xref: /titanic_44/usr/src/uts/common/crypto/io/swrand.c (revision ee5416c9d7e449233197d5d20bc6b81e4ff091b2)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 /*
29  * Software based random number provider for the Kernel Cryptographic
30  * Framework (KCF). This provider periodically collects unpredictable input
31  * from external sources and processes it into a pool of entropy (randomness)
32  * in order to satisfy requests for random bits from kCF. It implements
33  * software-based mixing, extraction, and generation algorithms.
34  *
35  * A history note: The software-based algorithms in this file used to be
36  * part of the /dev/random driver.
37  */
38 
39 #include <sys/types.h>
40 #include <sys/errno.h>
41 #include <sys/debug.h>
42 #include <vm/seg_kmem.h>
43 #include <vm/hat.h>
44 #include <sys/systm.h>
45 #include <sys/memlist.h>
46 #include <sys/cmn_err.h>
47 #include <sys/ksynch.h>
48 #include <sys/random.h>
49 #include <sys/ddi.h>
50 #include <sys/mman.h>
51 #include <sys/sysmacros.h>
52 #include <sys/mem_config.h>
53 #include <sys/time.h>
54 #include <sys/crypto/spi.h>
55 #include <sys/sha1.h>
56 #include <sys/sunddi.h>
57 #include <sys/modctl.h>
58 #include <sys/hold_page.h>
59 
60 #define	RNDPOOLSIZE		1024	/* Pool size in bytes */
61 #define	HASHBUFSIZE		64	/* Buffer size used for pool mixing */
62 #define	MAXMEMBLOCKS		16384	/* Number of memory blocks to scan */
63 #define	MEMBLOCKSIZE		4096	/* Size of memory block to read */
64 #define	MINEXTRACTBITS		160	/* Min entropy level for extraction */
65 #define	TIMEOUT_INTERVAL	5	/* Periodic mixing interval in secs */
66 
67 /* Hash-algo generic definitions. For now, they are SHA1's. */
68 #define	HASHSIZE		20
69 #define	HASH_CTX		SHA1_CTX
70 #define	HashInit(ctx)		SHA1Init((ctx))
71 #define	HashUpdate(ctx, p, s)	SHA1Update((ctx), (p), (s))
72 #define	HashFinal(d, ctx)	SHA1Final((d), (ctx))
73 
74 /* Physical memory entropy source */
75 typedef struct physmem_entsrc_s {
76 	uint8_t *parity;		/* parity bit vector */
77 	caddr_t pmbuf;			/* buffer for memory block */
78 	uint32_t nblocks;		/* number of  memory blocks */
79 	int entperblock;		/* entropy bits per block read */
80 	hrtime_t last_diff;		/* previous time to process a block */
81 	hrtime_t last_delta;		/* previous time delta */
82 	hrtime_t last_delta2;		/* previous 2nd order time delta */
83 } physmem_entsrc_t;
84 
85 static uint32_t srndpool[RNDPOOLSIZE/4];	/* Pool of random bits */
86 static uint32_t buffer[RNDPOOLSIZE/4];	/* entropy mixed in later */
87 static int buffer_bytes;		/* bytes written to buffer */
88 static uint32_t entropy_bits;		/* pool's current amount of entropy */
89 static kmutex_t srndpool_lock;		/* protects r/w accesses to the pool, */
90 					/* and the global variables */
91 static kmutex_t buffer_lock;		/* protects r/w accesses to buffer */
92 static kcondvar_t srndpool_read_cv;	/* serializes poll/read syscalls */
93 static int pindex;			/* Global index for adding/extracting */
94 					/* from the pool */
95 static int bstart, bindex;		/* Global vars for adding/extracting */
96 					/* from the buffer */
97 static uint8_t leftover[HASHSIZE];	/* leftover output */
98 static int leftover_bytes;		/* leftover length */
99 
100 static physmem_entsrc_t entsrc;		/* Physical mem as an entropy source */
101 static timeout_id_t rnd_timeout_id;
102 static int snum_waiters;
103 static crypto_kcf_provider_handle_t swrand_prov_handle = NULL;
