14febfb8dSArd Biesheuvel // SPDX-License-Identifier: GPL-2.0 2e4fbf476SArd Biesheuvel /* 3e4fbf476SArd Biesheuvel * Copyright (C) 2016 Linaro Ltd; <ard.biesheuvel@linaro.org> 4e4fbf476SArd Biesheuvel */ 5e4fbf476SArd Biesheuvel 6e4fbf476SArd Biesheuvel #include <linux/efi.h> 7e4fbf476SArd Biesheuvel #include <asm/efi.h> 8e4fbf476SArd Biesheuvel 9e4fbf476SArd Biesheuvel #include "efistub.h" 10e4fbf476SArd Biesheuvel 111786e830SArd Biesheuvel typedef union efi_rng_protocol efi_rng_protocol_t; 1241e8a7c2SDominik Brodowski 131786e830SArd Biesheuvel union efi_rng_protocol { 141786e830SArd Biesheuvel struct { 158f24f8c2SArd Biesheuvel efi_status_t (__efiapi *get_info)(efi_rng_protocol_t *, 168f24f8c2SArd Biesheuvel unsigned long *, 178f24f8c2SArd Biesheuvel efi_guid_t *); 188f24f8c2SArd Biesheuvel efi_status_t (__efiapi *get_rng)(efi_rng_protocol_t *, 198f24f8c2SArd Biesheuvel efi_guid_t *, unsigned long, 208f24f8c2SArd Biesheuvel u8 *out); 21e4fbf476SArd Biesheuvel }; 221786e830SArd Biesheuvel struct { 231786e830SArd Biesheuvel u32 get_info; 241786e830SArd Biesheuvel u32 get_rng; 251786e830SArd Biesheuvel } mixed_mode; 261786e830SArd Biesheuvel }; 27e4fbf476SArd Biesheuvel 28ba832f68SHeinrich Schuchardt /** 29ba832f68SHeinrich Schuchardt * efi_get_random_bytes() - fill a buffer with random bytes 30ba832f68SHeinrich Schuchardt * @size: size of the buffer 31ba832f68SHeinrich Schuchardt * @out: caller allocated buffer to receive the random bytes 32ba832f68SHeinrich Schuchardt * 33ba832f68SHeinrich Schuchardt * The call will fail if either the firmware does not implement the 34ba832f68SHeinrich Schuchardt * EFI_RNG_PROTOCOL or there are not enough random bytes available to fill 35ba832f68SHeinrich Schuchardt * the buffer. 36ba832f68SHeinrich Schuchardt * 37ba832f68SHeinrich Schuchardt * Return: status code 38ba832f68SHeinrich Schuchardt */ 39cd33a5c1SArd Biesheuvel efi_status_t efi_get_random_bytes(unsigned long size, u8 *out) 40e4fbf476SArd Biesheuvel { 41e4fbf476SArd Biesheuvel efi_guid_t rng_proto = EFI_RNG_PROTOCOL_GUID; 42e4fbf476SArd Biesheuvel efi_status_t status; 431786e830SArd Biesheuvel efi_rng_protocol_t *rng = NULL; 44e4fbf476SArd Biesheuvel 45966291f6SArd Biesheuvel status = efi_bs_call(locate_protocol, &rng_proto, NULL, (void **)&rng); 46e4fbf476SArd Biesheuvel if (status != EFI_SUCCESS) 47e4fbf476SArd Biesheuvel return status; 48e4fbf476SArd Biesheuvel 4947c0fd39SArd Biesheuvel return efi_call_proto(rng, get_rng, NULL, size, out); 50e4fbf476SArd Biesheuvel } 512ddbfc81SArd Biesheuvel 52ba832f68SHeinrich Schuchardt /** 53ba832f68SHeinrich Schuchardt * efi_random_get_seed() - provide random seed as configuration table 54ba832f68SHeinrich Schuchardt * 55ba832f68SHeinrich Schuchardt * The EFI_RNG_PROTOCOL is used to read random bytes. These random bytes are 56ba832f68SHeinrich Schuchardt * saved as a configuration table which can be used as entropy by the kernel 57ba832f68SHeinrich Schuchardt * for the initialization of its pseudo random number generator. 58ba832f68SHeinrich Schuchardt * 59ba832f68SHeinrich Schuchardt * If the EFI_RNG_PROTOCOL is not available or there are not enough random bytes 60ba832f68SHeinrich Schuchardt * available, the configuration table will not be installed and an error code 61ba832f68SHeinrich Schuchardt * will be returned. 