2012-06-20 14:59:32 +08:00
|
|
|
/*
|
|
|
|
* A virtio device implementing a hardware random number generator.
|
|
|
|
*
|
|
|
|
* Copyright 2012 Red Hat, Inc.
|
|
|
|
* Copyright 2012 Amit Shah <amit.shah@redhat.com>
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or
|
|
|
|
* (at your option) any later version. See the COPYING file in the
|
|
|
|
* top-level directory.
|
|
|
|
*/
|
|
|
|
|
2012-12-18 01:20:00 +08:00
|
|
|
#include "qemu/iov.h"
|
2013-02-04 22:40:22 +08:00
|
|
|
#include "hw/qdev.h"
|
2013-02-06 00:06:20 +08:00
|
|
|
#include "hw/virtio/virtio.h"
|
|
|
|
#include "hw/virtio/virtio-rng.h"
|
2013-04-08 22:55:25 +08:00
|
|
|
#include "sysemu/rng.h"
|
2014-01-17 00:34:39 +08:00
|
|
|
#include "qom/object_interfaces.h"
|
2014-08-04 18:52:44 +08:00
|
|
|
#include "trace.h"
|
2012-06-20 14:59:32 +08:00
|
|
|
|
|
|
|
static bool is_guest_ready(VirtIORNG *vrng)
|
|
|
|
{
|
2013-04-24 16:08:01 +08:00
|
|
|
VirtIODevice *vdev = VIRTIO_DEVICE(vrng);
|
2012-06-20 14:59:32 +08:00
|
|
|
if (virtio_queue_ready(vrng->vq)
|
2013-04-24 16:08:01 +08:00
|
|
|
&& (vdev->status & VIRTIO_CONFIG_S_DRIVER_OK)) {
|
2012-06-20 14:59:32 +08:00
|
|
|
return true;
|
|
|
|
}
|
2014-08-04 18:52:44 +08:00
|
|
|
trace_virtio_rng_guest_not_ready(vrng);
|
2012-06-20 14:59:32 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-11-30 06:02:56 +08:00
|
|
|
static size_t get_request_size(VirtQueue *vq, unsigned quota)
|
2012-06-20 14:59:32 +08:00
|
|
|
{
|
2012-11-21 13:51:18 +08:00
|
|
|
unsigned int in, out;
|
2012-06-20 14:59:32 +08:00
|
|
|
|
2012-11-30 06:02:56 +08:00
|
|
|
virtqueue_get_avail_bytes(vq, &in, &out, quota, 0);
|
2012-11-21 13:51:18 +08:00
|
|
|
return in;
|
2012-06-20 14:59:32 +08:00
|
|
|
}
|
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
static void virtio_rng_process(VirtIORNG *vrng);
|
|
|
|
|
2012-06-20 14:59:32 +08:00
|
|
|
/* Send data from a char device over to the guest */
|
|
|
|
static void chr_read(void *opaque, const void *buf, size_t size)
|
|
|
|
{
|
|
|
|
VirtIORNG *vrng = opaque;
|
2013-04-24 16:08:01 +08:00
|
|
|
VirtIODevice *vdev = VIRTIO_DEVICE(vrng);
|
2012-11-21 13:51:18 +08:00
|
|
|
VirtQueueElement elem;
|
2012-06-20 14:59:32 +08:00
|
|
|
size_t len;
|
|
|
|
int offset;
|
|
|
|
|
|
|
|
if (!is_guest_ready(vrng)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
vrng->quota_remaining -= size;
|
|
|
|
|
2012-06-20 14:59:32 +08:00
|
|
|
offset = 0;
|
|
|
|
while (offset < size) {
|
2012-11-21 13:51:18 +08:00
|
|
|
if (!virtqueue_pop(vrng->vq, &elem)) {
|
2012-06-20 14:59:32 +08:00
|
|
|
break;
|
|
|
|
}
|
2012-11-21 13:51:18 +08:00
|
|
|
len = iov_from_buf(elem.in_sg, elem.in_num,
|
2012-06-20 14:59:32 +08:00
|
|
|
0, buf + offset, size - offset);
|
