2019-05-23 17:14:39 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2008-05-31 04:09:44 +08:00
|
|
|
/*
|
|
|
|
* Randomness driver for virtio
|
|
|
|
* Copyright (C) 2007, 2008 Rusty Russell IBM Corporation
|
|
|
|
*/
|
2009-12-01 15:26:33 +08:00
|
|
|
|
2023-05-04 11:59:32 +08:00
|
|
|
#include <asm/barrier.h>
|
2008-05-31 04:09:44 +08:00
|
|
|
#include <linux/err.h>
|
|
|
|
#include <linux/hw_random.h>
|
|
|
|
#include <linux/scatterlist.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/virtio.h>
|
|
|
|
#include <linux/virtio_rng.h>
|
2011-07-04 01:35:48 +08:00
|
|
|
#include <linux/module.h>
|
2020-04-07 08:37:55 +08:00
|
|
|
#include <linux/slab.h>
|
2008-05-31 04:09:44 +08:00
|
|
|
|
2014-05-16 10:12:43 +08:00
|
|
|
static DEFINE_IDA(rng_index_ida);
|
2014-05-14 09:03:46 +08:00
|
|
|
|
|
|
|
struct virtrng_info {
|
|
|
|
struct hwrng hwrng;
|
|
|
|
struct virtqueue *vq;
|
2014-05-16 10:12:43 +08:00
|
|
|
char name[25];
|
|
|
|
int index;
|
virtio: rng: delay hwrng_register() till driver is ready
Instead of calling hwrng_register() in the probe routing, call it in the
scan routine. This ensures that when hwrng_register() is successful,
and it requests a few random bytes to seed the kernel's pool at init,
we're ready to service that request.
This will also enable us to remove the workaround added previously to
check whether probe was completed, and only then ask for data from the
host. The revert follows in the next commit.
There's a slight behaviour change here on unsuccessful hwrng_register().
Previously, when hwrng_register() failed, the probe() routine would
fail, and the vqs would be torn down, and driver would be marked not
initialized. Now, the vqs will remain initialized, driver would be
marked initialized as well, but won't be available in the list of RNGs
available to hwrng core. To fix the failures, the procedure remains the
same, i.e. unload and re-load the module, and hope things succeed the
next time around.
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2014-07-27 06:04:01 +08:00
|
|
|
bool hwrng_register_done;
|
2014-09-11 20:51:53 +08:00
|
|
|
bool hwrng_removed;
|
2021-10-28 18:11:08 +08:00
|
|
|
/* data transfer */
|
|
|
|
struct completion have_data;
|
|
|
|
unsigned int data_avail;
|
2021-10-28 18:11:10 +08:00
|
|
|
unsigned int data_idx;
|
2021-10-28 18:11:08 +08:00
|
|
|
/* minimal size returned by rng_buffer_size() */
|
|
|
|
#if SMP_CACHE_BYTES < 32
|
|
|
|
u8 data[32];
|
|
|
|
#else
|
|
|
|
u8 data[SMP_CACHE_BYTES];
|
|
|
|
#endif
|
2014-05-14 09:03:46 +08:00
|
|
|
};
|
2008-05-31 04:09:44 +08:00
|
|
|
|
|
|
|
static void random_recv_done(struct virtqueue *vq)
|
|
|
|
{
|
2014-05-14 09:03:46 +08:00
|
|
|
struct virtrng_info *vi = vq->vdev->priv;
|
2023-05-04 11:59:32 +08:00
|
|
|
unsigned int len;
|
2014-05-14 09:03:46 +08:00
|
|
|
|
2009-04-23 15:12:59 +08:00
|
|
|
/* We can get spurious callbacks, e.g. shared IRQs + virtio_pci. */
|
2023-05-04 11:59:32 +08:00
|
|
|
if (!virtqueue_get_buf(vi->vq, &len))
|
2009-04-23 15:12:59 +08:00
