GNU Linux-libre 4.19.264-gnu1
[releases.git] / drivers / crypto / qcom-rng.c
1 // SPDX-License-Identifier: GPL-2.0
2 // Copyright (c) 2017-18 Linaro Limited
3 //
4 // Based on msm-rng.c and downstream driver
5
6 #include <crypto/internal/rng.h>
7 #include <linux/acpi.h>
8 #include <linux/clk.h>
9 #include <linux/crypto.h>
10 #include <linux/iopoll.h>
11 #include <linux/module.h>
12 #include <linux/of.h>
13 #include <linux/platform_device.h>
14
15 /* Device specific register offsets */
16 #define PRNG_DATA_OUT           0x0000
17 #define PRNG_STATUS             0x0004
18 #define PRNG_LFSR_CFG           0x0100
19 #define PRNG_CONFIG             0x0104
20
21 /* Device specific register masks and config values */
22 #define PRNG_LFSR_CFG_MASK      0x0000ffff
23 #define PRNG_LFSR_CFG_CLOCKS    0x0000dddd
24 #define PRNG_CONFIG_HW_ENABLE   BIT(1)
25 #define PRNG_STATUS_DATA_AVAIL  BIT(0)
26
27 #define WORD_SZ                 4
28
29 struct qcom_rng {
30         struct mutex lock;
31         void __iomem *base;
32         struct clk *clk;
33         unsigned int skip_init;
34 };
35
36 struct qcom_rng_ctx {
37         struct qcom_rng *rng;
38 };
39
40 static struct qcom_rng *qcom_rng_dev;
41
42 static int qcom_rng_read(struct qcom_rng *rng, u8 *data, unsigned int max)
43 {
44         unsigned int currsize = 0;
45         u32 val;
46         int ret;
47
48         /* read random data from hardware */
49         do {
50                 ret = readl_poll_timeout(rng->base + PRNG_STATUS, val,
51                                          val & PRNG_STATUS_DATA_AVAIL,
52                                          200, 10000);
53                 if (ret)
54                         return ret;
55
56                 val = readl_relaxed(rng->base + PRNG_DATA_OUT);
57                 if (!val)
58                         return -EINVAL;
59
60                 if ((max - currsize) >= WORD_SZ) {
61                         memcpy(data, &val, WORD_SZ);
62                         data += WORD_SZ;
63                         currsize += WORD_SZ;
64                 } else {
65                         /* copy only remaining bytes */
66                         memcpy(data, &val, max - currsize);
67                         break;
68                 }
69         } while (currsize < max);
70
71         return 0;
72 }
73
74 static int qcom_rng_generate(struct crypto_rng *tfm,
75                              const u8 *src, unsigned int slen,
76                              u8 *dstn, unsigned int dlen)
77 {
78         struct qcom_rng_ctx *ctx = crypto_rng_ctx(tfm);
79         struct qcom_rng *rng = ctx->rng;
80         int ret;
81
82         ret = clk_prepare_enable(rng->clk);
83         if (ret)
84                 return ret;
85
86         mutex_lock(&rng->lock);
87
88         ret = qcom_rng_read(rng, dstn, dlen);
89
90         mutex_unlock(&rng->lock);
91         clk_disable_unprepare(rng->clk);
92
93         return ret;
94 }
95
96 static int qcom_rng_seed(struct crypto_rng *tfm, const u8 *seed,
97                          unsigned int slen)
98 {
99         return 0;
100 }
101
102 static int qcom_rng_enable(struct qcom_rng *rng)
103 {
104         u32 val;
105         int ret;
106
107         ret = clk_prepare_enable(rng->clk);
108         if (ret)
109                 return ret;
110
111         /* Enable PRNG only if it is not already enabled */
112         val = readl_relaxed(rng->base + PRNG_CONFIG);
113         if (val & PRNG_CONFIG_HW_ENABLE)
114                 goto already_enabled;
115
116         val = readl_relaxed(rng->base + PRNG_LFSR_CFG);
117         val &= ~PRNG_LFSR_CFG_MASK;
118         val |= PRNG_LFSR_CFG_CLOCKS;
119         writel(val, rng->base + PRNG_LFSR_CFG);