104 swrand_stats_t swrand_stats;
105 
106 static int physmem_ent_init(physmem_entsrc_t *);
107 static void physmem_ent_fini(physmem_entsrc_t *);
108 static void physmem_ent_gen(physmem_entsrc_t *);
109 static int physmem_parity_update(uint8_t *, uint32_t, int);
110 static void physmem_count_blocks();
111 static void rnd_dr_callback_post_add(void *, pgcnt_t);
112 static int rnd_dr_callback_pre_del(void *, pgcnt_t);
113 static void rnd_dr_callback_post_del(void *, pgcnt_t, int);
114 static void rnd_handler(void *arg);
115 static void swrand_init();
116 static void swrand_schedule_timeout(void);
117 static int swrand_get_entropy(uint8_t *ptr, size_t len, boolean_t);
118 static void swrand_add_entropy(uint8_t *ptr, size_t len, uint16_t entropy_est);
119 static void swrand_add_entropy_later(uint8_t *ptr, size_t len);
120 
121 /* Dynamic Reconfiguration related declarations */
122 kphysm_setup_vector_t rnd_dr_callback_vec = {
123 	KPHYSM_SETUP_VECTOR_VERSION,
124 	rnd_dr_callback_post_add,
125 	rnd_dr_callback_pre_del,
126 	rnd_dr_callback_post_del
127 };
128 
129 extern struct mod_ops mod_cryptoops;
130 
131 /*
132  * Module linkage information for the kernel.
133  */
134 static struct modlcrypto modlcrypto = {
135 	&mod_cryptoops,
136 	"Kernel Random number Provider %I%"
137 };
138 
139 static struct modlinkage modlinkage = {
140 	MODREV_1,
141 	(void *)&modlcrypto,
142 	NULL
143 };
144 
145 /*
146  * CSPI information (entry points, provider info, etc.)
147  */
148 static void swrand_provider_status(crypto_provider_handle_t, uint_t *);
149 
150 static crypto_control_ops_t swrand_control_ops = {
151 	swrand_provider_status
152 };
153 
154 static int swrand_seed_random(crypto_provider_handle_t, crypto_session_id_t,
155     uchar_t *, size_t, uint_t, uint32_t, crypto_req_handle_t);
156 static int swrand_generate_random(crypto_provider_handle_t,
157     crypto_session_id_t, uchar_t *, size_t, crypto_req_handle_t);
158 
159 static crypto_random_number_ops_t swrand_random_number_ops = {
160 	swrand_seed_random,
161 	swrand_generate_random
162 };
163 
164 static crypto_ops_t swrand_crypto_ops = {
165 	&swrand_control_ops,
166 	NULL,
167 	NULL,
168 	NULL,
169 	NULL,
170 	NULL,
171 	NULL,
172 	NULL,
173 	&swrand_random_number_ops,
174 	NULL,
175 	NULL,
176 	NULL,
177 	NULL,
178 	NULL
179 };
180 
181 static crypto_provider_info_t swrand_prov_info = {
182 	CRYPTO_SPI_VERSION_1,
183 	"Kernel Random Number Provider",
184 	CRYPTO_SW_PROVIDER,
185 	{&modlinkage},
186 	NULL,
187 	&swrand_crypto_ops,
188 	0,
189 	NULL
190 };
191 
192 int
193 _init(void)
194 {
195 	int ret;
196 	hrtime_t ts;
197 	time_t now;
198 
199 	/*
200 	 * Register with KCF. If the registration fails, return error.
201 	 */
202 	if ((ret = crypto_register_provider(&swrand_prov_info,
203 	    &swrand_prov_handle)) != CRYPTO_SUCCESS) {
204 		cmn_err(CE_WARN, "swrand : Kernel Random Number Provider "
205 		    "disabled for /dev/random use");
206 		return (EACCES);
207 	}
208 
209 	mutex_init(&srndpool_lock, NULL, MUTEX_DEFAULT, NULL);
210 	mutex_init(&buffer_lock, NULL, MUTEX_DEFAULT, NULL);
211 	cv_init(&srndpool_read_cv, NULL, CV_DEFAULT, NULL);
212 	entropy_bits = 0;
213 	pindex = 0;
214 	bindex = 0;
215 	bstart = 0;
216 	snum_waiters = 0;
217 	leftover_bytes = 0;
218 	buffer_bytes = 0;
219 
220 	/*
221 	 * Initialize the pool using
222 	 * . 2 unpredictable times: high resolution time since the boot-time,
223 	 *   and the current time-of-the day.