|
|
|
offset += len;
|
|
|
|
|
2012-11-21 13:51:18 +08:00
|
|
|
virtqueue_push(vrng->vq, &elem, len);
|
2014-08-04 18:52:44 +08:00
|
|
|
trace_virtio_rng_pushed(vrng, len);
|
2012-06-20 14:59:32 +08:00
|
|
|
}
|
2013-04-24 16:08:01 +08:00
|
|
|
virtio_notify(vdev, vrng->vq);
|
2012-06-20 14:59:32 +08:00
|
|
|
}
|
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
static void virtio_rng_process(VirtIORNG *vrng)
|
2012-06-20 14:59:32 +08:00
|
|
|
{
|
2012-11-21 13:51:18 +08:00
|
|
|
size_t size;
|
2012-11-30 06:02:56 +08:00
|
|
|
unsigned quota;
|
2012-10-31 06:45:05 +08:00
|
|
|
|
|
|
|
if (!is_guest_ready(vrng)) {
|
|
|
|
return;
|
|
|
|
}
|
2012-06-20 14:59:32 +08:00
|
|
|
|
2012-11-30 06:02:56 +08:00
|
|
|
if (vrng->quota_remaining < 0) {
|
|
|
|
quota = 0;
|
|
|
|
} else {
|
|
|
|
quota = MIN((uint64_t)vrng->quota_remaining, (uint64_t)UINT32_MAX);
|
|
|
|
}
|
|
|
|
size = get_request_size(vrng->vq, quota);
|
2014-08-04 18:52:44 +08:00
|
|
|
|
|
|
|
trace_virtio_rng_request(vrng, size, quota);
|
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
size = MIN(vrng->quota_remaining, size);
|
2012-11-21 13:51:18 +08:00
|
|
|
if (size) {
|
2012-06-20 14:59:32 +08:00
|
|
|
rng_backend_request_entropy(vrng->rng, size, chr_read, vrng);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
static void handle_input(VirtIODevice *vdev, VirtQueue *vq)
|
|
|
|
{
|
2013-04-24 16:08:01 +08:00
|
|
|
VirtIORNG *vrng = VIRTIO_RNG(vdev);
|
2012-10-31 06:45:05 +08:00
|
|
|
virtio_rng_process(vrng);
|
|
|
|
}
|
|
|
|
|
2015-06-01 16:45:40 +08:00
|
|
|
static uint64_t get_features(VirtIODevice *vdev, uint64_t f)
|
2012-06-20 14:59:32 +08:00
|
|
|
{
|
|
|
|
return f;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void virtio_rng_save(QEMUFile *f, void *opaque)
|
|
|
|
{
|
2013-04-24 16:08:01 +08:00
|
|
|
VirtIODevice *vdev = opaque;
|
2012-06-20 14:59:32 +08:00
|
|
|
|
2013-04-24 16:08:01 +08:00
|
|
|
virtio_save(vdev, f);
|
2012-06-20 14:59:32 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int virtio_rng_load(QEMUFile *f, void *opaque, int version_id)
|
|
|
|
{
|
2014-11-27 13:48:10 +08:00
|
|
|
VirtIORNG *vrng = opaque;
|
|
|
|
int ret;
|
|
|
|
|
2012-06-20 14:59:32 +08:00
|
|
|
if (version_id != 1) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2014-11-27 13:48:10 +08:00
|
|
|
ret = virtio_load(VIRTIO_DEVICE(vrng), f, version_id);
|
|
|
|
if (ret != 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
2012-06-20 14:59:32 +08:00
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
/* We may have an element ready but couldn't process it due to a quota
|
2012-11-21 13:51:21 +08:00
|
|
|
* limit. Make sure to try again after live migration when the quota may
|
|
|
|
* have been reset.
