2017-11-01 15:07:57 +01:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2022-02-11 12:28:33 +01:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
#ifndef _LINUX_RANDOM_H
|
|
|
|
|
#define _LINUX_RANDOM_H
|
|
|
|
|
|
2020-02-10 13:00:13 +00:00
|
|
|
#include <linux/bug.h>
|
|
|
|
|
#include <linux/kernel.h>
|
2015-06-09 18:19:39 +08:00
|
|
|
#include <linux/list.h>
|
2015-10-08 01:20:38 +02:00
|
|
|
#include <linux/once.h>
|
|
|
|
|
|
2012-10-13 10:46:48 +01:00
|
|
|
#include <uapi/linux/random.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2022-03-01 20:03:49 +01:00
|
|
|
struct notifier_block;
|
2015-06-09 18:19:39 +08:00
|
|
|
|
2022-05-13 13:18:46 +02:00
|
|
|
void add_device_randomness(const void *buf, size_t len);
|
2022-06-07 17:00:16 +02:00
|
|
|
void __init add_bootloader_randomness(const void *buf, size_t len);
|
2022-05-13 12:29:38 +02:00
|
|
|
void add_input_randomness(unsigned int type, unsigned int code,
|
|
|
|
|
unsigned int value) __latent_entropy;
|
|
|
|
|
void add_interrupt_randomness(int irq) __latent_entropy;
|
2022-05-13 13:18:46 +02:00
|
|
|
void add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy);
|
2022-05-05 02:20:22 +02:00
|
|
|
|
|
|
|
|
#if defined(LATENT_ENTROPY_PLUGIN) && !defined(__CHECKER__)
|
|
|
|
|
static inline void add_latent_entropy(void)
|
|
|
|
|
{
|
|
|
|
|
add_device_randomness((const void *)&latent_entropy, sizeof(latent_entropy));
|
|
|
|
|
}
|
|
|
|
|
#else
|
2022-05-13 12:29:38 +02:00
|
|
|
static inline void add_latent_entropy(void) { }
|
2022-05-05 02:20:22 +02:00
|
|
|
#endif
|
|
|
|
|
|
2022-03-01 15:14:04 +01:00
|
|
|
#if IS_ENABLED(CONFIG_VMGENID)
|
2022-05-13 13:18:46 +02:00
|
|
|
void add_vmfork_randomness(const void *unique_vm_id, size_t len);
|
2022-05-13 12:29:38 +02:00
|
|
|
int register_random_vmfork_notifier(struct notifier_block *nb);
|
|
|
|
|
int unregister_random_vmfork_notifier(struct notifier_block *nb);
|
2022-03-01 20:22:39 +01:00
|
|
|
#else
|
|
|
|
|
static inline int register_random_vmfork_notifier(struct notifier_block *nb) { return 0; }
|
|
|
|
|
static inline int unregister_random_vmfork_notifier(struct notifier_block *nb) { return 0; }
|
2022-03-01 15:14:04 +01:00
|
|
|
#endif
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2022-05-13 13:18:46 +02:00
|
|
|
void get_random_bytes(void *buf, size_t len);
|
2017-01-22 16:34:08 +01:00
|
|
|
u32 get_random_u32(void);
|
|
|
|
|
u64 get_random_u64(void);
|
|
|
|
|
static inline unsigned int get_random_int(void)
|
|
|
|
|
{
|
|
|
|
|
return get_random_u32();
|
|
|
|
|
}
|
|
|
|
|
static inline unsigned long get_random_long(void)
|
|
|
|
|
{
|
|
|
|
|
#if BITS_PER_LONG == 64
|
|
|
|
|
return get_random_u64();
|
|
|
|
|
#else
|
|
|
|
|
return get_random_u32();
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-12 14:36:17 -07:00
|
|
|
/*
|
|
|
|
|
* On 64-bit architectures, protect against non-terminated C string overflows
|
|
|
|
|
* by zeroing out the first byte of the canary; this leaves 56 bits of entropy.
|
|
|
|
|
*/
|
|
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
|
# ifdef __LITTLE_ENDIAN
|
|
|
|
|
# define CANARY_MASK 0xffffffffffffff00UL
|
|
|
|
|
# else /* big endian, 64 bits: */
|
|
|
|
|
# define CANARY_MASK 0x00ffffffffffffffUL
|
|
|
|
|
# endif
|
|
|
|
|
#else /* 32 bits: */
|
|
|
|
|
# define CANARY_MASK 0xffffffffUL
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
static inline unsigned long get_random_canary(void)
|
|
|
|
|
{
|
2022-05-13 12:29:38 +02:00
|
|
|
return get_random_long() & CANARY_MASK;
|
2017-07-12 14:36:17 -07:00
|
|
|
}
|
|
|
|
|
|
2022-05-13 12:29:38 +02:00
|
|
|
int __init random_init(const char *command_line);
|
|
|
|
|
bool rng_is_initialized(void);
|
|
|
|
|
int wait_for_random_bytes(void);
|
|
|
|
|
|
2017-06-07 20:05:02 -04:00
|
|
|
/* Calls wait_for_random_bytes() and then calls get_random_bytes(buf, nbytes).