224 	 * . The initial physical memory state.
225 	 */
226 	ts = gethrtime();
227 	swrand_add_entropy((uint8_t *)&ts, sizeof (ts), 0);
228 
229 	(void) drv_getparm(TIME, &now);
230 	swrand_add_entropy((uint8_t *)&now, sizeof (now), 0);
231 
232 	ret = kphysm_setup_func_register(&rnd_dr_callback_vec, NULL);
233 	ASSERT(ret == 0);
234 
235 	if (physmem_ent_init(&entsrc) != 0) {
236 		mutex_destroy(&srndpool_lock);
237 		mutex_destroy(&buffer_lock);
238 		cv_destroy(&srndpool_read_cv);
239 		(void) crypto_unregister_provider(swrand_prov_handle);
240 		return (ENOMEM);
241 	}
242 
243 	if ((ret = mod_install(&modlinkage)) != 0) {
244 		mutex_destroy(&srndpool_lock);
245 		mutex_destroy(&buffer_lock);
246 		cv_destroy(&srndpool_read_cv);
247 		physmem_ent_fini(&entsrc);
248 		(void) crypto_unregister_provider(swrand_prov_handle);
249 		return (ret);
250 	}
251 
252 	/* Schedule periodic mixing of the pool. */
253 	mutex_enter(&srndpool_lock);
254 	swrand_schedule_timeout();
255 	mutex_exit(&srndpool_lock);
256 
257 	return (0);
258 }
259 
260 int
261 _info(struct modinfo *modinfop)
262 {
263 	return (mod_info(&modlinkage, modinfop));
264 }
265 
266 /*
267  * Control entry points.
268  */
269 /* ARGSUSED */
270 static void
271 swrand_provider_status(crypto_provider_handle_t provider, uint_t *status)
272 {
273 	*status = CRYPTO_PROVIDER_READY;
274 }
275 
276 /*
277  * Random number entry points.
278  */
279 /* ARGSUSED */
280 static int
281 swrand_seed_random(crypto_provider_handle_t provider, crypto_session_id_t sid,
282     uchar_t *buf, size_t len, uint_t entropy_est, uint32_t flags,
283     crypto_req_handle_t req)
284 {
285 	/* The entropy estimate is always 0 in this path */
286 	if (flags & CRYPTO_SEED_NOW)
287 		swrand_add_entropy(buf, len, 0);
288 	else
289 		swrand_add_entropy_later(buf, len);
290 	return (CRYPTO_SUCCESS);
291 }
292 
293 /* ARGSUSED */
294 static int
295 swrand_generate_random(crypto_provider_handle_t provider,
296     crypto_session_id_t sid, uchar_t *buf, size_t len, crypto_req_handle_t req)
297 {
298 	if (crypto_kmflag(req) == KM_NOSLEEP)
299 		(void) swrand_get_entropy(buf, len, B_TRUE);
300 	else
301 		(void) swrand_get_entropy(buf, len, B_FALSE);
302 
303 	return (CRYPTO_SUCCESS);
304 }
305 
306 
307 /*
308  * Extraction of entropy from the pool.
309  *
310  * Returns "len" random bytes in *ptr.
311  * Try to gather some more entropy by calling physmem_ent_gen() when less than
312  * MINEXTRACTBITS are present in the pool.
313  * Will block if not enough entropy was available and the call is blocking.
