blob: 6148b8d1ccf34e448abf0378b4ede1732fe65528 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Jason A. Donenfeld6071a6c2022-02-11 12:28:33 +01002
Linus Torvalds1da177e2005-04-16 15:20:36 -07003#ifndef _LINUX_RANDOM_H
4#define _LINUX_RANDOM_H
5
Mark Rutland253d3192020-02-10 13:00:13 +00006#include <linux/bug.h>
7#include <linux/kernel.h>
Herbert Xu205a5252015-06-09 18:19:39 +08008#include <linux/list.h>
Daniel Borkmann897ece52015-10-08 01:20:38 +02009#include <linux/once.h>
10
David Howells607ca462012-10-13 10:46:48 +010011#include <uapi/linux/random.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012
Herbert Xu205a5252015-06-09 18:19:39 +080013struct random_ready_callback {
14 struct list_head list;
15 void (*func)(struct random_ready_callback *rdy);
16 struct module *owner;
17};
18
Jason A. Donenfeld04ec96b2022-02-09 14:43:25 +010019extern void add_device_randomness(const void *, size_t);
20extern void add_bootloader_randomness(const void *, size_t);
Emese Revfy38addce2016-06-20 20:41:19 +020021
Vasily Gorbik7e756f42019-05-07 16:28:15 +020022#if defined(LATENT_ENTROPY_PLUGIN) && !defined(__CHECKER__)
Emese Revfy38addce2016-06-20 20:41:19 +020023static inline void add_latent_entropy(void)
24{
25 add_device_randomness((const void *)&latent_entropy,
26 sizeof(latent_entropy));
27}
28#else
29static inline void add_latent_entropy(void) {}
30#endif
31
Linus Torvalds1da177e2005-04-16 15:20:36 -070032extern void add_input_randomness(unsigned int type, unsigned int code,
Emese Revfy0766f782016-06-20 20:42:34 +020033 unsigned int value) __latent_entropy;
Sebastian Andrzej Siewior703f7062021-12-07 13:17:33 +010034extern void add_interrupt_randomness(int irq) __latent_entropy;
Jason A. Donenfeldb777c382022-02-13 16:17:01 +010035extern void add_hwgenerator_randomness(const void *buffer, size_t count,
36 size_t entropy);
Linus Torvalds1da177e2005-04-16 15:20:36 -070037
Jason A. Donenfeld04ec96b2022-02-09 14:43:25 +010038extern void get_random_bytes(void *buf, size_t nbytes);
Jason A. Donenfelde297a782017-06-07 19:58:56 -040039extern int wait_for_random_bytes(void);
Kees Cookd5553522019-04-19 23:27:05 -040040extern int __init rand_initialize(void);
Jason A. Donenfeld9a472492018-07-31 21:11:00 +020041extern bool rng_is_initialized(void);
Herbert Xu205a5252015-06-09 18:19:39 +080042extern int add_random_ready_callback(struct random_ready_callback *rdy);
43extern void del_random_ready_callback(struct random_ready_callback *rdy);
Jason A. Donenfeld04ec96b2022-02-09 14:43:25 +010044extern size_t __must_check get_random_bytes_arch(void *buf, size_t nbytes);
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Linus Torvalds1da177e2005-04-16 15:20:36 -070046#ifndef MODULE
Arjan van de Ven54047322007-02-12 00:55:28 -080047extern const struct file_operations random_fops, urandom_fops;
Linus Torvalds1da177e2005-04-16 15:20:36 -070048#endif
49
Jason A. Donenfeldc4404082017-01-22 16:34:08 +010050u32 get_random_u32(void);
51u64 get_random_u64(void);
52static inline unsigned int get_random_int(void)
53{
54 return get_random_u32();
55}
56static inline unsigned long get_random_long(void)
57{
58#if BITS_PER_LONG == 64
59 return get_random_u64();
60#else
61 return get_random_u32();
62#endif
63}
64
Rik van Riel022c2042017-07-12 14:36:17 -070065/*
66 * On 64-bit architectures, protect against non-terminated C string overflows
67 * by zeroing out the first byte of the canary; this leaves 56 bits of entropy.