|
|
|
|
*/
|
2014-11-27 13:48:10 +08:00
|
|
|
virtio_rng_process(vrng);
|
2012-10-31 06:45:05 +08:00
|
|
|
|
2012-06-20 14:59:32 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-10-31 06:45:05 +08:00
|
|
|
static void check_rate_limit(void *opaque)
|
|
|
|
{
|
2013-04-24 16:08:01 +08:00
|
|
|
VirtIORNG *vrng = opaque;
|
2012-10-31 06:45:05 +08:00
|
|
|
|
2013-04-24 16:08:01 +08:00
|
|
|
vrng->quota_remaining = vrng->conf.max_bytes;
|
|
|
|
virtio_rng_process(vrng);
|
2013-08-21 23:03:08 +08:00
|
|
|
timer_mod(vrng->rate_limit_timer,
|
|
|
|
qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) + vrng->conf.period_ms);
|
2012-10-31 06:45:05 +08:00
|
|
|
}
|
|
|
|
|
2013-07-30 08:57:37 +08:00
|
|
|
static void virtio_rng_device_realize(DeviceState *dev, Error **errp)
|
2012-06-20 14:59:32 +08:00
|
|
|
{
|
2013-07-30 08:57:37 +08:00
|
|
|
VirtIODevice *vdev = VIRTIO_DEVICE(dev);
|
2013-07-30 11:12:47 +08:00
|
|
|
VirtIORNG *vrng = VIRTIO_RNG(dev);
|
2012-06-20 14:59:32 +08:00
|
|
|
Error *local_err = NULL;
|
|
|
|
|
2014-12-11 15:47:42 +08:00
|
|
|
if (vrng->conf.period_ms <= 0) {
|
2014-07-30 07:28:58 +08:00
|
|
|
error_setg(errp, "'period' parameter expects a positive integer");
|
2013-07-30 08:57:37 +08:00
|
|
|
return;
|
2013-11-21 18:53:23 +08:00
|
|
|
}
|
|
|
|
|
2014-07-30 07:28:57 +08:00
|
|
|
/* Workaround: Property parsing does not enforce unsigned integers,
|
|
|
|
* So this is a hack to reject such numbers. */
|
|
|
|
if (vrng->conf.max_bytes > INT64_MAX) {
|
2014-07-30 07:28:58 +08:00
|
|
|
error_setg(errp, "'max-bytes' parameter must be non-negative, "
|
|
|
|
"and less than 2^63");
|
2014-07-30 07:28:57 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-04-24 16:07:59 +08:00
|
|
|
if (vrng->conf.rng == NULL) {
|
|
|
|
vrng->conf.default_backend = RNG_RANDOM(object_new(TYPE_RNG_RANDOM));
|
|
|
|
|
2014-01-17 00:34:39 +08:00
|
|
|
user_creatable_complete(OBJECT(vrng->conf.default_backend),
|
|
|
|
&local_err);
|
|
|
|
if (local_err) {
|
|
|
|
error_propagate(errp, local_err);
|
|
|
|
object_unref(OBJECT(vrng->conf.default_backend));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-07-30 11:12:47 +08:00
|
|
|
object_property_add_child(OBJECT(dev),
|
2013-04-24 16:07:59 +08:00
|
|
|
"default-backend",
|
|
|
|
OBJECT(vrng->conf.default_backend),
|
|
|
|
NULL);
|
|
|
|
|
2014-03-19 15:58:57 +08:00
|
|
|
/* The child property took a reference, we can safely drop ours now */
|
|
|
|
object_unref(OBJECT(vrng->conf.default_backend));
|
|
|
|
|
2013-07-30 11:12:47 +08:00
|
|
|
object_property_set_link(OBJECT(dev),
|
2013-04-24 16:07:59 +08:00
|
|
|
OBJECT(vrng->conf.default_backend),
|
|
|
|
"rng", NULL);
|
2013-04-24 16:07:55 +08:00
|
|
|
}
|
2012-06-20 14:59:32 +08:00
|
|
|
|
2013-04-24 16:07:59 +08:00
|
|
|
vrng->rng = vrng->conf.rng;
|
2012-06-20 14:59:32 +08:00
|
|
|
if (vrng->rng == NULL) {
|
2014-07-30 07:28:58 +08:00
|
|
|
error_setg(errp, "'rng' parameter expects a valid object");
|
2013-07-30 08:57:37 +08:00
|
|
|
return;
|
2012-06-20 14:59:32 +08:00
|
|
|
}
|
|
|
|
|
2014-07-30 07:28:57 +08:00
|
|
|
virtio_init(vdev, "virtio-rng", VIRTIO_ID_RNG, 0);