314  */
315 static int
316 swrand_get_entropy(uint8_t *ptr, size_t len, boolean_t nonblock)
317 {
318 	int i, bytes;
319 	HASH_CTX hashctx;
320 	uint8_t digest[HASHSIZE], *pool;
321 
322 	mutex_enter(&srndpool_lock);
323 	if (leftover_bytes > 0) {
324 		bytes = min(len, leftover_bytes);
325 		bcopy(leftover, ptr, bytes);
326 		len -= bytes;
327 		ptr += bytes;
328 		leftover_bytes -= bytes;
329 		if (leftover_bytes > 0)
330 			ovbcopy(leftover+bytes, leftover, leftover_bytes);
331 	}
332 
333 	while (len > 0) {
334 
335 		/* Check if there is enough entropy */
336 		while (entropy_bits < MINEXTRACTBITS) {
337 
338 			physmem_ent_gen(&entsrc);
339 
340 			if (entropy_bits < MINEXTRACTBITS &&
341 			    nonblock == B_TRUE) {
342 				mutex_exit(&srndpool_lock);
343 				return (EAGAIN);
344 			}
345 
346 			if (entropy_bits < MINEXTRACTBITS) {
347 				ASSERT(nonblock == B_FALSE);
348 				snum_waiters++;
349 				if (cv_wait_sig(&srndpool_read_cv,
350 				    &srndpool_lock) == 0) {
351 					snum_waiters--;
352 					mutex_exit(&srndpool_lock);
353 					return (EINTR);
354 				}
355 				snum_waiters--;
356 			}
357 		}
358 
359 		/* Figure out how many bytes to extract */
360 		bytes = min(HASHSIZE, len);
361 		bytes = min(bytes, entropy_bits/8);
362 		entropy_bits -= bytes * 8;
363 		BUMP_SWRAND_STATS(ss_entOut, bytes * 8);
364 		swrand_stats.ss_entEst = entropy_bits;
365 
366 		/* Extract entropy by hashing pool content */
367 		HashInit(&hashctx);
368 		HashUpdate(&hashctx, (uint8_t *)srndpool, RNDPOOLSIZE);
369 		HashFinal(digest, &hashctx);
370 
371 		/*
372 		 * Feed the digest back into the pool so next
373 		 * extraction produces different result
374 		 */
375 		pool = (uint8_t *)srndpool;
376 		for (i = 0; i < HASHSIZE; i++) {
377 			pool[pindex++] ^= digest[i];
378 			/* pindex modulo RNDPOOLSIZE */
379 			pindex &= (RNDPOOLSIZE - 1);
380 		}
381 
382 		/*
383 		 * Hash the digest again before output to obscure
384 		 * what was fed back to the pool.
385 		 */
386 		HashInit(&hashctx);
387 		HashUpdate(&hashctx, digest, HASHSIZE);
388 		if (len >= HASHSIZE)
389 			HashFinal(ptr, &hashctx);
390 		else {
391 			HashFinal(digest, &hashctx);
392 			bcopy(digest, ptr, bytes);
393 			leftover_bytes = HASHSIZE - bytes;
394 			bcopy(digest + bytes, leftover, leftover_bytes);
395 		}
396 
397 		len -= bytes;
398 		ptr += bytes;
399 		BUMP_SWRAND_STATS(ss_bytesOut, bytes);
400 	}
401 	mutex_exit(&srndpool_lock);
402 	return (0);
403 }
404 
405 #define	SWRAND_ADD_BYTES(ptr, len, i, pool)		\
406 	ASSERT((ptr) != NULL && (len) > 0);		\
407 	BUMP_SWRAND_STATS(ss_bytesIn, (len));		\
408 	while ((len)--) {				\
409 		(pool)[(i)++] ^= *(ptr);		\
410 		(ptr)++;				\
411 		(i) &= (RNDPOOLSIZE - 1);		\
412 	}
413 
414 /* Write some more user-provided entropy to the pool */
415 static void
416 swrand_add_bytes(uint8_t *ptr, size_t len)
417 {
418 	uint8_t *pool = (uint8_t *)srndpool;
419 
420 	ASSERT(MUTEX_HELD(&srndpool_lock));
421 	SWRAND_ADD_BYTES(ptr, len, pindex, pool);
422 }
423 
424 /*
425  * Add bytes to buffer. Adding the buffer to the random pool
426  * is deferred until the random pool is mixed.
