From nobody Thu Apr 25 16:13:23 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1557851401; cv=none; d=zoho.com; s=zohoarc; b=ZvcEMbyls662mEoyVKoDrrxjCEuacZeI5NrcvHf2B6Hf8IIqCqSRa4o29Q1h8oruFvgCj4a54OJeek4C4y0RAJiR4v2SXOBzX4T4ufwjq4wYamDWejrFv4DeCxoo7Hqqz1SnP9FgCufUdUzwnBaTUJZB5h5dIixkifzK/1/Th0o= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1557851401; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=A7CEkK2bpb/f8X4gVZDjXwNlZGb8r/LjOWm+M/yeN2g=; b=oZEV6OcJzWFhE9pBicTOzVxEIRVVOSqJTTv7mZXlb14WlqCkq+/XaRAIckqPpyjerYwwRhN3q8PInAr2fraIdkvsHoXyjFzkwHs32oi6ukRsLwXb5hO1DVq63RIKk5KpRCgGO4WMNBqslcyEXSi6IT02v18PsUquEl9P9DsPIrk= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1557851401479482.33647221053104; Tue, 14 May 2019 09:30:01 -0700 (PDT) Received: from localhost ([127.0.0.1]:50975 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaJS-0008KQ-Eo for importer@patchew.org; Tue, 14 May 2019 12:29:58 -0400 Received: from eggs.gnu.org ([209.51.188.92]:43046) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaHe-0007CR-PG for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:08 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hQaHd-0006iW-1b for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43062) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hQaHb-0006am-0S for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:03 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 9286781DFC; Tue, 14 May 2019 16:27:57 +0000 (UTC) Received: from thinkpad.redhat.com (unknown [10.40.205.6]) by smtp.corp.redhat.com (Postfix) with ESMTP id 47F0961995; Tue, 14 May 2019 16:27:52 +0000 (UTC) From: Laurent Vivier To: qemu-devel@nongnu.org Date: Tue, 14 May 2019 18:27:41 +0200 Message-Id: <20190514162744.30398-2-lvivier@redhat.com> In-Reply-To: <20190514162744.30398-1-lvivier@redhat.com> References: <20190514162744.30398-1-lvivier@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Tue, 14 May 2019 16:27:57 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v5 1/4] VirtIO-RNG: Update default entropy source to `/dev/urandom` X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , =?UTF-8?q?Daniel=20P=20=2E=20Berrang=C3=A9?= , "Michael S. Tsirkin" , Kashyap Chamarthy , Richard Henderson , "Richard W . M . Jones" , Amit Shah , Markus Armbruster , Stefan Hajnoczi Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" From: Kashyap Chamarthy When QEMU exposes a VirtIO-RNG device to the guest, that device needs a source of entropy, and that source needs to be "non-blocking", like `/dev/urandom`. However, currently QEMU defaults to the problematic `/dev/random`, which on Linux is "blocking" (as in, it waits until sufficient entropy is available). Why prefer `/dev/urandom` over `/dev/random`? Reviewed-by: Daniel P. Berrang=C3=A9 Reviewed-by: Markus Armbruster Reviewed-by: Stefan Hajnoczi --------------------------------------------- The man pages of urandom(4) and random(4) state: "The /dev/random device is a legacy interface which dates back to a time where the cryptographic primitives used in the implementation of /dev/urandom were not widely trusted. It will return random bytes only within the estimated number of bits of fresh noise in the entropy pool, blocking if necessary. /dev/random is suitable for applications that need high quality randomness, and can afford indeterminate delays." Further, the "Usage" section of the said man pages state: "The /dev/random interface is considered a legacy interface, and /dev/urandom is preferred and sufficient in all use cases, with the exception of applications which require randomness during early boot time; for these applications, getrandom(2) must be used instead, because it will block until the entropy pool is initialized. "If a seed file is saved across reboots as recommended below (all major Linux distributions have done this since 2000 at least), the output is