/*- * Copyright (c) 2013, 2025, David E. O'Brien * Copyright (c) 2013 The FreeBSD Foundation * Copyright (c) 2012 Konstantin Belousov * All rights reserved. * * Portions of this software were developed by Konstantin Belousov * under sponsorship from the FreeBSD Foundation. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */ #include #include #include #include #include #include #include #include #include #include #include #include #include #define RETRY_COUNT 10 static u_int random_rdseed_read(void *, u_int); static struct random_source random_rdseed = { .rs_ident = "Intel Secure Key Seed", .rs_source = RANDOM_PURE_RDSEED, .rs_read = random_rdseed_read }; SYSCTL_NODE(_kern_random, OID_AUTO, rdseed, CTLFLAG_RW, 0, "rdseed (x86) entropy source"); /* XXX: kern.random.rdseed.enabled=0 also disables RDRAND */ static bool enabled = true; SYSCTL_BOOL(_kern_random_rdseed, OID_AUTO, enabled, CTLFLAG_RDTUN, &enabled, 0, "If zero, disable the use of RDSEED."); static bool x86_rdseed_store(u_long *buf) { u_long rndval; int retry; retry = RETRY_COUNT; __asm __volatile( "1:\n\t" "rdseed %1\n\t" /* read randomness into rndval */ "jc 2f\n\t" /* CF is set on success, exit retry loop */ "dec %0\n\t" /* otherwise, retry-- */ "jne 1b\n\t" /* and loop if retries are not exhausted */ "2:" : "+r" (retry), "=r" (rndval) : : "cc"); *buf = rndval; return (retry != 0); } /* It is required that buf length is a multiple of sizeof(u_long). */ static u_int random_rdseed_read(void *buf, u_int c) { u_long *b, rndval; u_int count; KASSERT(c % sizeof(*b) == 0, ("partial read %d", c)); b = buf; for (count = c; count > 0; count -= sizeof(*b)) { if (!x86_rdseed_store(&rndval)) break; *b++ = rndval; } return (c - count); } static int rdseed_modevent(module_t mod, int type, void *unused) { bool has_rdseed; int error = 0; has_rdseed = (cpu_stdext_feature & CPUID_STDEXT_RDSEED); switch (type) { case MOD_LOAD: if (has_rdseed && enabled) { random_source_register(&random_rdseed); printf("random: fast provider: \"%s\"\n", random_rdseed.rs_ident); } break; case MOD_UNLOAD: if (has_rdseed) random_source_deregister(&random_rdseed); break; case MOD_SHUTDOWN: break; default: error = EOPNOTSUPP; break; } return (error); } static moduledata_t rdseed_mod = { "rdseed", rdseed_modevent, 0 }; DECLARE_MODULE(rdseed, rdseed_mod, SI_SUB_RANDOM, SI_ORDER_FOURTH); MODULE_VERSION(rdseed, 1); MODULE_DEPEND(rdseed, random_harvestq, 1, 1, 1); /* * Intel's RDSEED Entropy Assessment Report min-entropy claim is 0.6 Shannons * per bit of data output. Rrefer to the following Entropy Source Validation * (ESV) certificates: * * E#87: Junos OS Physical Entropy Source - Broadwell EP 10-Core Die * Broadwell-EP-10 FCLGA2011 Intel(R) Xeon(R) E5-2620 V4 Processor * https://csrc.nist.gov/projects/cryptographic-module-validation-program/entropy-validations/certificate/87 * (URLs below omitted for brevity but follow same format.) * * E#121: Junos OS Physical Entropy Source - Intel Atom C3000 Series * (Denverton) 16 Core Die with FCBGA1310 Package * * E#122: Junos OS Physical Entropy Source - Intel Xeon D-1500 Family * (Broadwell) 8 Core Die with FCBGA1667 Package * * E#123: Junos OS Physical Entropy Source - Intel Xeon D-2100 Series * (Skylake) 18 Core Die with FCBGA2518 Package * * E#141: Junos OS Physical Entropy Source - Intel Xeon D-10 Series * (Ice Lake-D-10) Die with FCBGA2227 Package * * E#169: Junos OS Physical Entropy Source - Intel Xeon AWS-1000 v4 and * E5 v4 (Broadwell EP) 15 Core Die with FCLGA2011 Package */