427  */
428 static void
429 swrand_add_bytes_later(uint8_t *ptr, size_t len)
430 {
431 	uint8_t *pool = (uint8_t *)buffer;
432 
433 	ASSERT(MUTEX_HELD(&buffer_lock));
434 	SWRAND_ADD_BYTES(ptr, len, bindex, pool);
435 	buffer_bytes += len;
436 }
437 
438 #undef SWRAND_ADD_BYTES
439 
440 /* Mix the pool */
441 static void
442 swrand_mix_pool(uint16_t entropy_est)
443 {
444 	int i, j, k, start;
445 	HASH_CTX hashctx;
446 	uint8_t digest[HASHSIZE];
447 	uint8_t *pool = (uint8_t *)srndpool;
448 	uint8_t *bp = (uint8_t *)buffer;
449 
450 	ASSERT(MUTEX_HELD(&srndpool_lock));
451 
452 	/* add deferred bytes */
453 	mutex_enter(&buffer_lock);
454 	if (buffer_bytes > 0) {
455 		if (buffer_bytes >= RNDPOOLSIZE) {
456 			for (i = 0; i < RNDPOOLSIZE/4; i++) {
457 				srndpool[i] ^= buffer[i];
458 				buffer[i] = 0;
459 			}
460 			bstart = bindex = 0;
461 		} else {
462 			for (i = 0; i < buffer_bytes; i++) {
463 				pool[pindex++] ^= bp[bstart];
464 				bp[bstart++] = 0;
465 				pindex &= (RNDPOOLSIZE - 1);
466 				bstart &= (RNDPOOLSIZE - 1);
467 			}
468 			ASSERT(bstart == bindex);
469 		}
470 		buffer_bytes = 0;
471 	}
472 	mutex_exit(&buffer_lock);
473 
474 	start = 0;
475 	for (i = 0; i < RNDPOOLSIZE/HASHSIZE + 1; i++) {
476 		HashInit(&hashctx);
477 
478 		/* Hash a buffer centered on a block in the pool */
479 		if (start + HASHBUFSIZE <= RNDPOOLSIZE)
480 			HashUpdate(&hashctx, &pool[start], HASHBUFSIZE);
481 		else {
482 			HashUpdate(&hashctx, &pool[start],
483 			    RNDPOOLSIZE - start);
484 			HashUpdate(&hashctx, pool,
485 			    HASHBUFSIZE - RNDPOOLSIZE + start);
486 		}
487 		HashFinal(digest, &hashctx);
488 
489 		/* XOR the hash result back into the block */
490 		k = (start + HASHSIZE) & (RNDPOOLSIZE - 1);
491 		for (j = 0; j < HASHSIZE; j++) {
492 			pool[k++] ^= digest[j];
493 			k &= (RNDPOOLSIZE - 1);
494 		}
495 
496 		/* Slide the hash buffer and repeat with next block */
497 		start = (start + HASHSIZE) & (RNDPOOLSIZE - 1);
498 	}
499 
500 	entropy_bits += entropy_est;
501 	if (entropy_bits > RNDPOOLSIZE * 8)
502 		entropy_bits = RNDPOOLSIZE * 8;
503 
504 	swrand_stats.ss_entEst = entropy_bits;
505 	BUMP_SWRAND_STATS(ss_entIn, entropy_est);
506 }
507 
508 static void
509 swrand_add_entropy_later(uint8_t *ptr, size_t len)
510 {
511 	mutex_enter(&buffer_lock);
512 	swrand_add_bytes_later(ptr, len);
513 	mutex_exit(&buffer_lock);
514 }
515 
516 static void
517 swrand_add_entropy(uint8_t *ptr, size_t len, uint16_t entropy_est)
518 {
519 	mutex_enter(&srndpool_lock);
520 	swrand_add_bytes(ptr, len);
521 	swrand_mix_pool(entropy_est);
522 	mutex_exit(&srndpool_lock);
523 }
524 
525 /*
526  * The physmem_* routines below generate entropy by reading blocks of
527  * physical memory.  Entropy is gathered in a couple of ways:
528  *
529  *  - By reading blocks of physical memory and detecting if changes
530  *    occurred in the blocks read.
531  *
532  *  - By measuring the time it takes to load and hash a block of memory
533  *    and computing the differences in the measured time.
534  *
535  * The first method was used in the CryptoRand implementation.  Physical
536  * memory is divided into blocks of fixed size.  A block of memory is
537  * chosen from the possible blocks and hashed to produce a digest.  This
538  * digest is then mixed into the pool.  A single bit from the digest is
539  * used as a parity bit or "checksum" and compared against the previous
540  * "checksum" computed for the block.  If the single-bit checksum has not
541  * changed, no entropy is credited to the pool.  If there is a change,
542  * then the assumption is that at least one bit in the block has changed.