|
2013-04-24 16:07:55 +08:00
|
|
|
|
2014-07-30 07:28:57 +08:00
|
|
|
vrng->vq = virtio_add_queue(vdev, 8, handle_input);
|
2013-04-24 16:07:54 +08:00
|
|
|
vrng->quota_remaining = vrng->conf.max_bytes;
|
2012-10-31 06:45:05 +08:00
|
|
|
|
2013-08-21 23:03:08 +08:00
|
|
|
vrng->rate_limit_timer = timer_new_ms(QEMU_CLOCK_VIRTUAL,
|
2012-10-31 06:45:05 +08:00
|
|
|
check_rate_limit, vrng);
|
|
|
|
|
2013-08-21 23:03:08 +08:00
|
|
|
timer_mod(vrng->rate_limit_timer,
|
|
|
|
qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) + vrng->conf.period_ms);
|
2012-10-31 06:45:05 +08:00
|
|
|
|
2013-07-30 11:12:47 +08:00
|
|
|
register_savevm(dev, "virtio-rng", -1, 1, virtio_rng_save,
|
2012-06-20 14:59:32 +08:00
|
|
|
virtio_rng_load, vrng);
|
2013-04-24 16:07:55 +08:00
|
|
|
}
|
|
|
|
|
2013-07-30 09:50:44 +08:00
|
|
|
static void virtio_rng_device_unrealize(DeviceState *dev, Error **errp)
|
2013-04-24 16:07:55 +08:00
|
|
|
{
|
2013-07-30 09:50:44 +08:00
|
|
|
VirtIODevice *vdev = VIRTIO_DEVICE(dev);
|
|
|
|
VirtIORNG *vrng = VIRTIO_RNG(dev);
|
2013-04-24 16:07:55 +08:00
|
|
|
|
2013-08-21 23:03:08 +08:00
|
|
|
timer_del(vrng->rate_limit_timer);
|
|
|
|
timer_free(vrng->rate_limit_timer);
|
2013-07-30 09:50:44 +08:00
|
|
|
unregister_savevm(dev, "virtio-rng", vrng);
|
2013-04-24 16:21:22 +08:00
|
|
|
virtio_cleanup(vdev);
|
2013-04-24 16:07:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static Property virtio_rng_properties[] = {
|
2015-06-10 23:04:33 +08:00
|
|
|
/* Set a default rate limit of 2^47 bytes per minute or roughly 2TB/s. If
|
|
|
|
* you have an entropy source capable of generating more entropy than this
|
|
|
|
* and you can pass it through via virtio-rng, then hats off to you. Until
|
|
|
|
* then, this is unlimited for all practical purposes.
|
|
|
|
*/
|
|
|
|
DEFINE_PROP_UINT64("max-bytes", VirtIORNG, conf.max_bytes, INT64_MAX),
|
|
|
|
DEFINE_PROP_UINT32("period", VirtIORNG, conf.period_ms, 1 << 16),
|
2013-04-24 16:07:55 +08:00
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
|
|
|
static void virtio_rng_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
VirtioDeviceClass *vdc = VIRTIO_DEVICE_CLASS(klass);
|
2013-07-30 08:57:37 +08:00
|
|
|
|
2013-04-24 16:07:55 +08:00
|
|
|
dc->props = virtio_rng_properties;
|
2013-07-29 22:17:45 +08:00
|
|
|
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
|
2013-07-30 08:57:37 +08:00
|
|
|
vdc->realize = virtio_rng_device_realize;
|
2013-07-30 09:50:44 +08:00
|
|
|
vdc->unrealize = virtio_rng_device_unrealize;
|
2013-04-24 16:07:55 +08:00
|
|
|
vdc->get_features = get_features;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void virtio_rng_initfn(Object *obj)
|
|
|
|
{
|
|
|
|
VirtIORNG *vrng = VIRTIO_RNG(obj);
|
|
|
|
|
|
|
|
object_property_add_link(obj, "rng", TYPE_RNG_BACKEND,
|
qom: Make QOM link property unref optional
Some object_property_add_link() callers expect property deletion to
unref the link property object. Other callers expect to manage the
refcount themselves. The former are currently broken and therefore leak
the link property object.