|
|
|
|
|
* Returns the result of the call to wait_for_random_bytes. */
|
2022-02-09 14:43:25 +01:00
|
|
|
static inline int get_random_bytes_wait(void *buf, size_t nbytes)
|
2017-06-07 20:05:02 -04:00
|
|
|
{
|
|
|
|
|
int ret = wait_for_random_bytes();
|
|
|
|
|
get_random_bytes(buf, nbytes);
|
2018-02-04 23:07:46 +01:00
|
|
|
return ret;
|
2017-06-07 20:05:02 -04:00
|
|
|
}
|
|
|
|
|
|
2022-05-13 12:32:23 +02:00
|
|
|
#define declare_get_random_var_wait(name, ret_type) \
|
|
|
|
|
static inline int get_random_ ## name ## _wait(ret_type *out) { \
|
2017-06-07 20:05:02 -04:00
|
|
|
int ret = wait_for_random_bytes(); \
|
|
|
|
|
if (unlikely(ret)) \
|
|
|
|
|
return ret; \
|
2022-05-13 12:32:23 +02:00
|
|
|
*out = get_random_ ## name(); \
|
2017-06-07 20:05:02 -04:00
|
|
|
return 0; \
|
|
|
|
|
}
|
2022-05-13 12:32:23 +02:00
|
|
|
declare_get_random_var_wait(u32, u32)
|
|
|
|
|
declare_get_random_var_wait(u64, u32)
|
|
|
|
|
declare_get_random_var_wait(int, unsigned int)
|
|
|
|
|
declare_get_random_var_wait(long, unsigned long)
|
2017-06-07 20:05:02 -04:00
|
|
|
#undef declare_get_random_var
|
|
|
|
|
|
2010-05-26 14:44:13 -07:00
|
|
|
/*
|
2020-07-31 07:51:14 +02:00
|
|
|
* This is designed to be standalone for just prandom
|
|
|
|
|
* users, but for now we include it from <linux/random.h>
|
|
|
|
|
* for legacy reasons.
|
2010-05-26 14:44:13 -07:00
|
|
|
*/
|
2020-07-31 07:51:14 +02:00
|
|
|
#include <linux/prandom.h>
|
2010-05-26 14:44:13 -07:00
|
|
|
|
2011-07-31 13:54:50 -07:00
|
|
|
#ifdef CONFIG_ARCH_RANDOM
|
|
|
|
|
# include <asm/archrandom.h>
|
|
|
|
|
#else
|
2022-05-13 12:29:38 +02:00
|
|
|
static inline bool __must_check arch_get_random_long(unsigned long *v) { return false; }
|
|
|
|
|
static inline bool __must_check arch_get_random_int(unsigned int *v) { return false; }
|
|
|
|
|
static inline bool __must_check arch_get_random_seed_long(unsigned long *v) { return false; }
|
|
|
|
|
static inline bool __must_check arch_get_random_seed_int(unsigned int *v) { return false; }
|
2011-07-31 13:54:50 -07:00
|
|
|
#endif
|
|
|
|
|
|
2020-02-10 13:00:13 +00:00
|
|
|
/*
|
|
|
|
|
* Called from the boot CPU during startup; not valid to call once
|
|
|
|
|
* secondary CPUs are up and preemption is possible.
|
|
|
|
|
*/
|
|
|
|
|
#ifndef arch_get_random_seed_long_early
|
|
|
|
|
static inline bool __init arch_get_random_seed_long_early(unsigned long *v)
|
|
|
|
|
{
|
|
|
|
|
WARN_ON(system_state != SYSTEM_BOOTING);
|
|
|
|
|
return arch_get_random_seed_long(v);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#ifndef arch_get_random_long_early
|
|
|
|
|
static inline bool __init arch_get_random_long_early(unsigned long *v)
|
|
|
|
|
{
|
|
|
|
|
WARN_ON(system_state != SYSTEM_BOOTING);
|
|
|
|
|
return arch_get_random_long(v);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2022-02-13 22:48:04 +01:00
|
|
|
#ifdef CONFIG_SMP
|
2022-05-13 12:29:38 +02:00
|
|
|
int random_prepare_cpu(unsigned int cpu);
|
|
|
|
|
int random_online_cpu(unsigned int cpu);
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#ifndef MODULE
|
|
|
|
|
extern const struct file_operations random_fops, urandom_fops;
|
2022-02-13 22:48:04 +01:00
|
|
|
#endif
|
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
#endif /* _LINUX_RANDOM_H */
|