543  * The possible locations within the memory block of where the bit change
544  * occurred is used as a measure of entropy.  For example, if a block
545  * size of 4096 bytes is used, about log_2(4096*8)=15 bits worth of
546  * entropy is available.  Because the single-bit checksum will miss half
547  * of the changes, the amount of entropy credited to the pool is doubled
548  * when a change is detected.  With a 4096 byte block size, a block
549  * change will add a total of 30 bits of entropy to the pool.
550  *
551  * The second method measures the amount of time it takes to read and
552  * hash a physical memory block (as described above).  The time measured
553  * can vary depending on system load, scheduling and other factors.
554  * Differences between consecutive measurements are computed to come up
555  * with an entropy estimate.  The first, second, and third order delta is
556  * calculated to determine the minimum delta value.  The number of bits
557  * present in this minimum delta value is the entropy estimate.  This
558  * entropy estimation technique using time deltas is similar to that used
559  * in /dev/random implementations from Linux/BSD.
560  */
561 
562 static int
563 physmem_ent_init(physmem_entsrc_t *entsrc)
564 {
565 	uint8_t *ptr;
566 	int i;
567 
568 	bzero(entsrc, sizeof (*entsrc));
569 
570 	/*
571 	 * The maximum entropy amount in bits per block of memory read is
572 	 * log_2(MEMBLOCKSIZE * 8);
573 	 */
574 	i = MEMBLOCKSIZE << 3;
575 	while (i >>= 1)
576 		entsrc->entperblock++;
577 
578 	/* Initialize entsrc->nblocks */
579 	physmem_count_blocks();
580 
581 	if (entsrc->nblocks == 0) {
582 		cmn_err(CE_WARN, "no memory blocks to scan!");
583 		return (-1);
584 	}
585 
586 	/* Allocate space for the parity vector and memory page */
587 	entsrc->parity = kmem_alloc(howmany(entsrc->nblocks, 8),
588 	    KM_SLEEP);
589 	entsrc->pmbuf = vmem_alloc(heap_arena, PAGESIZE, VM_SLEEP);
590 
591 
592 	/* Initialize parity vector with bits from the pool */
593 	i = howmany(entsrc->nblocks, 8);
594 	ptr = entsrc->parity;
595 	while (i > 0) {
596 		if (i > RNDPOOLSIZE) {
597 			bcopy(srndpool, ptr, RNDPOOLSIZE);
598 			mutex_enter(&srndpool_lock);
599 			swrand_mix_pool(0);
600 			mutex_exit(&srndpool_lock);
601 			ptr += RNDPOOLSIZE;
602 			i -= RNDPOOLSIZE;
603 		} else {
604 			bcopy(srndpool, ptr, i);
605 			break;
606 		}
607 	}
608 
609 	/* Generate some entropy to further initialize the pool */
610 	mutex_enter(&srndpool_lock);
611 	physmem_ent_gen(entsrc);
612 	entropy_bits = 0;
613 	mutex_exit(&srndpool_lock);
614 
615 	return (0);
616 }
617 
618 static void
619 physmem_ent_fini(physmem_entsrc_t *entsrc)
620 {
621 	if (entsrc->pmbuf != NULL)
622 		vmem_free(heap_arena, entsrc->pmbuf, PAGESIZE);
623 	if (entsrc->parity != NULL)
624 		kmem_free(entsrc->parity, howmany(entsrc->nblocks, 8));
625 	bzero(entsrc, sizeof (*entsrc));
626 }
627 
628 static void
629 physmem_ent_gen(physmem_entsrc_t *entsrc)
630 {
631 	struct memlist *pmem;
632 	offset_t offset, poffset;
633 	pfn_t pfn;
634 	int i, nbytes, len, ent = 0;
635 	uint32_t block, oblock;
636 	hrtime_t ts1, ts2, diff, delta, delta2, delta3;
637 	uint8_t digest[HASHSIZE];
638 	HASH_CTX ctx;
639 	page_t *pp;
640 
641 	/*
642 	 * Use each 32-bit quantity in the pool to pick a memory
643 	 * block to read.
644 	 */
645 	for (i = 0; i < RNDPOOLSIZE/4; i++) {
646 
647 		/* If the pool is "full", stop after one block */
648 		if (entropy_bits + ent >= RNDPOOLSIZE * 8) {
649 			if (i > 0)
650 				break;
651 		}
652 
653 		/*
654 		 * This lock protects reading of phys_install.