cryptographically secure against attackers without local root access as soon as it is reloaded in the boot sequence, and perfectly adequate for network encryption session keys. Since reads from /dev/random may block, users will usually want to open it in nonblocking mode (or perform a read with timeout), and provide some sort of user notification if the desired entropy is not immediately available." And refer to random(7) for a comparison of `/dev/random` and `/dev/urandom`. What about other OSes? ---------------------- `/dev/urandom` exists and works on OS-X, FreeBSD, DragonFlyBSD, NetBSD and OpenBSD, which cover all the non-Linux platforms we explicitly support, aside from Windows. On Windows `/dev/random` doesn't work either so we don't regress. This is actually another argument in favour of using the newly proposed 'rng-builtin' backend by default, as that will work on Windows. - - - Given the above, change the entropy source for VirtIO-RNG device to `/dev/urandom`. Related discussion in these[1][2] past threads. [1] https://lists.nongnu.org/archive/html/qemu-devel/2018-06/msg08335.html -- "RNG: Any reason QEMU doesn't default to `/dev/urandom`?" [2] https://lists.nongnu.org/archive/html/qemu-devel/2018-09/msg02724.html -- "[RFC] Virtio RNG: Consider changing the default entropy source to /dev/urandom" Signed-off-by: Kashyap Chamarthy Reviewed-by: Daniel P. Berrang=C3=A9 Reviewed-by: Stefan Hajnoczi Reviewed-by: Markus Armbruster Signed-off-by: Laurent Vivier --- backends/rng-random.c | 2 +- qemu-options.hx | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/backends/rng-random.c b/backends/rng-random.c index e2a49b0571d7..eff36ef14084 100644 --- a/backends/rng-random.c +++ b/backends/rng-random.c @@ -112,7 +112,7 @@ static void rng_random_init(Object *obj) rng_random_set_filename, NULL); =20 - s->filename =3D g_strdup("/dev/random"); + s->filename =3D g_strdup("/dev/urandom"); s->fd =3D -1; } =20 diff --git a/qemu-options.hx b/qemu-options.hx index 0191ef8b1eb7..4df0ea3aed5c 100644 --- a/qemu-options.hx +++ b/qemu-options.hx @@ -4286,7 +4286,7 @@ Creates a random number generator backend which obtai= ns entropy from a device on the host. The @option{id} parameter is a unique ID that will be used to reference this entropy backend from the @option{virtio-rng} device. The @option{filename} parameter specifies which file to obtain -entropy from and if omitted defaults to @option{/dev/random}. +entropy from and if omitted defaults to @option{/dev/urandom}. =20 @item -object rng-egd,id=3D@var{id},chardev=3D@var{chardevid} =20 --=20 2.20.1 From nobody Thu Apr 25 16:13:23 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1557851407; cv=none; d=zoho.com; s=zohoarc; b=bCWsKVv53CHdl7bpgOScCXjSo1V+f8eECFw+DcTDIdX2VfTIt+FVrs0lph/l6kDB5WufpEPKA478GRdvClSUzzOagmcxsgkmXh3Lxgb0tuHBfzprrAam2qRfQopSCZS+K/6OV4mGUCKDPJLZlYaE280+4c2x4wpv5Ufkp93JmRM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1557851407; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=0fxam8x+BUyx4t1TpPPsIzFMdidmx4SSyHIEyX6sqUE=; b=P2KraGzq2+AlEUc7uS9UzUxlQatNuczayErvuJiLkmG1vAsQPgm6ZaegWOV7lUie/76YKFVZPTx8B1VNFG3kygWLcm4vosfvPqUaDpAFkj1fRWJAtUSf1Z8CEViQNThJvcUkWHC3kG3n4cSxw61Dx2iQphysksEsS9PhVi6y+ow= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 155785140772314.897766951990661; Tue, 14 May 2019 09:30:07 -0700 (PDT) Received: from localhost ([127.0.0.1]:50973 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaJR-0008JR-Cy for importer@patchew.org; Tue, 14 May 2019 12:29:57 -0400 Received: from eggs.gnu.org ([209.51.188.92]:43045) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaHe-0007CQ-P8 for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:07 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hQaHc-0006hs-Sb for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43084) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hQaHa-0006cW-VJ for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:03 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 724BE81F33; Tue, 14 May 2019 16:28:00 +0000 (UTC) Received: from thinkpad.redhat.com (unknown [10.40.205.6]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0AFB2BA54; Tue, 14 May 2019 16:27:57 +0000 (UTC) From: Laurent Vivier To: qemu-devel@nongnu.org Date: Tue, 14 May 2019 18:27:42 +0200 Message-Id: <20190514162744.30398-3-lvivier@redhat.com> In-Reply-To: <20190514162744.30398-1-lvivier@redhat.com> References: <20190514162744.30398-1-lvivier@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Tue, 14 May 2019 16:28:00 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v5 2/4] rng-builtin: add an RNG backend that uses qemu_guest_getrandom() X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , =?UTF-8?q?Daniel=20P=20=2E=20Berrang=C3=A9?= , "Michael S. Tsirkin" , Kashyap Chamarthy , Richard Henderson , "Richard W . M . Jones" , Amit Shah , Markus Armbruster Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" Add a new RNG backend using QEMU builtin getrandom function. It can be created and used with something like: ... -object rng-builtin,id=3Drng0 -device virtio-rng,rng=3Drng0 ... Reviewed-by: Richard Henderson Reviewed-by: Markus Armbruster Signed-off-by: Laurent Vivier --- backends/Makefile.objs | 2 +- backends/rng-builtin.c | 54 ++++++++++++++++++++++++++++++++++++++++++ qemu-options.hx | 7 ++++++ 3 files changed, 62 insertions(+), 1 deletion(-) create mode 100644 backends/rng-builtin.c diff --git a/backends/Makefile.objs b/backends/Makefile.objs index 981e8e122f2c..f0691116e86e 100644 --- a/backends/Makefile.objs +++ b/backends/Makefile.objs @@ -1,4 +1,4 @@ -common-obj-y +=3D rng.o rng-egd.o +common-obj-y +=3D rng.o rng-egd.o rng-builtin.o common-obj-$(CONFIG_POSIX) +=3D rng-random.o =20 common-obj-$(CONFIG_TPM) +=3D tpm.o diff --git a/backends/rng-builtin.c b/backends/rng-builtin.c new file mode 100644 index 000000000000..6b9543a7de87 --- /dev/null +++ b/backends/rng-builtin.c @@ -0,0 +1,54 @@ +/* + * QEMU Builtin Random Number Generator Backend + * + * This work is licensed under the terms of the GNU GPL, version 2 or late= r. + * See the COPYING file in the top-level directory. + */ + +#include "qemu/osdep.h" +#include "sysemu/rng.h" +#include "qemu/main-loop.h" +#include "qemu/guest-random.h" + +#define TYPE_RNG_BUILTIN "rng-builtin" +#define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN) + +typedef struct RngBuiltin { + RngBackend parent; +} RngBuiltin; + +static void rng_builtin_request_entropy(RngBackend *b, RngRequest *req) +{ + RngBuiltin *s =3D RNG_BUILTIN(b); + + while (!QSIMPLEQ_EMPTY(&s->parent.requests)) { + RngRequest *req =3D QSIMPLEQ_FIRST(&s->parent.requests); + + qemu_guest_getrandom_nofail(req->data, req->size); + + req->receive_entropy(req->opaque, req->data, req->size); + + rng_backend_finalize_request(&s->parent, req); + } +} + +static void rng_builtin_class_init(ObjectClass *klass, void *data) +{ + RngBackendClass *rbc =3D RNG_BACKEND_CLASS(klass); + + rbc->request_entropy =3D rng_builtin_request_entropy; +} + +static const TypeInfo rng_builtin_info =3D { + .name =3D TYPE_RNG_BUILTIN, + .parent =3D TYPE_RNG_BACKEND, + .instance_size =3D sizeof(RngBuiltin), + .class_init =3D rng_builtin_class_init, +}; + +static void register_types(void) +{ + type_register_static(&rng_builtin_info); +} + +type_init(register_types); diff --git a/qemu-options.hx b/qemu-options.hx index 4df0ea3aed5c..dc82a8c7ea14 100644 --- a/qemu-options.hx +++ b/qemu-options.hx @@ -4280,6 +4280,13 @@ other options. =20 The @option{share} boolean option is @var{on} by default with memfd. =20 +@item -object rng-builtin,id=3D@var{id} + +Creates a random number generator backend which obtains entropy from +QEMU builtin functions. The @option{id} parameter is a unique ID that +will be used to reference this