/* * Copyright (c) 2023 Renesas Electronics Corporation * * SPDX-License-Identifier: Apache-2.0 */ #include #include #include #include #include #include #define DT_DRV_COMPAT renesas_smartbond_trng #define IRQN DT_INST_IRQN(0) #define IRQ_PRIO DT_INST_IRQ(0, priority) struct rng_pool { uint8_t first_alloc; uint8_t first_read; uint8_t last; uint8_t mask; uint8_t threshold; uint8_t buffer[0]; }; #define RNG_POOL_DEFINE(name, len) uint8_t name[sizeof(struct rng_pool) + (len)] BUILD_ASSERT((CONFIG_ENTROPY_SMARTBOND_ISR_POOL_SIZE & (CONFIG_ENTROPY_SMARTBOND_ISR_POOL_SIZE - 1)) == 0, "The CONFIG_ENTROPY_SMARTBOND_ISR_POOL_SIZE must be a power of 2!"); BUILD_ASSERT((CONFIG_ENTROPY_SMARTBOND_THR_POOL_SIZE & (CONFIG_ENTROPY_SMARTBOND_THR_POOL_SIZE - 1)) == 0, "The CONFIG_ENTROPY_SMARTBOND_THR_POOL_SIZE must be a power of 2!"); struct entropy_smartbond_dev_data { struct k_sem sem_lock; struct k_sem sem_sync; RNG_POOL_DEFINE(isr, CONFIG_ENTROPY_SMARTBOND_ISR_POOL_SIZE); RNG_POOL_DEFINE(thr, CONFIG_ENTROPY_SMARTBOND_THR_POOL_SIZE); }; static struct entropy_smartbond_dev_data entropy_smartbond_data; /* TRNG FIFO definitions are not in DA1469x.h */ #define DA1469X_TRNG_FIFO_SIZE (32 * sizeof(uint32_t)) #define DA1469X_TRNG_FIFO_ADDR (0x30050000UL) #define FIFO_COUNT_MASK \ (TRNG_TRNG_FIFOLVL_REG_TRNG_FIFOFULL_Msk | TRNG_TRNG_FIFOLVL_REG_TRNG_FIFOLVL_Msk) static void trng_enable(bool enable) { unsigned int key; key = irq_lock(); if (enable) { CRG_TOP->CLK_AMBA_REG |= CRG_TOP_CLK_AMBA_REG_TRNG_CLK_ENABLE_Msk; TRNG->TRNG_CTRL_REG = TRNG_TRNG_CTRL_REG_TRNG_ENABLE_Msk; } else { CRG_TOP->CLK_AMBA_REG &= ~CRG_TOP_CLK_AMBA_REG_TRNG_CLK_ENABLE_Msk; TRNG->TRNG_CTRL_REG = 0; } irq_unlock(key); } static int trng_available(void) { return TRNG->TRNG_FIFOLVL_REG & FIFO_COUNT_MASK; } static inline uint32_t trng_fifo_read(void) { return *(uint32_t *)DA1469X_TRNG_FIFO_ADDR; } static int random_word_get(uint8_t buf[4]) { uint32_t word = 0; int retval = -EAGAIN; unsigned int key; key = irq_lock(); if (trng_available()) { word = trng_fifo_read(); retval = 0; } irq_unlock(key); buf[0] = (uint8_t)word; buf[1] = (uint8_t)(word >> 8); buf[2] = (uint8_t)(word >> 16); buf[3] = (uint8_t)(word >> 24); return retval; } static uint16_t rng_pool_get(struct rng_pool *rngp, uint8_t *buf, uint16_t len) { uint32_t last = rngp->last; uint32_t mask = rngp->mask; uint8_t *dst = buf; uint32_t first, available; uint32_t other_read_in_progress; unsigned int key; key = irq_lock(); first = rngp->first_alloc; /* * The other_read_in_progress is non-zero if rngp->first_read != first, * which means that lower-priority code (which was interrupted by this * call) already allocated area for read. */ other_read_in_progress = (rngp->first_read ^ first); available = (last - first) & mask; if (available < len) { len = available; } /* * Move alloc index forward to signal, that part of the buffer is * now reserved for this call. */ rngp->first_alloc = (first + len) & mask; irq_unlock(key); while (likely(len--)) { *dst++ = rngp->buffer[first]; first = (first + 1) & mask; } /* * If this call is the last one accessing the pool, move read index * to signal that all allocated regions are now read and could be * overwritten. */ if (likely(!other_read_in_progress)) { key = irq_lock(); rngp->first_read = rngp->first_alloc; irq_unlock(key); } len = dst - buf; available = available - len; if (available <= rngp->threshold) { trng_enable(true); } return len; } static int rng_pool_put(struct rng_pool *rngp, uint8_t byte) { uint8_t first = rngp->first_read; uint8_t last = rngp->last; uint8_t mask = rngp->mask; /* Signal error if the pool is full. */ if (((last - first) & mask) == mask) { return -ENOBUFS; } rngp->buffer[last] = byte; rngp->last = (last + 1) & mask; return 0; } static const uint8_t *rng_pool_put_bytes(struct rng_pool *rngp, const uint8_t *bytes, const uint8_t *limit) { unsigned int key; key = irq_lock(); for (; bytes < limit; ++bytes) { if (rng_pool_put(rngp, *bytes) < 0) { break; } } irq_unlock(key); return bytes; } static void rng_pool_init(struct rng_pool *rngp, uint16_t size, uint8_t threshold) { rngp->first_alloc = 0U; rngp->first_read = 0U; rngp->last = 0U; rngp->mask = size - 1; rngp->threshold = threshold; } static void smartbond_trng_isr(const void *arg) { uint8_t word[4]; const uint8_t *const limit = word + 4; const uint8_t *ptr; bool thread_signaled = false; ARG_UNUSED(arg); while (true) { if (random_word_get(word) < 0) { /* Nothing in FIFO -> nothing to do */ break; } ptr = word; /* Put bytes in ISR FIFO first */ ptr = rng_pool_put_bytes((struct rng_pool *)(entropy_smartbond_data.isr), ptr, limit); if (ptr < limit) { /* Put leftovers in thread FIFO */ if (!thread_signaled) { thread_signaled = true; k_sem_give(&entropy_smartbond_data.sem_sync); } ptr = rng_pool_put_bytes((struct rng_pool *)(entropy_smartbond_data.thr), ptr, limit); } /* Bytes did not fit in isr nor thread FIFO, disable TRNG for now */ if (ptr < limit) { trng_enable(false); break; } } } static int entropy_smartbond_get_entropy(const struct device *dev, uint8_t *buf, uint16_t len) { ARG_UNUSED(dev); /* Check if this API is called on correct driver instance. */ __ASSERT_NO_MSG(&entropy_smartbond_data == dev->data); while (len) { uint16_t bytes; k_sem_take(&entropy_smartbond_data.sem_lock, K_FOREVER); bytes = rng_pool_get((struct rng_pool *)(entropy_smartbond_data.thr), buf, len); k_sem_give(&entropy_smartbond_data.sem_lock); if (bytes == 0U) { /* Pool is empty: Sleep until next interrupt. */ k_sem_take(&entropy_smartbond_data.sem_sync, K_FOREVER); continue; } len -= bytes; buf += bytes; } return 0; } static int entropy_smartbond_get_entropy_isr(const struct device *dev, uint8_t *buf, uint16_t len, uint32_t flags) { ARG_UNUSED(dev); uint16_t cnt = len; /* Check if this API is called on correct driver instance. */ __ASSERT_NO_MSG(&entropy_smartbond_data == dev->data); if (likely((flags & ENTROPY_BUSYWAIT) == 0U)) { return rng_pool_get((struct rng_pool *)(entropy_smartbond_data.isr), buf, len); } if (len) { unsigned int key; int irq_enabled; key = irq_lock(); irq_enabled = irq_is_enabled(IRQN); irq_disable(IRQN); irq_unlock(key); trng_enable(true); /* Clear NVIC pending bit. This ensures that a subsequent * RNG event will set the Cortex-M single-bit event register * to 1 (the bit is set when NVIC pending IRQ status is * changed from 0 to 1) */ NVIC_ClearPendingIRQ(IRQN); do { uint8_t bytes[4]; const uint8_t *ptr = bytes; const uint8_t *const limit = bytes + 4; while (!trng_available()) { /* * To guarantee waking up from the event, the * SEV-On-Pend feature must be enabled (enabled * during ARCH initialization). * * DSB is recommended by spec before WFE (to * guarantee completion of memory transactions) */ barrier_dsync_fence_full(); __WFE(); __SEV(); __WFE(); } NVIC_ClearPendingIRQ(IRQN); if (random_word_get(buf) != 0) { continue; } while (ptr < limit) { buf[--len] = *ptr++; } /* Store remaining data for later use */ if (unlikely(ptr < limit)) { rng_pool_put_bytes((struct rng_pool *)(entropy_smartbond_data.isr), ptr, limit); } } while (len); if (irq_enabled) { irq_enable(IRQN); } } return cnt; } static const struct entropy_driver_api entropy_smartbond_api_funcs = { .get_entropy = entropy_smartbond_get_entropy, .get_entropy_isr = entropy_smartbond_get_entropy_isr}; static int entropy_smartbond_init(const struct device *dev) { /* Check if this API is called on correct driver instance. */ __ASSERT_NO_MSG(&entropy_smartbond_data == dev->data); /* Locking semaphore initialized to 1 (unlocked) */ k_sem_init(&entropy_smartbond_data.sem_lock, 1, 1); /* Syncing semaphore */ k_sem_init(&entropy_smartbond_data.sem_sync, 0, 1); rng_pool_init((struct rng_pool *)(entropy_smartbond_data.thr), CONFIG_ENTROPY_SMARTBOND_THR_POOL_SIZE, CONFIG_ENTROPY_SMARTBOND_THR_THRESHOLD); rng_pool_init((struct rng_pool *)(entropy_smartbond_data.isr), CONFIG_ENTROPY_SMARTBOND_ISR_POOL_SIZE, CONFIG_ENTROPY_SMARTBOND_ISR_THRESHOLD); IRQ_CONNECT(IRQN, IRQ_PRIO, smartbond_trng_isr, &entropy_smartbond_data, 0); irq_enable(IRQN); trng_enable(true); return 0; } DEVICE_DT_INST_DEFINE(0, entropy_smartbond_init, NULL, &entropy_smartbond_data, NULL, PRE_KERNEL_1, CONFIG_ENTROPY_INIT_PRIORITY, &entropy_smartbond_api_funcs);