This patch adds a flags argument to object_property_add_link() so the
caller can specify which refcount behavior they require. The new
OBJ_PROP_LINK_UNREF_ON_RELEASE flag causes the link pointer to be
unreferenced when the property is deleted.
This fixes refcount leaks in qdev.c, xilinx_axidma.c, xilinx_axienet.c,
s390-virtio-bus.c, virtio-pci.c, virtio-rng.c, and ui/console.c.
Rationale for refcount behavior:
* hw/core/qdev.c
- bus children are explicitly unreferenced, don't interfere
- parent_bus is essentially a read-only property that doesn't hold a
refcount, don't unref
- hotplug_handler is leaked, do unref
* hw/dma/xilinx_axidma.c
- rx stream "dma" links are set using set_link, therefore they
need unref
- tx streams are set using set_link, therefore they need unref
* hw/net/xilinx_axienet.c
- same reasoning as hw/dma/xilinx_axidma.c
* hw/pcmcia/pxa2xx.c
- pxa2xx bypasses set_link and therefore does not use refcounts
* hw/s390x/s390-virtio-bus.c
* hw/virtio/virtio-pci.c
* hw/virtio/virtio-rng.c
* ui/console.c
- set_link is used and there is no explicit unref, do unref
Cc: Peter Crosthwaite <peter.crosthwaite@petalogix.com>
Cc: Alexander Graf <agraf@suse.de>
Cc: Anthony Liguori <aliguori@amazon.com>
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Andreas Färber <afaerber@suse.de>
2014-03-19 15:58:55 +08:00
|
|
|
(Object **)&vrng->conf.rng,
|
2014-03-19 15:58:56 +08:00
|
|
|
qdev_prop_allow_set_link_before_realize,
|
qom: Make QOM link property unref optional
Some object_property_add_link() callers expect property deletion to
unref the link property object. Other callers expect to manage the
refcount themselves. The former are currently broken and therefore leak
the link property object.
This patch adds a flags argument to object_property_add_link() so the
caller can specify which refcount behavior they require. The new
OBJ_PROP_LINK_UNREF_ON_RELEASE flag causes the link pointer to be
unreferenced when the property is deleted.
This fixes refcount leaks in qdev.c, xilinx_axidma.c, xilinx_axienet.c,
s390-virtio-bus.c, virtio-pci.c, virtio-rng.c, and ui/console.c.
Rationale for refcount behavior:
* hw/core/qdev.c
- bus children are explicitly unreferenced, don't interfere
- parent_bus is essentially a read-only property that doesn't hold a
refcount, don't unref
- hotplug_handler is leaked, do unref
* hw/dma/xilinx_axidma.c
- rx stream "dma" links are set using set_link, therefore they
need unref
- tx streams are set using set_link, therefore they need unref
* hw/net/xilinx_axienet.c
- same reasoning as hw/dma/xilinx_axidma.c
* hw/pcmcia/pxa2xx.c
- pxa2xx bypasses set_link and therefore does not use refcounts
* hw/s390x/s390-virtio-bus.c
* hw/virtio/virtio-pci.c
* hw/virtio/virtio-rng.c
* ui/console.c
- set_link is used and there is no explicit unref, do unref
Cc: Peter Crosthwaite <peter.crosthwaite@petalogix.com>
Cc: Alexander Graf <agraf@suse.de>
Cc: Anthony Liguori <aliguori@amazon.com>
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Andreas Färber <afaerber@suse.de>
2014-03-19 15:58:55 +08:00
|
|
|
OBJ_PROP_LINK_UNREF_ON_RELEASE, NULL);
|
2013-04-24 16:07:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo virtio_rng_info = {
|
|
|
|
.name = TYPE_VIRTIO_RNG,
|
|
|
|
.parent = TYPE_VIRTIO_DEVICE,
|
|
|
|
.instance_size = sizeof(VirtIORNG),
|
|
|
|
.instance_init = virtio_rng_initfn,
|
|
|
|
.class_init = virtio_rng_class_init,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void virtio_register_types(void)
|
|
|
|
{
|
|
|
|
type_register_static(&virtio_rng_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(virtio_register_types)
|