120
121         val = readl_relaxed(rng->base + PRNG_CONFIG);
122         val |= PRNG_CONFIG_HW_ENABLE;
123         writel(val, rng->base + PRNG_CONFIG);
124
125 already_enabled:
126         clk_disable_unprepare(rng->clk);
127
128         return 0;
129 }
130
131 static int qcom_rng_init(struct crypto_tfm *tfm)
132 {
133         struct qcom_rng_ctx *ctx = crypto_tfm_ctx(tfm);
134
135         ctx->rng = qcom_rng_dev;
136
137         if (!ctx->rng->skip_init)
138                 return qcom_rng_enable(ctx->rng);
139
140         return 0;
141 }
142
143 static struct rng_alg qcom_rng_alg = {
144         .generate       = qcom_rng_generate,
145         .seed           = qcom_rng_seed,
146         .seedsize       = 0,
147         .base           = {
148                 .cra_name               = "stdrng",
149                 .cra_driver_name        = "qcom-rng",
150                 .cra_flags              = CRYPTO_ALG_TYPE_RNG,
151                 .cra_priority           = 300,
152                 .cra_ctxsize            = sizeof(struct qcom_rng_ctx),
153                 .cra_module             = THIS_MODULE,
154                 .cra_init               = qcom_rng_init,
155         }
156 };
157
158 static int qcom_rng_probe(struct platform_device *pdev)
159 {
160         struct resource *res;
161         struct qcom_rng *rng;
162         int ret;
163
164         rng = devm_kzalloc(&pdev->dev, sizeof(*rng), GFP_KERNEL);
165         if (!rng)
166                 return -ENOMEM;
167
168         platform_set_drvdata(pdev, rng);
169         mutex_init(&rng->lock);
170
171         res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
172         rng->base = devm_ioremap_resource(&pdev->dev, res);
173         if (IS_ERR(rng->base))
174                 return PTR_ERR(rng->base);
175
176         /* ACPI systems have clk already on, so skip clk_get */
177         if (!has_acpi_companion(&pdev->dev)) {
178                 rng->clk = devm_clk_get(&pdev->dev, "core");
179                 if (IS_ERR(rng->clk))
180                         return PTR_ERR(rng->clk);
181         }
182
183
184         rng->skip_init = (unsigned long)device_get_match_data(&pdev->dev);
185
186         qcom_rng_dev = rng;
187         ret = crypto_register_rng(&qcom_rng_alg);
188         if (ret) {
189                 dev_err(&pdev->dev, "Register crypto rng failed: %d\n", ret);
190                 qcom_rng_dev = NULL;
191         }
192
193         return ret;
194 }
195
196 static int qcom_rng_remove(struct platform_device *pdev)
197 {
198         crypto_unregister_rng(&qcom_rng_alg);
199
200         qcom_rng_dev = NULL;
201
202         return 0;
203 }
204
205 #if IS_ENABLED(CONFIG_ACPI)
206 static const struct acpi_device_id qcom_rng_acpi_match[] = {
207         { .id = "QCOM8160", .driver_data = 1 },
208         {}
209 };
210 MODULE_DEVICE_TABLE(acpi, qcom_rng_acpi_match);
211 #endif
212
213 static const struct of_device_id qcom_rng_of_match[] = {
214         { .compatible = "qcom,prng", .data = (void *)0},
215         { .compatible = "qcom,prng-ee", .data = (void *)1},
216         {}
217 };
218 MODULE_DEVICE_TABLE(of, qcom_rng_of_match);
219
220 static struct platform_driver qcom_rng_driver = {
221         .probe = qcom_rng_probe,
222         .remove =  qcom_rng_remove,
223         .driver = {
224                 .name = KBUILD_MODNAME,
225                 .of_match_table = of_match_ptr(qcom_rng_of_match),
226                 .acpi_match_table = ACPI_PTR(qcom_rng_acpi_match),
227         }
228 };
229 module_platform_driver(qcom_rng_driver);
230
231 MODULE_ALIAS("platform:" KBUILD_MODNAME);
232 MODULE_DESCRIPTION("Qualcomm random number generator driver");
233 MODULE_LICENSE("GPL v2");