#include <sys/types.h>
#include <sys/errno.h>
#include <sys/debug.h>
#include <vm/seg_kmem.h>
#include <vm/hat.h>
#include <sys/systm.h>
#include <sys/memlist.h>
#include <sys/cmn_err.h>
#include <sys/ksynch.h>
#include <sys/random.h>
#include <sys/ddi.h>
#include <sys/mman.h>
#include <sys/sysmacros.h>
#include <sys/mem_config.h>
#include <sys/time.h>
#include <sys/crypto/spi.h>
#include <sys/sha1.h>
#include <sys/sunddi.h>
#include <sys/modctl.h>
#include <sys/hold_page.h>
#include <rng/fips_random.h>
#define RNDPOOLSIZE 1024
#define HASHBUFSIZE 64
#define MAXMEMBLOCKS 16384
#define MEMBLOCKSIZE 4096
#define MINEXTRACTBITS 160
#define TIMEOUT_INTERVAL 5
#define HASHSIZE 20
#define HASH_CTX SHA1_CTX
#define HashInit(ctx) SHA1Init((ctx))
#define HashUpdate(ctx, p, s) SHA1Update((ctx), (p), (s))
#define HashFinal(d, ctx) SHA1Final((d), (ctx))
typedef struct physmem_entsrc_s {
uint8_t *parity;
caddr_t pmbuf;
uint32_t nblocks;
int entperblock;
hrtime_t last_diff;
hrtime_t last_delta;
hrtime_t last_delta2;
} physmem_entsrc_t;
static uint32_t srndpool[RNDPOOLSIZE/4];
static uint32_t buffer[RNDPOOLSIZE/4];
static int buffer_bytes;
static uint32_t entropy_bits;
static kmutex_t srndpool_lock;
static kmutex_t buffer_lock;
static kcondvar_t srndpool_read_cv;
static int pindex;
static int bstart, bindex;
static uint8_t leftover[HASHSIZE];
static uint32_t swrand_XKEY[6];
static int leftover_bytes;
static uint32_t previous_bytes[HASHSIZE/BYTES_IN_WORD];
static physmem_entsrc_t entsrc;
static timeout_id_t rnd_timeout_id;
static int snum_waiters;
static crypto_kcf_provider_handle_t swrand_prov_handle = 0;
swrand_stats_t swrand_stats;
static int physmem_ent_init(physmem_entsrc_t *);
static void physmem_ent_fini(physmem_entsrc_t *);
static void physmem_ent_gen(physmem_entsrc_t *);
static int physmem_parity_update(uint8_t *, uint32_t, int);
static void physmem_count_blocks();
static void rnd_dr_callback_post_add(void *, pgcnt_t);
static int rnd_dr_callback_pre_del(void *, pgcnt_t);
static void rnd_dr_callback_post_del(void *, pgcnt_t, int);
static void rnd_handler(void *arg);
static void swrand_init();
static void swrand_schedule_timeout(void);
static int swrand_get_entropy(uint8_t *ptr, size_t len, boolean_t);
static void swrand_add_entropy(uint8_t *ptr, size_t len, uint16_t entropy_est);
static void swrand_add_entropy_later(uint8_t *ptr, size_t len);
kphysm_setup_vector_t rnd_dr_callback_vec = {
KPHYSM_SETUP_VECTOR_VERSION,
rnd_dr_callback_post_add,
rnd_dr_callback_pre_del,
rnd_dr_callback_post_del
};
extern struct mod_ops mod_cryptoops;
static struct modlcrypto modlcrypto = {
&mod_cryptoops,
"Kernel Random number Provider"
};
static struct modlinkage modlinkage = {
MODREV_1,
(void *)&modlcrypto,
NULL
};
static void swrand_provider_status(crypto_provider_handle_t, uint_t *);
static crypto_control_ops_t swrand_control_ops = {
swrand_provider_status
};
static int swrand_seed_random(crypto_provider_handle_t, crypto_session_id_t,
uchar_t *, size_t, uint_t, uint32_t, crypto_req_handle_t);