62ba832f68SHeinrich Schuchardt * 63ba832f68SHeinrich Schuchardt * Return: status code 64ba832f68SHeinrich Schuchardt */ 65cd33a5c1SArd Biesheuvel efi_status_t efi_random_get_seed(void) 66568bc4e8SArd Biesheuvel { 67568bc4e8SArd Biesheuvel efi_guid_t rng_proto = EFI_RNG_PROTOCOL_GUID; 68568bc4e8SArd Biesheuvel efi_guid_t rng_algo_raw = EFI_RNG_ALGORITHM_RAW; 69568bc4e8SArd Biesheuvel efi_guid_t rng_table_guid = LINUX_EFI_RANDOM_SEED_TABLE_GUID; 70196dff27SArd Biesheuvel struct linux_efi_random_seed *prev_seed, *seed = NULL; 71196dff27SArd Biesheuvel int prev_seed_size = 0, seed_size = EFI_RANDOM_SEED_SIZE; 72*a89474aaSJason A. Donenfeld unsigned long nv_seed_size = 0, offset = 0; 731786e830SArd Biesheuvel efi_rng_protocol_t *rng = NULL; 74568bc4e8SArd Biesheuvel efi_status_t status; 75568bc4e8SArd Biesheuvel 76966291f6SArd Biesheuvel status = efi_bs_call(locate_protocol, &rng_proto, NULL, (void **)&rng); 77568bc4e8SArd Biesheuvel if (status != EFI_SUCCESS) 78*a89474aaSJason A. Donenfeld seed_size = 0; 79*a89474aaSJason A. Donenfeld 80*a89474aaSJason A. Donenfeld // Call GetVariable() with a zero length buffer to obtain the size 81*a89474aaSJason A. Donenfeld get_efi_var(L"RandomSeed", &rng_table_guid, NULL, &nv_seed_size, NULL); 82*a89474aaSJason A. Donenfeld if (!seed_size && !nv_seed_size) 83568bc4e8SArd Biesheuvel return status; 84568bc4e8SArd Biesheuvel 85*a89474aaSJason A. Donenfeld seed_size += nv_seed_size; 86*a89474aaSJason A. Donenfeld 877d866e38SArd Biesheuvel /* 88196dff27SArd Biesheuvel * Check whether a seed was provided by a prior boot stage. In that 89196dff27SArd Biesheuvel * case, instead of overwriting it, let's create a new buffer that can 90196dff27SArd Biesheuvel * hold both, and concatenate the existing and the new seeds. 91196dff27SArd Biesheuvel * Note that we should read the seed size with caution, in case the 92196dff27SArd Biesheuvel * table got corrupted in memory somehow. 93196dff27SArd Biesheuvel */ 94*a89474aaSJason A. Donenfeld prev_seed = get_efi_config_table(rng_table_guid); 95196dff27SArd Biesheuvel if (prev_seed && prev_seed->size <= 512U) { 96196dff27SArd Biesheuvel prev_seed_size = prev_seed->size; 97196dff27SArd Biesheuvel seed_size += prev_seed_size; 98196dff27SArd Biesheuvel } 99196dff27SArd Biesheuvel 100196dff27SArd Biesheuvel /* 1017d866e38SArd Biesheuvel * Use EFI_ACPI_RECLAIM_MEMORY here so that it is guaranteed that the 1027d866e38SArd Biesheuvel * allocation will survive a kexec reboot (although we refresh the seed 1037d866e38SArd Biesheuvel * beforehand) 1047d866e38SArd Biesheuvel */ 1057d866e38SArd Biesheuvel status = efi_bs_call(allocate_pool, EFI_ACPI_RECLAIM_MEMORY, 106196dff27SArd Biesheuvel struct_size(seed, bits, seed_size), 107568bc4e8SArd Biesheuvel (void **)&seed); 108196dff27SArd Biesheuvel if (status != EFI_SUCCESS) { 109196dff27SArd Biesheuvel efi_warn("Failed to allocate memory for RNG seed.\n"); 110196dff27SArd Biesheuvel goto err_warn; 111196dff27SArd Biesheuvel } 112568bc4e8SArd Biesheuvel 113*a89474aaSJason A. Donenfeld if (rng) { 11447c0fd39SArd Biesheuvel status = efi_call_proto(rng, get_rng, &rng_algo_raw, 11541e8a7c2SDominik Brodowski EFI_RANDOM_SEED_SIZE, seed->bits); 11641e8a7c2SDominik Brodowski 117568bc4e8SArd Biesheuvel if (status == EFI_UNSUPPORTED) 118568bc4e8SArd Biesheuvel /* 119568bc4e8SArd Biesheuvel * Use whatever algorithm we have available if the raw algorithm 120568bc4e8SArd Biesheuvel * is not implemented. 121568bc4e8SArd Biesheuvel */ 12247c0fd39SArd Biesheuvel status = efi_call_proto(rng, get_rng, NULL, 12341e8a7c2SDominik Brodowski EFI_RANDOM_SEED_SIZE, seed->bits); 124568bc4e8SArd Biesheuvel 125*a89474aaSJason A. Donenfeld if (status == EFI_SUCCESS) 126*a89474aaSJason A. Donenfeld offset = EFI_RANDOM_SEED_SIZE; 127*a89474aaSJason A. Donenfeld } 128*a89474aaSJason A. Donenfeld 129*a89474aaSJason A. Donenfeld if (nv_seed_size) { 130*a89474aaSJason A. Donenfeld status = get_efi_var(L"RandomSeed", &rng_table_guid, NULL, 131*a89474aaSJason A. Donenfeld &nv_seed_size, seed->bits + offset); 132*a89474aaSJason A. Donenfeld 133*a89474aaSJason A. Donenfeld if (status == EFI_SUCCESS) 134*a89474aaSJason A. Donenfeld /* 135*a89474aaSJason A. Donenfeld * We delete the seed here, and /hope/ that this causes 136*a89474aaSJason A. Donenfeld * EFI to also zero out its representation on disk. 137*a89474aaSJason A. Donenfeld * This is somewhat idealistic, but overwriting the 138*a89474aaSJason A. Donenfeld * variable with zeros is likely just as fraught too. 139*a89474aaSJason A. Donenfeld * TODO: in the future, maybe we can hash it forward 140*a89474aaSJason A. Donenfeld * instead, and write a new seed. 141*a89474aaSJason A. Donenfeld */ 142*a89474aaSJason A. Donenfeld status = set_efi_var(L"RandomSeed", &rng_table_guid, 0, 143*a89474aaSJason A. Donenfeld 0, NULL); 144*a89474aaSJason A. Donenfeld 145*a89474aaSJason A. Donenfeld if (status == EFI_SUCCESS) 146*a89474aaSJason A. Donenfeld offset += nv_seed_size; 147*a89474aaSJason A. Donenfeld else 148*a89474aaSJason A. Donenfeld memzero_explicit(seed->bits + offset, nv_seed_size); 149*a89474aaSJason A. Donenfeld } 150*a89474aaSJason A. Donenfeld 151*a89474aaSJason A. Donenfeld if (!offset) 152568bc4e8SArd Biesheuvel goto err_freepool; 153568bc4e8SArd Biesheuvel 154*a89474aaSJason A. Donenfeld if (prev_seed_size) { 155*a89474aaSJason A. Donenfeld memcpy(seed->bits + offset, prev_seed->bits, prev_seed_size); 156*a89474aaSJason A. Donenfeld offset += prev_seed_size; 157*a89474aaSJason A. Donenfeld } 158196dff27SArd Biesheuvel 159*a89474aaSJason A. Donenfeld seed->size = offset; 160966291f6SArd Biesheuvel status = efi_bs_call(install_configuration_table, &rng_table_guid, seed); 161568bc4e8SArd Biesheuvel if (status != EFI_SUCCESS) 162568bc4e8SArd Biesheuvel goto err_freepool; 163568bc4e8SArd Biesheuvel 164196dff27SArd Biesheuvel if (prev_seed_size) { 165196dff27SArd Biesheuvel /* wipe and free the old seed if we managed to install the new one */ 166196dff27SArd Biesheuvel memzero_explicit(prev_seed->bits, prev_seed_size); 167196dff27SArd Biesheuvel efi_bs_call(free_pool, prev_seed); 168196dff27SArd Biesheuvel } 169568bc4e8SArd Biesheuvel return EFI_SUCCESS; 170568bc4e8SArd Biesheuvel 171568bc4e8SArd Biesheuvel err_freepool: 172196dff27SArd Biesheuvel memzero_explicit(seed, struct_size(seed, bits, seed_size)); 173966291f6SArd Biesheuvel efi_bs_call(free_pool, seed); 174*a89474aaSJason A. Donenfeld efi_warn("Failed to obtain seed from EFI_RNG_PROTOCOL or EFI variable\n"); 175196dff27SArd Biesheuvel err_warn: 176196dff27SArd Biesheuvel if (prev_seed) 177196dff27SArd Biesheuvel efi_warn("Retaining bootloader-supplied seed only"); 178568bc4e8SArd Biesheuvel return status; 179568bc4e8SArd Biesheuvel } 180