|
|
|
return;
|
2008-05-31 04:09:44 +08:00
|
|
|
|
2023-05-04 11:59:32 +08:00
|
|
|
smp_store_release(&vi->data_avail, len);
|
2014-05-14 09:03:46 +08:00
|
|
|
complete(&vi->have_data);
|
2008-05-31 04:09:44 +08:00
|
|
|
}
|
|
|
|
|
2021-10-28 18:11:11 +08:00
|
|
|
static void request_entropy(struct virtrng_info *vi)
|
2008-05-31 04:09:44 +08:00
|
|
|
{
|
|
|
|
struct scatterlist sg;
|
|
|
|
|
2021-10-28 18:11:11 +08:00
|
|
|
reinit_completion(&vi->have_data);
|
|
|
|
vi->data_idx = 0;
|
|
|
|
|
2021-10-28 18:11:08 +08:00
|
|
|
sg_init_one(&sg, vi->data, sizeof(vi->data));
|
2009-12-01 15:26:33 +08:00
|
|
|
|
2008-05-31 04:09:44 +08:00
|
|
|
/* There should always be room for one buffer. */
|
2021-10-28 18:11:08 +08:00
|
|
|
virtqueue_add_inbuf(vi->vq, &sg, 1, vi->data, GFP_KERNEL);
|
2009-12-01 15:26:33 +08:00
|
|
|
|
2014-05-14 09:03:46 +08:00
|
|
|
virtqueue_kick(vi->vq);
|
2008-05-31 04:09:44 +08:00
|
|
|
}
|
|
|
|
|
2021-10-28 18:11:10 +08:00
|
|
|
static unsigned int copy_data(struct virtrng_info *vi, void *buf,
|
|
|
|
unsigned int size)
|
|
|
|
{
|
|
|
|
size = min_t(unsigned int, size, vi->data_avail);
|
|
|
|
memcpy(buf, vi->data + vi->data_idx, size);
|
|
|
|
vi->data_idx += size;
|
|
|
|
vi->data_avail -= size;
|
2021-10-28 18:11:11 +08:00
|
|
|
if (vi->data_avail == 0)
|
|
|
|
request_entropy(vi);
|
2021-10-28 18:11:10 +08:00
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2009-12-01 15:26:33 +08:00
|
|
|
static int virtio_read(struct hwrng *rng, void *buf, size_t size, bool wait)
|
2008-05-31 04:09:44 +08:00
|
|
|
{
|
2012-05-28 14:48:40 +08:00
|
|
|
int ret;
|
2014-05-14 09:03:46 +08:00
|
|
|
struct virtrng_info *vi = (struct virtrng_info *)rng->priv;
|
2021-10-28 18:11:08 +08:00
|
|
|
unsigned int chunk;
|
|
|
|
size_t read;
|
2008-05-31 04:09:44 +08:00
|
|
|
|
2014-09-11 20:51:53 +08:00
|
|
|
if (vi->hwrng_removed)
|
|
|
|
return -ENODEV;
|
|
|
|
|
2021-10-28 18:11:10 +08:00
|
|
|
read = 0;
|
|
|
|
|
|
|
|
/* copy available data */
|
2023-05-04 11:59:32 +08:00
|
|
|
if (smp_load_acquire(&vi->data_avail)) {
|
2021-10-28 18:11:10 +08:00
|
|
|
chunk = copy_data(vi, buf, size);
|
|
|
|
size -= chunk;
|
|
|
|
read += chunk;
|
2009-12-01 15:26:33 +08:00
|
|
|
}
|
|
|
|
|
2008-05-31 04:09:44 +08:00
|
|
|
if (!wait)
|
2021-10-28 18:11:10 +08:00
|
|
|
return read;
|
2008-05-31 04:09:44 +08:00
|
|
|
|
2021-10-28 18:11:10 +08:00
|
|
|
/* We have already copied available entropy,
|
|
|
|
* so either size is 0 or data_avail is 0
|
|
|
|
*/
|
2021-10-28 18:11:08 +08:00
|
|
|
while (size != 0) {
|
2021-10-28 18:11:11 +08:00
|
|
|
/* data_avail is 0 but a request is pending */
|
2021-10-28 18:11:08 +08:00
|
|
|
ret = wait_for_completion_killable(&vi->have_data);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2021-10-28 18:11:09 +08:00
|
|
|
/* if vi->data_avail is 0, we have been interrupted
|
|
|
|
* by a cleanup, but buffer stays in the queue
|
|
|
|
*/
|
|
|
|
if (vi->data_avail == 0)
|
|
|
|
return read;
|
2021-10-28 18:11:08 +08:00
|
|
|
|
2021-10-28 18:11:10 +08:00