static int swrand_generate_random(crypto_provider_handle_t,
crypto_session_id_t, uchar_t *, size_t, crypto_req_handle_t);
static crypto_random_number_ops_t swrand_random_number_ops = {
swrand_seed_random,
swrand_generate_random
};
static crypto_ops_t swrand_crypto_ops = {
&swrand_control_ops,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
&swrand_random_number_ops,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
};
static crypto_provider_info_t swrand_prov_info = {
CRYPTO_SPI_VERSION_4,
"Kernel Random Number Provider",
CRYPTO_SW_PROVIDER,
{&modlinkage},
NULL,
&swrand_crypto_ops,
0,
NULL
};
int
_init(void)
{
int ret;
hrtime_t ts;
time_t now;
mutex_init(&srndpool_lock, NULL, MUTEX_DEFAULT, NULL);
mutex_init(&buffer_lock, NULL, MUTEX_DEFAULT, NULL);
cv_init(&srndpool_read_cv, NULL, CV_DEFAULT, NULL);
entropy_bits = 0;
pindex = 0;
bindex = 0;
bstart = 0;
snum_waiters = 0;
leftover_bytes = 0;
buffer_bytes = 0;
ts = gethrtime();
swrand_add_entropy((uint8_t *)&ts, sizeof (ts), 0);
(void) drv_getparm(TIME, &now);
swrand_add_entropy((uint8_t *)&now, sizeof (now), 0);
ret = kphysm_setup_func_register(&rnd_dr_callback_vec, NULL);
ASSERT(ret == 0);
if (physmem_ent_init(&entsrc) != 0) {
ret = ENOMEM;
goto exit1;
}
if ((ret = mod_install(&modlinkage)) != 0)
goto exit2;
mutex_enter(&srndpool_lock);
swrand_schedule_timeout();
mutex_exit(&srndpool_lock);
(void) swrand_get_entropy((uint8_t *)swrand_XKEY, HASHSIZE, B_TRUE);
bcopy(swrand_XKEY, previous_bytes, HASHSIZE);
if (crypto_register_provider(&swrand_prov_info, &swrand_prov_handle)) {
(void) mod_remove(&modlinkage);
ret = EACCES;
goto exit2;
}
return (0);
exit2:
physmem_ent_fini(&entsrc);
exit1:
mutex_destroy(&srndpool_lock);
mutex_destroy(&buffer_lock);
cv_destroy(&srndpool_read_cv);
return (ret);
}
int
_info(struct modinfo *modinfop)
{
return (mod_info(&modlinkage, modinfop));
}
static void
swrand_provider_status(crypto_provider_handle_t provider, uint_t *status)
{
*status = CRYPTO_PROVIDER_READY;
}
static int
swrand_seed_random(crypto_provider_handle_t provider, crypto_session_id_t sid,
uchar_t *buf, size_t len, uint_t entropy_est, uint32_t flags,
crypto_req_handle_t req)
{
if (flags & CRYPTO_SEED_NOW)
swrand_add_entropy(buf, len, 0);
else
swrand_add_entropy_later(buf, len);
return (CRYPTO_SUCCESS);
}
static int
swrand_generate_random(crypto_provider_handle_t provider,
crypto_session_id_t sid, uchar_t *buf, size_t len, crypto_req_handle_t req)
{
if (crypto_kmflag(req) == KM_NOSLEEP)
(void) swrand_get_entropy(buf, len, B_TRUE);
else
(void) swrand_get_entropy(buf, len, B_FALSE);
return (CRYPTO_SUCCESS);
}
static int
swrand_get_entropy(uint8_t *ptr, size_t len, boolean_t nonblock)
{
int i, bytes;
HASH_CTX hashctx;
uint8_t digest[HASHSIZE], *pool;
uint32_t tempout[HASHSIZE/BYTES_IN_WORD];
int size;
mutex_enter(&srndpool_lock);
if (leftover_bytes > 0) {
bytes = min(len, leftover_bytes);
bcopy(leftover, ptr, bytes);
len -= bytes;
ptr += bytes;
leftover_bytes -= bytes;
if (leftover_bytes > 0)
ovbcopy(leftover+bytes, leftover, leftover_bytes);
}
