 } else
483 mutex_unlock(&rng_mutex);
a027f30d 484
77584ee5 485 wait_for_completion(&rng->cleanup_done);
844dd05f 486}
b844eba2 487EXPORT_SYMBOL_GPL(hwrng_unregister);
844dd05f 488
4d9b519c
DT
489static void devm_hwrng_release(struct device *dev, void *res)
490{
491 hwrng_unregister(*(struct hwrng **)res);
492}
493
494static int devm_hwrng_match(struct device *dev, void *res, void *data)
495{
496 struct hwrng **r = res;
497
498 if (WARN_ON(!r || !*r))
499 return 0;
500
501 return *r == data;
502}
503
504int devm_hwrng_register(struct device *dev, struct hwrng *rng)
505{
506 struct hwrng **ptr;
507 int error;
508
509 ptr = devres_alloc(devm_hwrng_release, sizeof(*ptr), GFP_KERNEL);
510 if (!ptr)
511 return -ENOMEM;
512
513 error = hwrng_register(rng);
514 if (error) {
515 devres_free(ptr);
516 return error;
517 }
518
519 *ptr = rng;
520 devres_add(dev, ptr);
521 return 0;
522}
523EXPORT_SYMBOL_GPL(devm_hwrng_register);
524
525void devm_hwrng_unregister(struct device *dev, struct hwrng *rng)
526{
527 devres_release(dev, devm_hwrng_release, devm_hwrng_match, rng);
528}
529EXPORT_SYMBOL_GPL(devm_hwrng_unregister);
530
ac3a497f
HX
531static int __init hwrng_modinit(void)
532{
58b022ac
PM
533 int ret = -ENOMEM;
534
535 /* kmalloc makes this safe for virt_to_page() in virtio_rng.c */
536 rng_buffer = kmalloc(rng_buffer_size(), GFP_KERNEL);
537 if (!rng_buffer)
538 return -ENOMEM;
539
540 rng_fillbuf = kmalloc(rng_buffer_size(), GFP_KERNEL);
541 if (!rng_fillbuf) {
542 kfree(rng_buffer);
543 return -ENOMEM;
544 }
545
546 ret = register_miscdev();
547 if (ret) {
548 kfree(rng_fillbuf);
549 kfree(rng_buffer);
550 }
551
552 return ret;
ac3a497f
HX
553}
554
555static void __exit hwrng_modexit(void)
b7d44d94
ST
556{
557 mutex_lock(&rng_mutex);
558 BUG_ON(current_rng);
559 kfree(rng_buffer);
be4000bc 560 kfree(rng_fillbuf);
b7d44d94 561 mutex_unlock(&rng_mutex);
ac3a497f
HX
562
563 unregister_miscdev();
b7d44d94
ST
564}
565
ac3a497f
HX
566module_init(hwrng_modinit);
567module_exit(hwrng_modexit);
844dd05f
MB
568
569MODULE_DESCRIPTION("H/W Random Number Generator (RNG) driver");
570MODULE_LICENSE("GPL");