655 		 * Any changes to this list, by DR, are done while
656 		 * holding this lock. So, holding this lock is sufficient
657 		 * to handle DR also.
658 		 */
659 		memlist_read_lock();
660 
661 		/* We're left with less than 4K of memory after DR */
662 		ASSERT(entsrc->nblocks > 0);
663 
664 		/* Pick a memory block to read */
665 		block = oblock = srndpool[i] % entsrc->nblocks;
666 
667 		for (pmem = phys_install; pmem != NULL; pmem = pmem->next) {
668 			if (block < pmem->size / MEMBLOCKSIZE)
669 				break;
670 			block -= pmem->size / MEMBLOCKSIZE;
671 		}
672 
673 		ASSERT(pmem != NULL);
674 
675 		offset = pmem->address + block * MEMBLOCKSIZE;
676 
677 		if (!address_in_memlist(phys_install, offset, MEMBLOCKSIZE)) {
678 			memlist_read_unlock();
679 			continue;
680 		}
681 
682 		/*
683 		 * Do an initial check to see if the address is safe
684 		 */
685 		if (plat_hold_page(offset >> PAGESHIFT, PLAT_HOLD_NO_LOCK, NULL)
686 		    == PLAT_HOLD_FAIL) {
687 			memlist_read_unlock();
688 			continue;
689 		}
690 
691 		/*
692 		 * Figure out which page to load to read the
693 		 * memory block.  Load the page and compute the
694 		 * hash of the memory block.
695 		 */
696 		len = MEMBLOCKSIZE;
697 		ts1 = gethrtime();
698 		HashInit(&ctx);
699 		while (len) {
700 			pfn = offset >> PAGESHIFT;
701 			poffset = offset & PAGEOFFSET;
702 			nbytes = PAGESIZE - poffset < len ?
703 			    PAGESIZE - poffset : len;
704 
705 			/*
706 			 * Re-check the offset, and lock the frame.  If the
707 			 * page was given away after the above check, we'll
708 			 * just bail out.
709 			 */
710 			if (plat_hold_page(pfn, PLAT_HOLD_LOCK, &pp) ==
711 			    PLAT_HOLD_FAIL)
712 				break;
713 
714 			hat_devload(kas.a_hat, entsrc->pmbuf,
715 			    PAGESIZE, pfn, PROT_READ,
716 			    HAT_LOAD_NOCONSIST | HAT_LOAD_LOCK);
717 
718 			HashUpdate(&ctx, (uint8_t *)entsrc->pmbuf + poffset,
719 			    nbytes);
720 
721 			hat_unload(kas.a_hat, entsrc->pmbuf, PAGESIZE,
722 			    HAT_UNLOAD_UNLOCK);
723 
724 			plat_release_page(pp);
725 
726 			len -= nbytes;
727 			offset += nbytes;
728 		}
729 		/* We got our pages. Let the DR roll */
730 		memlist_read_unlock();
731 
732 		/* See if we had to bail out due to a page being given away */
733 		if (len)
734 			continue;
735 
736 		HashFinal(digest, &ctx);
737 		ts2 = gethrtime();
738 
739 		/*
740 		 * Compute the time it took to load and hash the
741 		 * block and compare it against the previous
742 		 * measurement. The delta of the time values
743 		 * provides a small amount of entropy.  The
744 		 * minimum of the first, second, and third order
745 		 * delta is used to estimate how much entropy
746 		 * is present.
747 		 */
748 		diff = ts2 - ts1;
749 		delta = diff - entsrc->last_diff;
750 		if (delta < 0)
751 			delta = -delta;
752 		delta2 = delta - entsrc->last_delta;
753 		if (delta2 < 0)
754 			delta2 = -delta2;
755 		delta3 = delta2 - entsrc->last_delta2;
756 		if (delta3 < 0)
757 			delta3 = -delta3;
758 		entsrc->last_diff = diff;
759 		entsrc->last_delta = delta;
760 		entsrc->last_delta2 = delta2;
761 
762 		if (delta > delta2)
763 			delta = delta2;
764 		if (delta > delta3)
765 			delta = delta3;
766 		delta2 = 0;
767 		while (delta >>= 1)
768 			delta2++;
769 		ent += delta2;
770 
771 		/*
772 		 * If the memory block has changed, credit the pool with
773 		 * the entropy estimate.  The entropy estimate is doubled
774 		 * because the single-bit checksum misses half the change
775 		 * on average.