while (len > 0) {
while (entropy_bits < MINEXTRACTBITS) {
physmem_ent_gen(&entsrc);
if (entropy_bits < MINEXTRACTBITS &&
nonblock == B_TRUE) {
mutex_exit(&srndpool_lock);
return (EAGAIN);
}
if (entropy_bits < MINEXTRACTBITS) {
ASSERT(nonblock == B_FALSE);
snum_waiters++;
if (cv_wait_sig(&srndpool_read_cv,
&srndpool_lock) == 0) {
snum_waiters--;
mutex_exit(&srndpool_lock);
return (EINTR);
}
snum_waiters--;
}
}
bytes = min(HASHSIZE, len);
bytes = min(bytes, CRYPTO_BITS2BYTES(entropy_bits));
entropy_bits -= CRYPTO_BYTES2BITS(bytes);
BUMP_SWRAND_STATS(ss_entOut, CRYPTO_BYTES2BITS(bytes));
swrand_stats.ss_entEst = entropy_bits;
HashInit(&hashctx);
HashUpdate(&hashctx, (uint8_t *)srndpool, RNDPOOLSIZE);
HashFinal(digest, &hashctx);
pool = (uint8_t *)srndpool;
for (i = 0; i < HASHSIZE; i++) {
pool[pindex++] ^= digest[i];
pindex &= (RNDPOOLSIZE - 1);
}
fips_random_inner(swrand_XKEY, tempout, (uint32_t *)digest);
if (len >= HASHSIZE) {
size = HASHSIZE;
} else {
size = min(bytes, HASHSIZE);
}
for (i = 0; i < HASHSIZE/BYTES_IN_WORD; i++) {
if (tempout[i] != previous_bytes[i])
break;
}
if (i == HASHSIZE/BYTES_IN_WORD) {
cmn_err(CE_WARN, "swrand: The value of 160-bit block "
"random bytes are same as the previous one.\n");
return (EIO);
}
bcopy(tempout, previous_bytes, HASHSIZE);
bcopy(tempout, ptr, size);
if (len < HASHSIZE) {
leftover_bytes = HASHSIZE - bytes;
bcopy((uint8_t *)tempout + bytes, leftover,
leftover_bytes);
}
ptr += size;
len -= size;
BUMP_SWRAND_STATS(ss_bytesOut, size);
}
bzero(digest, HASHSIZE);
bzero(tempout, HASHSIZE);
mutex_exit(&srndpool_lock);
return (0);
}
#define SWRAND_ADD_BYTES(ptr, len, i, pool) \
ASSERT((ptr) != NULL && (len) > 0); \
BUMP_SWRAND_STATS(ss_bytesIn, (len)); \
while ((len)--) { \
(pool)[(i)++] ^= *(ptr); \
(ptr)++; \
(i) &= (RNDPOOLSIZE - 1); \
}
static void
swrand_add_bytes(uint8_t *ptr, size_t len)
{
uint8_t *pool = (uint8_t *)srndpool;
ASSERT(MUTEX_HELD(&srndpool_lock));
SWRAND_ADD_BYTES(ptr, len, pindex, pool);
}
static void
swrand_add_bytes_later(uint8_t *ptr, size_t len)
{
uint8_t *pool = (uint8_t *)buffer;
ASSERT(MUTEX_HELD(&buffer_lock));
SWRAND_ADD_BYTES(ptr, len, bindex, pool);
buffer_bytes += len;
}
#undef SWRAND_ADD_BYTES
static void
swrand_mix_pool(uint16_t entropy_est)
{
int i, j, k, start;
HASH_CTX hashctx;
uint8_t digest[HASHSIZE];
uint8_t *pool = (uint8_t *)srndpool;
uint8_t *bp = (uint8_t *)buffer;
ASSERT(MUTEX_HELD(&srndpool_lock));
mutex_enter(&buffer_lock);
if (buffer_bytes > 0) {
if (buffer_bytes >= RNDPOOLSIZE) {
for (i = 0; i < RNDPOOLSIZE/4; i++) {
srndpool[i] ^= buffer[i];
buffer[i] = 0;
}
bstart = bindex = 0;
} else {
for (i = 0; i < buffer_bytes; i++) {
pool[pindex++] ^= bp[bstart];
bp[bstart++] = 0;
pindex &= (RNDPOOLSIZE - 1);
bstart &= (RNDPOOLSIZE - 1);
}
ASSERT(bstart == bindex);
}
buffer_bytes = 0;
}
mutex_exit(&buffer_lock);
start = 0;
for (i = 0; i < RNDPOOLSIZE/HASHSIZE + 1; i++) {
HashInit(&hashctx);
if (start + HASHBUFSIZE <= RNDPOOLSIZE)
HashUpdate(&hashctx, &pool[start], HASHBUFSIZE);
else {
HashUpdate(&hashctx, &pool[start],
