blob: a536651164584c96a19b1455f743834291a355c6 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Thomas Garnierd899a7d2016-06-21 17:46:58 -07002/*
3 * Entropy functions used on early boot for KASLR base and memory
4 * randomization. The base randomization is done in the compressed
5 * kernel and memory randomization is done early when the regular
6 * kernel starts. This file is included in the compressed kernel and
7 * normally linked in the regular.
8 */
Matthias Kaehlcke121843e2017-05-01 15:47:41 -07009#include <asm/asm.h>
Thomas Garnierd899a7d2016-06-21 17:46:58 -070010#include <asm/kaslr.h>
11#include <asm/msr.h>
12#include <asm/archrandom.h>
Ingo Molnar66441bd2017-01-27 10:27:10 +010013#include <asm/e820/api.h>
Thomas Garnierd899a7d2016-06-21 17:46:58 -070014#include <asm/io.h>
15
16/*
17 * When built for the regular kernel, several functions need to be stubbed out
18 * or changed to their regular kernel equivalent.
19 */
20#ifndef KASLR_COMPRESSED_BOOT
21#include <asm/cpufeature.h>
22#include <asm/setup.h>
23
Nicolas Iooss62d16b52016-08-06 12:20:39 +020024#define debug_putstr(v) early_printk("%s", v)
Thomas Garnierd899a7d2016-06-21 17:46:58 -070025#define has_cpuflag(f) boot_cpu_has(f)
26#define get_boot_seed() kaslr_offset()
27#endif
28
29#define I8254_PORT_CONTROL 0x43
30#define I8254_PORT_COUNTER0 0x40
31#define I8254_CMD_READBACK 0xC0
32#define I8254_SELECT_COUNTER0 0x02
33#define I8254_STATUS_NOTREADY 0x40
34static inline u16 i8254(void)
35{
36 u16 status, timer;
37
38 do {
Daniel Drake7e6fc2f2019-01-07 11:40:24 +080039 outb(I8254_CMD_READBACK | I8254_SELECT_COUNTER0,
40 I8254_PORT_CONTROL);
Thomas Garnierd899a7d2016-06-21 17:46:58 -070041 status = inb(I8254_PORT_COUNTER0);
42 timer = inb(I8254_PORT_COUNTER0);
43 timer |= inb(I8254_PORT_COUNTER0) << 8;
44 } while (status & I8254_STATUS_NOTREADY);
45
46 return timer;
47}
48
49unsigned long kaslr_get_random_long(const char *purpose)
50{
51#ifdef CONFIG_X86_64
52 const unsigned long mix_const = 0x5d6008cbf3848dd3UL;
53#else
54 const unsigned long mix_const = 0x3f39e593UL;
55#endif
56 unsigned long raw, random = get_boot_seed();
57 bool use_i8254 = true;
58
59 debug_putstr(purpose);
60 debug_putstr(" KASLR using");
61
62 if (has_cpuflag(X86_FEATURE_RDRAND)) {
63 debug_putstr(" RDRAND");
64 if (rdrand_long(&raw)) {
65 random ^= raw;
66 use_i8254 = false;
67 }
68 }
69
70 if (has_cpuflag(X86_FEATURE_TSC)) {
71 debug_putstr(" RDTSC");
72 raw = rdtsc();
73
74 random ^= raw;
75 use_i8254 = false;
76 }
77
78 if (use_i8254) {
79 debug_putstr(" i8254");
80 random ^= i8254();
81 }
82
83 /* Circular multiply for better bit diffusion */
Matthias Kaehlcke121843e2017-05-01 15:47:41 -070084 asm(_ASM_MUL "%3"
Thomas Garnierd899a7d2016-06-21 17:46:58 -070085 : "=a" (random), "=d" (raw)
86 : "a" (random), "rm" (mix_const));
87 random += raw;
88
89 debug_putstr("...\n");
90
91 return random;
92}