68 */
69#ifdef CONFIG_64BIT
70# ifdef __LITTLE_ENDIAN
71# define CANARY_MASK 0xffffffffffffff00UL
72# else /* big endian, 64 bits: */
73# define CANARY_MASK 0x00ffffffffffffffUL
74# endif
75#else /* 32 bits: */
76# define CANARY_MASK 0xffffffffUL
77#endif
78
79static inline unsigned long get_random_canary(void)
80{
81 unsigned long val = get_random_long();
82
83 return val & CANARY_MASK;
84}
85
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040086/* Calls wait_for_random_bytes() and then calls get_random_bytes(buf, nbytes).
87 * Returns the result of the call to wait_for_random_bytes. */
Jason A. Donenfeld04ec96b2022-02-09 14:43:25 +010088static inline int get_random_bytes_wait(void *buf, size_t nbytes)
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040089{
90 int ret = wait_for_random_bytes();
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040091 get_random_bytes(buf, nbytes);
Jason A. Donenfeld25e3fca2018-02-04 23:07:46 +010092 return ret;
Jason A. Donenfeldda9ba562017-06-07 20:05:02 -040093}
94
95#define declare_get_random_var_wait(var) \
96 static inline int get_random_ ## var ## _wait(var *out) { \
97 int ret = wait_for_random_bytes(); \
98 if (unlikely(ret)) \
99 return ret; \
100 *out = get_random_ ## var(); \
101 return 0; \
102 }
103declare_get_random_var_wait(u32)
104declare_get_random_var_wait(u64)
105declare_get_random_var_wait(int)
106declare_get_random_var_wait(long)
107#undef declare_get_random_var
108
Jason Cooper99fdafd2016-10-11 13:53:52 -0700109unsigned long randomize_page(unsigned long start, unsigned long range);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110
Joe Eykholt59601642010-05-26 14:44:13 -0700111/*
Linus Torvaldsc0842fb2020-07-31 07:51:14 +0200112 * This is designed to be standalone for just prandom
113 * users, but for now we include it from <linux/random.h>
114 * for legacy reasons.
Joe Eykholt59601642010-05-26 14:44:13 -0700115 */
Linus Torvaldsc0842fb2020-07-31 07:51:14 +0200116#include <linux/prandom.h>
Joe Eykholt59601642010-05-26 14:44:13 -0700117
H. Peter Anvin63d77172011-07-31 13:54:50 -0700118#ifdef CONFIG_ARCH_RANDOM
119# include <asm/archrandom.h>
120#else
Richard Henderson904caa62020-01-10 14:54:18 +0000121static inline bool __must_check arch_get_random_long(unsigned long *v)
H. Peter Anvin63d77172011-07-31 13:54:50 -0700122{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000123 return false;
H. Peter Anvin63d77172011-07-31 13:54:50 -0700124}
Richard Henderson904caa62020-01-10 14:54:18 +0000125static inline bool __must_check arch_get_random_int(unsigned int *v)
H. Peter Anvin63d77172011-07-31 13:54:50 -0700126{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000127 return false;
H. Peter Anvin63d77172011-07-31 13:54:50 -0700128}
Richard Henderson904caa62020-01-10 14:54:18 +0000129static inline bool __must_check arch_get_random_seed_long(unsigned long *v)
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700130{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000131 return false;
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700132}
Richard Henderson904caa62020-01-10 14:54:18 +0000133static inline bool __must_check arch_get_random_seed_int(unsigned int *v)
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700134{
Richard Henderson66f5ae82020-01-10 14:54:17 +0000135 return false;
H. Peter Anvind20f78d2014-03-17 16:36:27 -0700136}
H. Peter Anvin63d77172011-07-31 13:54:50 -0700137#endif
138
Mark Rutland253d3192020-02-10 13:00:13 +0000139/*
140 * Called from the boot CPU during startup; not valid to call once
141 * secondary CPUs are up and preemption is possible.
142 */
143#ifndef arch_get_random_seed_long_early
144static inline bool __init arch_get_random_seed_long_early(unsigned long *v)
145{
146 WARN_ON(system_state != SYSTEM_BOOTING);
147 return arch_get_random_seed_long(v);
148}
149#endif
150
151#ifndef arch_get_random_long_early
152static inline bool __init arch_get_random_long_early(unsigned long *v)
153{
154 WARN_ON(system_state != SYSTEM_BOOTING);
155 return arch_get_random_long(v);
156}
157#endif
158
Jason A. Donenfeld3191dd52022-02-13 22:48:04 +0100159#ifdef CONFIG_SMP
160extern int random_prepare_cpu(unsigned int cpu);
161extern int random_online_cpu(unsigned int cpu);
162#endif
163
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164#endif /* _LINUX_RANDOM_H */