RNDPOOLSIZE - start);
HashUpdate(&hashctx, pool,
HASHBUFSIZE - RNDPOOLSIZE + start);
}
HashFinal(digest, &hashctx);
k = (start + HASHSIZE) & (RNDPOOLSIZE - 1);
for (j = 0; j < HASHSIZE; j++) {
pool[k++] ^= digest[j];
k &= (RNDPOOLSIZE - 1);
}
start = (start + HASHSIZE) & (RNDPOOLSIZE - 1);
}
entropy_bits += entropy_est;
if (entropy_bits > CRYPTO_BYTES2BITS(RNDPOOLSIZE))
entropy_bits = CRYPTO_BYTES2BITS(RNDPOOLSIZE);
swrand_stats.ss_entEst = entropy_bits;
BUMP_SWRAND_STATS(ss_entIn, entropy_est);
}
static void
swrand_add_entropy_later(uint8_t *ptr, size_t len)
{
mutex_enter(&buffer_lock);
swrand_add_bytes_later(ptr, len);
mutex_exit(&buffer_lock);
}
static void
swrand_add_entropy(uint8_t *ptr, size_t len, uint16_t entropy_est)
{
mutex_enter(&srndpool_lock);
swrand_add_bytes(ptr, len);
swrand_mix_pool(entropy_est);
mutex_exit(&srndpool_lock);
}
static int
physmem_ent_init(physmem_entsrc_t *entsrc)
{
uint8_t *ptr;
int i;
bzero(entsrc, sizeof (*entsrc));
i = CRYPTO_BYTES2BITS(MEMBLOCKSIZE);
while (i >>= 1)
entsrc->entperblock++;
physmem_count_blocks();
if (entsrc->nblocks == 0) {
cmn_err(CE_WARN, "no memory blocks to scan!");
return (-1);
}
entsrc->parity = kmem_alloc(howmany(entsrc->nblocks, 8),
KM_SLEEP);
entsrc->pmbuf = vmem_alloc(heap_arena, PAGESIZE, VM_SLEEP);
i = howmany(entsrc->nblocks, 8);
ptr = entsrc->parity;
while (i > 0) {
if (i > RNDPOOLSIZE) {
bcopy(srndpool, ptr, RNDPOOLSIZE);
mutex_enter(&srndpool_lock);
swrand_mix_pool(0);
mutex_exit(&srndpool_lock);
ptr += RNDPOOLSIZE;
i -= RNDPOOLSIZE;
} else {
bcopy(srndpool, ptr, i);
break;
}
}
mutex_enter(&srndpool_lock);
physmem_ent_gen(entsrc);
entropy_bits = 0;
mutex_exit(&srndpool_lock);
return (0);
}
static void
physmem_ent_fini(physmem_entsrc_t *entsrc)
{
if (entsrc->pmbuf != NULL)
vmem_free(heap_arena, entsrc->pmbuf, PAGESIZE);
if (entsrc->parity != NULL)
kmem_free(entsrc->parity, howmany(entsrc->nblocks, 8));
bzero(entsrc, sizeof (*entsrc));
}
static void
physmem_ent_gen(physmem_entsrc_t *entsrc)
{
struct memlist *pmem;
offset_t offset, poffset;
pfn_t pfn;
int i, nbytes, len, ent = 0;
uint32_t block, oblock;
hrtime_t ts1, ts2, diff, delta, delta2, delta3;
uint8_t digest[HASHSIZE];
HASH_CTX ctx;
page_t *pp;
for (i = 0; i < RNDPOOLSIZE/4; i++) {
if (entropy_bits + ent >= CRYPTO_BYTES2BITS(RNDPOOLSIZE)) {
if (i > 0)
break;
}
memlist_read_lock();
ASSERT(entsrc->nblocks > 0);
block = oblock = srndpool[i] % entsrc->nblocks;
for (pmem = phys_install; pmem != NULL; pmem = pmem->ml_next) {
if (block < pmem->ml_size / MEMBLOCKSIZE)
break;
block -= pmem->ml_size / MEMBLOCKSIZE;
}
ASSERT(pmem != NULL);
offset = pmem->ml_address + block * MEMBLOCKSIZE;
if (!address_in_memlist(phys_install, offset, MEMBLOCKSIZE)) {
memlist_read_unlock();
continue;
}
if (plat_hold_page(offset >> PAGESHIFT, PLAT_HOLD_NO_LOCK, NULL)
== PLAT_HOLD_FAIL) {
memlist_read_unlock();
continue;
}
len = MEMBLOCKSIZE;
ts1 = gethrtime();
HashInit(&ctx);
while (len) {
pfn = offset >> PAGESHIFT;
poffset = offset & PAGEOFFSET;
nbytes = PAGESIZE - poffset < len ?