|
|
|
chunk = copy_data(vi, buf + read, size);
|
2021-10-28 18:11:08 +08:00
|
|
|
size -= chunk;
|
2021-10-28 18:11:10 +08:00
|
|
|
read += chunk;
|
2021-10-28 18:11:08 +08:00
|
|
|
}
|
2009-06-13 12:16:39 +08:00
|
|
|
|
2021-10-28 18:11:08 +08:00
|
|
|
return read;
|
2008-05-31 04:09:44 +08:00
|
|
|
}
|
|
|
|
|
2009-12-01 15:26:33 +08:00
|
|
|
static void virtio_cleanup(struct hwrng *rng)
|
2008-05-31 04:09:44 +08:00
|
|
|
{
|
2014-05-14 09:03:46 +08:00
|
|
|
struct virtrng_info *vi = (struct virtrng_info *)rng->priv;
|
2009-12-01 15:26:33 +08:00
|
|
|
|
2021-10-28 18:11:11 +08:00
|
|
|
complete(&vi->have_data);
|
2014-05-14 09:03:46 +08:00
|
|
|
}
|
2008-05-31 04:09:44 +08:00
|
|
|
|
2012-05-28 14:48:42 +08:00
|
|
|
static int probe_common(struct virtio_device *vdev)
|
2008-05-31 04:09:44 +08:00
|
|
|
{
|
2014-05-16 10:12:43 +08:00
|
|
|
int err, index;
|
2014-05-14 09:03:46 +08:00
|
|
|
struct virtrng_info *vi = NULL;
|
|
|
|
|
2014-05-16 10:11:57 +08:00
|
|
|
vi = kzalloc(sizeof(struct virtrng_info), GFP_KERNEL);
|
2014-05-16 10:12:43 +08:00
|
|
|
if (!vi)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
vi->index = index = ida_simple_get(&rng_index_ida, 0, 0, GFP_KERNEL);
|
|
|
|
if (index < 0) {
|
2014-10-15 07:52:33 +08:00
|
|
|
err = index;
|
|
|
|
goto err_ida;
|
2014-05-16 10:12:43 +08:00
|
|
|
}
|
|
|
|
sprintf(vi->name, "virtio_rng.%d", index);
|
2014-05-14 09:03:46 +08:00
|
|
|
init_completion(&vi->have_data);
|
|
|
|
|
2014-05-16 10:12:43 +08:00
|
|
|
vi->hwrng = (struct hwrng) {
|
|
|
|
.read = virtio_read,
|
|
|
|
.cleanup = virtio_cleanup,
|
|
|
|
.priv = (unsigned long)vi,
|
|
|
|
.name = vi->name,
|
|
|
|
};
|
2014-05-14 09:03:46 +08:00
|
|
|
vdev->priv = vi;
|
2008-05-31 04:09:44 +08:00
|
|
|
|
|
|
|
/* We expect a single virtqueue. */
|
2014-05-14 09:03:46 +08:00
|
|
|
vi->vq = virtio_find_single_vq(vdev, random_recv_done, "input");
|
|
|
|
if (IS_ERR(vi->vq)) {
|
|
|
|
err = PTR_ERR(vi->vq);
|
2014-10-15 07:52:33 +08:00
|
|
|
goto err_find;
|
2013-03-08 08:30:18 +08:00
|
|
|
}
|
2008-05-31 04:09:44 +08:00
|
|
|
|
2022-06-08 14:14:22 +08:00
|
|
|
virtio_device_ready(vdev);
|
|
|
|
|
2021-10-28 18:11:11 +08:00
|
|
|
/* we always have a pending entropy request */
|
|
|
|
request_entropy(vi);
|
|
|
|
|
2008-05-31 04:09:44 +08:00
|
|
|
return 0;
|
2014-10-15 07:52:33 +08:00
|
|
|
|
|
|
|
err_find:
|
|
|
|
ida_simple_remove(&rng_index_ida, index);
|
|
|
|
err_ida:
|
|
|
|
kfree(vi);
|
|
|
|
return err;
|
2008-05-31 04:09:44 +08:00
|
|
|
}
|
|
|
|
|
2012-05-28 14:48:42 +08:00
|
|
|
static void remove_common(struct virtio_device *vdev)
|
2008-05-31 04:09:44 +08:00
|
|
|
{
|
2014-05-14 09:03:46 +08:00
|
|
|
struct virtrng_info *vi = vdev->priv;
|
virtio: rng: delay hwrng_register() till driver is ready
Instead of calling hwrng_register() in the probe routing, call it in the
scan routine. This ensures that when hwrng_register() is successful,
and it requests a few random bytes to seed the kernel's pool at init,
we're ready to service that request.
