xref: /linux/arch/arm64/include/asm/archrandom.h (revision a23e1966932464e1c5226cb9ac4ce1d5fc10ba22)
11a50ec0bSRichard Henderson /* SPDX-License-Identifier: GPL-2.0 */
21a50ec0bSRichard Henderson #ifndef _ASM_ARCHRANDOM_H
31a50ec0bSRichard Henderson #define _ASM_ARCHRANDOM_H
41a50ec0bSRichard Henderson 
538db9873SAndre Przywara #include <linux/arm-smccc.h>
6ead5084cSMark Rutland #include <linux/bug.h>
7ead5084cSMark Rutland #include <linux/kernel.h>
82c03e16fSJason A. Donenfeld #include <linux/irqflags.h>
91a50ec0bSRichard Henderson #include <asm/cpufeature.h>
101a50ec0bSRichard Henderson 
1138db9873SAndre Przywara #define ARM_SMCCC_TRNG_MIN_VERSION	0x10000UL
1238db9873SAndre Przywara 
1338db9873SAndre Przywara extern bool smccc_trng_available;
1438db9873SAndre Przywara 
smccc_probe_trng(void)15a37e31fcSAndre Przywara static inline bool __init smccc_probe_trng(void)
16a37e31fcSAndre Przywara {
1738db9873SAndre Przywara 	struct arm_smccc_res res;
1838db9873SAndre Przywara 
1938db9873SAndre Przywara 	arm_smccc_1_1_invoke(ARM_SMCCC_TRNG_VERSION, &res);
2038db9873SAndre Przywara 	if ((s32)res.a0 < 0)
21a37e31fcSAndre Przywara 		return false;
2238db9873SAndre Przywara 
2338db9873SAndre Przywara 	return res.a0 >= ARM_SMCCC_TRNG_MIN_VERSION;
24a37e31fcSAndre Przywara }
25a37e31fcSAndre Przywara 
__arm64_rndr(unsigned long * v)261a50ec0bSRichard Henderson static inline bool __arm64_rndr(unsigned long *v)
271a50ec0bSRichard Henderson {
281a50ec0bSRichard Henderson 	bool ok;
291a50ec0bSRichard Henderson 
301a50ec0bSRichard Henderson 	/*
311a50ec0bSRichard Henderson 	 * Reads of RNDR set PSTATE.NZCV to 0b0000 on success,
321a50ec0bSRichard Henderson 	 * and set PSTATE.NZCV to 0b0100 otherwise.
331a50ec0bSRichard Henderson 	 */
341a50ec0bSRichard Henderson 	asm volatile(
351a50ec0bSRichard Henderson 		__mrs_s("%0", SYS_RNDR_EL0) "\n"
361a50ec0bSRichard Henderson 	"	cset %w1, ne\n"
371a50ec0bSRichard Henderson 	: "=r" (*v), "=r" (ok)
381a50ec0bSRichard Henderson 	:
391a50ec0bSRichard Henderson 	: "cc");
401a50ec0bSRichard Henderson 
411a50ec0bSRichard Henderson 	return ok;
421a50ec0bSRichard Henderson }
431a50ec0bSRichard Henderson 
__arm64_rndrrs(unsigned long * v)4435bde68bSArd Biesheuvel static inline bool __arm64_rndrrs(unsigned long *v)
4535bde68bSArd Biesheuvel {
4635bde68bSArd Biesheuvel 	bool ok;
4735bde68bSArd Biesheuvel 
4835bde68bSArd Biesheuvel 	/*
4935bde68bSArd Biesheuvel 	 * Reads of RNDRRS set PSTATE.NZCV to 0b0000 on success,
5035bde68bSArd Biesheuvel 	 * and set PSTATE.NZCV to 0b0100 otherwise.
5135bde68bSArd Biesheuvel 	 */
5235bde68bSArd Biesheuvel 	asm volatile(
5335bde68bSArd Biesheuvel 		__mrs_s("%0", SYS_RNDRRS_EL0) "\n"
5435bde68bSArd Biesheuvel 	"	cset %w1, ne\n"
5535bde68bSArd Biesheuvel 	: "=r" (*v), "=r" (ok)
5635bde68bSArd Biesheuvel 	:
5735bde68bSArd Biesheuvel 	: "cc");
5835bde68bSArd Biesheuvel 
5935bde68bSArd Biesheuvel 	return ok;
6035bde68bSArd Biesheuvel }
6135bde68bSArd Biesheuvel 
__cpu_has_rng(void)622c03e16fSJason A. Donenfeld static __always_inline bool __cpu_has_rng(void)
632c03e16fSJason A. Donenfeld {
642c03e16fSJason A. Donenfeld 	if (unlikely(!system_capabilities_finalized() && !preemptible()))
652c03e16fSJason A. Donenfeld 		return this_cpu_has_cap(ARM64_HAS_RNG);
661963d966SMark Rutland 	return alternative_has_cap_unlikely(ARM64_HAS_RNG);
672c03e16fSJason A. Donenfeld }
682c03e16fSJason A. Donenfeld 
arch_get_random_longs(unsigned long * v,size_t max_longs)69d349ab99SJason A. Donenfeld static inline size_t __must_check arch_get_random_longs(unsigned long *v, size_t max_longs)
701a50ec0bSRichard Henderson {
7135bde68bSArd Biesheuvel 	/*
7235bde68bSArd Biesheuvel 	 * Only support the generic interface after we have detected
7335bde68bSArd Biesheuvel 	 * the system wide capability, avoiding complexity with the
7435bde68bSArd Biesheuvel 	 * cpufeature code and with potential scheduling between CPUs
7535bde68bSArd Biesheuvel 	 * with and without the feature.