776 		 */
777 		if (physmem_parity_update(entsrc->parity, oblock,
778 		    digest[0] & 1))
779 			ent += 2 * entsrc->entperblock;
780 
781 		/* Add the entropy bytes to the pool */
782 		swrand_add_bytes(digest, HASHSIZE);
783 		swrand_add_bytes((uint8_t *)&ts1, sizeof (ts1));
784 		swrand_add_bytes((uint8_t *)&ts2, sizeof (ts2));
785 	}
786 
787 	swrand_mix_pool(ent);
788 }
789 
790 static int
791 physmem_parity_update(uint8_t *parity_vec, uint32_t block, int parity)
792 {
793 	/* Test and set the parity bit, return 1 if changed */
794 	if (parity == ((parity_vec[block >> 3] >> (block & 7)) & 1))
795 		return (0);
796 	parity_vec[block >> 3] ^= 1 << (block & 7);
797 	return (1);
798 }
799 
800 /* Compute number of memory blocks available to scan */
801 static void
802 physmem_count_blocks()
803 {
804 	struct memlist *pmem;
805 
806 	memlist_read_lock();
807 	entsrc.nblocks = 0;
808 	for (pmem = phys_install; pmem != NULL; pmem = pmem->next) {
809 		entsrc.nblocks += pmem->size / MEMBLOCKSIZE;
810 		if (entsrc.nblocks > MAXMEMBLOCKS) {
811 			entsrc.nblocks = MAXMEMBLOCKS;
812 			break;
813 		}
814 	}
815 	memlist_read_unlock();
816 }
817 
818 /*
819  * Dynamic Reconfiguration call-back functions
820  */
821 
822 /* ARGSUSED */
823 static void
824 rnd_dr_callback_post_add(void *arg, pgcnt_t delta)
825 {
826 	/* More memory is available now, so update entsrc->nblocks. */
827 	physmem_count_blocks();
828 }
829 
830 /* Call-back routine invoked before the DR starts a memory removal. */
831 /* ARGSUSED */
832 static int
833 rnd_dr_callback_pre_del(void *arg, pgcnt_t delta)
834 {
835 	return (0);
836 }
837 
838 /* Call-back routine invoked after the DR starts a memory removal. */
839 /* ARGSUSED */
840 static void
841 rnd_dr_callback_post_del(void *arg, pgcnt_t delta, int cancelled)
842 {
843 	/* Memory has shrunk, so update entsrc->nblocks. */
844 	physmem_count_blocks();
845 }
846 
847 /* Timeout handling to gather entropy from physmem events */
848 static void
849 swrand_schedule_timeout(void)
850 {
851 	clock_t ut;	/* time in microseconds */
852 
853 	ASSERT(MUTEX_HELD(&srndpool_lock));
854 	/*
855 	 * The new timeout value is taken from the pool of random bits.
856 	 * We're merely reading the first 32 bits from the pool here, not
857 	 * consuming any entropy.
858 	 * This routine is usually called right after stirring the pool, so
859 	 * srndpool[0] will have a *fresh* random value each time.
860 	 * The timeout multiplier value is a random value between 0.7 sec and
861 	 * 1.748575 sec (0.7 sec + 0xFFFFF microseconds).
862 	 * The new timeout is TIMEOUT_INTERVAL times that multiplier.
863 	 */
864 	ut = 700000 + (clock_t)(srndpool[0] & 0xFFFFF);
865 	rnd_timeout_id = timeout(rnd_handler, NULL,
866 	    TIMEOUT_INTERVAL * drv_usectohz(ut));
867 }
868 
869 /*ARGSUSED*/
870 static void
871 rnd_handler(void *arg)
872 {
873 	mutex_enter(&srndpool_lock);
874 
875 	physmem_ent_gen(&entsrc);
876 	if (snum_waiters > 0)
877 		cv_broadcast(&srndpool_read_cv);
878 	swrand_schedule_timeout();
879 
880 	mutex_exit(&srndpool_lock);
881 }
882