This will also enable us to remove the workaround added previously to
check whether probe was completed, and only then ask for data from the
host. The revert follows in the next commit.
There's a slight behaviour change here on unsuccessful hwrng_register().
Previously, when hwrng_register() failed, the probe() routine would
fail, and the vqs would be torn down, and driver would be marked not
initialized. Now, the vqs will remain initialized, driver would be
marked initialized as well, but won't be available in the list of RNGs
available to hwrng core. To fix the failures, the procedure remains the
same, i.e. unload and re-load the module, and hope things succeed the
next time around.
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2014-07-27 06:04:01 +08:00
|
|
|
|
2014-09-11 20:51:53 +08:00
|
|
|
vi->hwrng_removed = true;
|
2014-09-11 20:50:39 +08:00
|
|
|
vi->data_avail = 0;
|
2021-10-28 18:11:10 +08:00
|
|
|
vi->data_idx = 0;
|
2014-09-11 20:50:39 +08:00
|
|
|
complete(&vi->have_data);
|
virtio: rng: delay hwrng_register() till driver is ready
Instead of calling hwrng_register() in the probe routing, call it in the
scan routine. This ensures that when hwrng_register() is successful,
and it requests a few random bytes to seed the kernel's pool at init,
we're ready to service that request.
This will also enable us to remove the workaround added previously to
check whether probe was completed, and only then ask for data from the
host. The revert follows in the next commit.
There's a slight behaviour change here on unsuccessful hwrng_register().
Previously, when hwrng_register() failed, the probe() routine would
fail, and the vqs would be torn down, and driver would be marked not
initialized. Now, the vqs will remain initialized, driver would be
marked initialized as well, but won't be available in the list of RNGs
available to hwrng core. To fix the failures, the procedure remains the
same, i.e. unload and re-load the module, and hope things succeed the
next time around.
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2014-07-27 06:04:01 +08:00
|
|
|
if (vi->hwrng_register_done)
|
|
|
|
hwrng_unregister(&vi->hwrng);
|
2021-11-26 02:00:17 +08:00
|
|
|
virtio_reset_device(vdev);
|
2009-06-13 12:16:36 +08:00
|
|
|
vdev->config->del_vqs(vdev);
|
2014-05-16 10:12:43 +08:00
|
|
|
ida_simple_remove(&rng_index_ida, vi->index);
|
2014-05-14 09:03:46 +08:00
|
|
|
kfree(vi);
|
2008-05-31 04:09:44 +08:00
|
|
|
}
|
|
|
|
|
2012-05-28 14:48:42 +08:00
|
|
|
static int virtrng_probe(struct virtio_device *vdev)
|
|
|
|
{
|
|
|
|
return probe_common(vdev);
|
|
|
|
}
|
|
|
|
|
2012-11-20 02:26:26 +08:00
|
|
|
static void virtrng_remove(struct virtio_device *vdev)
|
2012-05-28 14:48:42 +08:00
|
|
|
{
|
|
|
|
remove_common(vdev);
|
|
|
|
}
|
|
|
|
|
virtio: rng: delay hwrng_register() till driver is ready
Instead of calling hwrng_register() in the probe routing, call it in the
scan routine. This ensures that when hwrng_register() is successful,
and it requests a few random bytes to seed the kernel's pool at init,
we're ready to service that request.
This will also enable us to remove the workaround added previously to
check whether probe was completed, and only then ask for data from the
host. The revert follows in the next commit.
There's a slight behaviour change here on unsuccessful hwrng_register().
Previously, when hwrng_register() failed, the probe() routine would
fail, and the vqs would be torn down, and driver would be marked not
initialized. Now, the vqs will remain initialized, driver would be
marked initialized as well, but won't be available in the list of RNGs
available to hwrng core. To fix the failures, the procedure remains the
same, i.e. unload and re-load the module, and hope things succeed the
next time around.