7635bde68bSArd Biesheuvel 	 */
772c03e16fSJason A. Donenfeld 	if (max_longs && __cpu_has_rng() && __arm64_rndr(v))
78d349ab99SJason A. Donenfeld 		return 1;
79d349ab99SJason A. Donenfeld 	return 0;
801a50ec0bSRichard Henderson }
811a50ec0bSRichard Henderson 
arch_get_random_seed_longs(unsigned long * v,size_t max_longs)82d349ab99SJason A. Donenfeld static inline size_t __must_check arch_get_random_seed_longs(unsigned long *v, size_t max_longs)
831a50ec0bSRichard Henderson {
84d349ab99SJason A. Donenfeld 	if (!max_longs)
85d349ab99SJason A. Donenfeld 		return 0;
8638db9873SAndre Przywara 
8738db9873SAndre Przywara 	/*
8838db9873SAndre Przywara 	 * We prefer the SMCCC call, since its semantics (return actual
8938db9873SAndre Przywara 	 * hardware backed entropy) is closer to the idea behind this
9038db9873SAndre Przywara 	 * function here than what even the RNDRSS register provides
9138db9873SAndre Przywara 	 * (the output of a pseudo RNG freshly seeded by a TRNG).
9238db9873SAndre Przywara 	 */
9338db9873SAndre Przywara 	if (smccc_trng_available) {
94d349ab99SJason A. Donenfeld 		struct arm_smccc_res res;
95d349ab99SJason A. Donenfeld 
96d349ab99SJason A. Donenfeld 		max_longs = min_t(size_t, 3, max_longs);
97d349ab99SJason A. Donenfeld 		arm_smccc_1_1_invoke(ARM_SMCCC_TRNG_RND64, max_longs * 64, &res);
9838db9873SAndre Przywara 		if ((int)res.a0 >= 0) {
99d349ab99SJason A. Donenfeld 			switch (max_longs) {
100d349ab99SJason A. Donenfeld 			case 3:
101d349ab99SJason A. Donenfeld 				*v++ = res.a1;
102d349ab99SJason A. Donenfeld 				fallthrough;
103d349ab99SJason A. Donenfeld 			case 2:
104d349ab99SJason A. Donenfeld 				*v++ = res.a2;
105d349ab99SJason A. Donenfeld 				fallthrough;
106d349ab99SJason A. Donenfeld 			case 1:
107d349ab99SJason A. Donenfeld 				*v++ = res.a3;
108d349ab99SJason A. Donenfeld 				break;
109d349ab99SJason A. Donenfeld 			}
110d349ab99SJason A. Donenfeld 			return max_longs;
11138db9873SAndre Przywara 		}
11238db9873SAndre Przywara 	}
11338db9873SAndre Przywara 
1141a50ec0bSRichard Henderson 	/*
11535bde68bSArd Biesheuvel 	 * RNDRRS is not backed by an entropy source but by a DRBG that is
11635bde68bSArd Biesheuvel 	 * reseeded after each invocation. This is not a 100% fit but good
11735bde68bSArd Biesheuvel 	 * enough to implement this API if no other entropy source exists.
1181a50ec0bSRichard Henderson 	 */
1192c03e16fSJason A. Donenfeld 	if (__cpu_has_rng() && __arm64_rndrrs(v))
120d349ab99SJason A. Donenfeld 		return 1;
12138db9873SAndre Przywara 
122d349ab99SJason A. Donenfeld 	return 0;
1231a50ec0bSRichard Henderson }
1241a50ec0bSRichard Henderson 
__early_cpu_has_rndr(void)1252e8e1ea8SMark Brown static inline bool __init __early_cpu_has_rndr(void)
1262e8e1ea8SMark Brown {
1272e8e1ea8SMark Brown 	/* Open code as we run prior to the first call to cpufeature. */
1282e8e1ea8SMark Brown 	unsigned long ftr = read_sysreg_s(SYS_ID_AA64ISAR0_EL1);
1290eda2ec4SMark Brown 	return (ftr >> ID_AA64ISAR0_EL1_RNDR_SHIFT) & 0xf;
1302e8e1ea8SMark Brown }
1312e8e1ea8SMark Brown 
1321a50ec0bSRichard Henderson #endif /* _ASM_ARCHRANDOM_H */
133