PAGESIZE - poffset : len;
if (plat_hold_page(pfn, PLAT_HOLD_LOCK, &pp) ==
PLAT_HOLD_FAIL)
break;
hat_devload(kas.a_hat, entsrc->pmbuf,
PAGESIZE, pfn, PROT_READ,
HAT_LOAD_NOCONSIST | HAT_LOAD_LOCK);
HashUpdate(&ctx, (uint8_t *)entsrc->pmbuf + poffset,
nbytes);
hat_unload(kas.a_hat, entsrc->pmbuf, PAGESIZE,
HAT_UNLOAD_UNLOCK);
plat_release_page(pp);
len -= nbytes;
offset += nbytes;
}
memlist_read_unlock();
if (len)
continue;
HashFinal(digest, &ctx);
ts2 = gethrtime();
diff = ts2 - ts1;
delta = diff - entsrc->last_diff;
if (delta < 0)
delta = -delta;
delta2 = delta - entsrc->last_delta;
if (delta2 < 0)
delta2 = -delta2;
delta3 = delta2 - entsrc->last_delta2;
if (delta3 < 0)
delta3 = -delta3;
entsrc->last_diff = diff;
entsrc->last_delta = delta;
entsrc->last_delta2 = delta2;
if (delta > delta2)
delta = delta2;
if (delta > delta3)
delta = delta3;
delta2 = 0;
while (delta >>= 1)
delta2++;
ent += delta2;
if (physmem_parity_update(entsrc->parity, oblock,
digest[0] & 1))
ent += 2 * entsrc->entperblock;
swrand_add_bytes(digest, HASHSIZE);
swrand_add_bytes((uint8_t *)&ts1, sizeof (ts1));
swrand_add_bytes((uint8_t *)&ts2, sizeof (ts2));
}
swrand_mix_pool(ent);
}
static int
physmem_parity_update(uint8_t *parity_vec, uint32_t block, int parity)
{
if (parity == ((parity_vec[block >> 3] >> (block & 7)) & 1))
return (0);
parity_vec[block >> 3] ^= 1 << (block & 7);
return (1);
}
static void
physmem_count_blocks()
{
struct memlist *pmem;
memlist_read_lock();
entsrc.nblocks = 0;
for (pmem = phys_install; pmem != NULL; pmem = pmem->ml_next) {
entsrc.nblocks += pmem->ml_size / MEMBLOCKSIZE;
if (entsrc.nblocks > MAXMEMBLOCKS) {
entsrc.nblocks = MAXMEMBLOCKS;
break;
}
}
memlist_read_unlock();
}
static void
rnd_dr_callback_post_add(void *arg, pgcnt_t delta)
{
physmem_count_blocks();
}
static int
rnd_dr_callback_pre_del(void *arg, pgcnt_t delta)
{
return (0);
}
static void
rnd_dr_callback_post_del(void *arg, pgcnt_t delta, int cancelled)
{
physmem_count_blocks();
}
static void
swrand_schedule_timeout(void)
{
clock_t ut;
ASSERT(MUTEX_HELD(&srndpool_lock));
ut = 700000 + (clock_t)(srndpool[0] & 0xFFFFF);
rnd_timeout_id = timeout(rnd_handler, NULL,
TIMEOUT_INTERVAL * drv_usectohz(ut));
}
static void
rnd_handler(void *arg)
{
mutex_enter(&srndpool_lock);
physmem_ent_gen(&entsrc);
if (snum_waiters > 0)
cv_broadcast(&srndpool_read_cv);
swrand_schedule_timeout();
mutex_exit(&srndpool_lock);
}