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2014-07-27 06:04:01 +08:00
|
|
|
static void virtrng_scan(struct virtio_device *vdev)
|
|
|
|
{
|
|
|
|
struct virtrng_info *vi = vdev->priv;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = hwrng_register(&vi->hwrng);
|
|
|
|
if (!err)
|
|
|
|
vi->hwrng_register_done = true;
|
|
|
|
}
|
|
|
|
|
2013-09-17 07:55:23 +08:00
|
|
|
#ifdef CONFIG_PM_SLEEP
|
2012-05-28 14:48:43 +08:00
|
|
|
static int virtrng_freeze(struct virtio_device *vdev)
|
|
|
|
{
|
|
|
|
remove_common(vdev);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int virtrng_restore(struct virtio_device *vdev)
|
|
|
|
{
|
2017-11-03 17:57:21 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
err = probe_common(vdev);
|
|
|
|
if (!err) {
|
|
|
|
struct virtrng_info *vi = vdev->priv;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set hwrng_removed to ensure that virtio_read()
|
|
|
|
* does not block waiting for data before the
|
|
|
|
* registration is complete.
|
|
|
|
*/
|
|
|
|
vi->hwrng_removed = true;
|
|
|
|
err = hwrng_register(&vi->hwrng);
|
|
|
|
if (!err) {
|
|
|
|
vi->hwrng_register_done = true;
|
|
|
|
vi->hwrng_removed = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
2012-05-28 14:48:43 +08:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-07-02 04:09:48 +08:00
|
|
|
static const struct virtio_device_id id_table[] = {
|
2008-05-31 04:09:44 +08:00
|
|
|
{ VIRTIO_ID_RNG, VIRTIO_DEV_ANY_ID },
|
|
|
|
{ 0 },
|
|
|
|
};
|
|
|
|
|
2010-01-16 09:01:26 +08:00
|
|
|
static struct virtio_driver virtio_rng_driver = {
|
2008-05-31 04:09:44 +08:00
|
|
|
.driver.name = KBUILD_MODNAME,
|
|
|
|
.driver.owner = THIS_MODULE,
|
|
|
|
.id_table = id_table,
|
|
|
|
.probe = virtrng_probe,
|
2012-12-22 07:12:08 +08:00
|
|
|
.remove = virtrng_remove,
|
virtio: rng: delay hwrng_register() till driver is ready
Instead of calling hwrng_register() in the probe routing, call it in the
scan routine. This ensures that when hwrng_register() is successful,
and it requests a few random bytes to seed the kernel's pool at init,
we're ready to service that request.
This will also enable us to remove the workaround added previously to
check whether probe was completed, and only then ask for data from the
host. The revert follows in the next commit.
There's a slight behaviour change here on unsuccessful hwrng_register().
Previously, when hwrng_register() failed, the probe() routine would
fail, and the vqs would be torn down, and driver would be marked not
initialized. Now, the vqs will remain initialized, driver would be
marked initialized as well, but won't be available in the list of RNGs
available to hwrng core. To fix the failures, the procedure remains the
same, i.e. unload and re-load the module, and hope things succeed the
next time around.
Signed-off-by: Amit Shah <amit.shah@redhat.com>
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2014-07-27 06:04:01 +08:00
|
|
|
.scan = virtrng_scan,
|
2013-09-17 07:55:23 +08:00
|
|
|
#ifdef CONFIG_PM_SLEEP
|
2012-05-28 14:48:43 +08:00
|
|
|
.freeze = virtrng_freeze,
|
|
|
|
.restore = virtrng_restore,
|
|
|
|
#endif
|
2008-05-31 04:09:44 +08:00
|
|
|
};
|
|
|
|
|
2013-02-13 14:29:28 +08:00
|
|
|
module_virtio_driver(virtio_rng_driver);
|
2008-05-31 04:09:44 +08:00
|
|
|
MODULE_DEVICE_TABLE(virtio, id_table);
|
|
|
|
MODULE_DESCRIPTION("Virtio random number driver");
|
|
|
|
MODULE_LICENSE("GPL");
|