entropy backend from the @option{virtio-rng} +device. + @item -object rng-random,id=3D@var{id},filename=3D@var{/dev/random} =20 Creates a random number generator backend which obtains entropy from --=20 2.20.1 From nobody Thu Apr 25 16:13:23 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1557851562; cv=none; d=zoho.com; s=zohoarc; b=EwSa0F2INqR4O+sdyU9d/34qwFn2euYBjRbv4a4yUnBy2wvEZ1dcqRmidOXaGIr5F5Q+eTpiSdXMzkA3Og3va8aExF48ihxV/Flux+zPS5DR5PlQL1+bU0+Jrp0HUbGReCzYWagmApBr4WzeLtr8HIdWypsalrC9iNxcRuUdlfQ= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1557851562; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=V01fLFkyQA2DAuRmaqox8RESBUvbAsfsTDuxq37eCbs=; b=YVH0YQ7J2IIymNrzQ85IF2R8cOSjHckW1jK8HaIFKxza+DCVXTHY/A4Tc6O4gcE1+Qd2IKoTk8pCdbNccTKXF4YLRVqYylAk477qb6kLnI0YX4ytauPdik5n17yU7X3tSSMdOkNVhMg5N76dfeMYiEKTqTWRvGuMB76LK23MO50= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1557851562598558.5385025997746; Tue, 14 May 2019 09:32:42 -0700 (PDT) Received: from localhost ([127.0.0.1]:51036 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaM3-0002KD-MG for importer@patchew.org; Tue, 14 May 2019 12:32:39 -0400 Received: from eggs.gnu.org ([209.51.188.92]:43089) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaHg-0007Dd-R7 for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:10 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hQaHf-0006ko-CK for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:08 -0400 Received: from mx1.redhat.com ([209.132.183.28]:23808) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hQaHe-0006hM-PC for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:07 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 431D65945C; Tue, 14 May 2019 16:28:04 +0000 (UTC) Received: from thinkpad.redhat.com (unknown [10.40.205.6]) by smtp.corp.redhat.com (Postfix) with ESMTP id D5BC3BA54; Tue, 14 May 2019 16:28:00 +0000 (UTC) From: Laurent Vivier To: qemu-devel@nongnu.org Date: Tue, 14 May 2019 18:27:43 +0200 Message-Id: <20190514162744.30398-4-lvivier@redhat.com> In-Reply-To: <20190514162744.30398-1-lvivier@redhat.com> References: <20190514162744.30398-1-lvivier@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Tue, 14 May 2019 16:28:04 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v5 3/4] virtio-rng: Keep the default backend out of VirtIORNGConf X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , =?UTF-8?q?Daniel=20P=20=2E=20Berrang=C3=A9?= , "Michael S. Tsirkin" , Kashyap Chamarthy , Richard Henderson , "Richard W . M . Jones" , Amit Shah , Markus Armbruster Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" From: Markus Armbruster The default backend is only used within virtio_rng_device_realize(). Replace VirtIORNGConf member default_backend by a local variable. Adjust its type to reduce conversions. While there, pass &error_abort instead of NULL when failure would be a programming error. Signed-off-by: Markus Armbruster Signed-off-by: Laurent Vivier --- hw/virtio/virtio-rng.c | 20 +++++++++----------- include/hw/virtio/virtio-rng.h | 2 -- 2 files changed, 9 insertions(+), 13 deletions(-) diff --git a/hw/virtio/virtio-rng.c b/hw/virtio/virtio-rng.c index 30493a258622..73ffb476e030 100644 --- a/hw/virtio/virtio-rng.c +++ b/hw/virtio/virtio-rng.c @@ -16,6 +16,7 @@ #include "hw/virtio/virtio.h" #include "hw/virtio/virtio-rng.h" #include "sysemu/rng.h" +#include "sysemu/rng-random.h" #include "qom/object_interfaces.h" #include "trace.h" =20 @@ -189,27 +190,24 @@ static void virtio_rng_device_realize(DeviceState *de= v, Error **errp) } =20 if (vrng->conf.rng =3D=3D NULL) { - vrng->conf.default_backend =3D RNG_RANDOM(object_new(TYPE_RNG_RAND= OM)); + Object *default_backend =3D object_new(TYPE_RNG_RANDOM); =20 - user_creatable_complete(USER_CREATABLE(vrng->conf.default_backend), + user_creatable_complete(USER_CREATABLE(default_backend), &local_err); if (local_err) { error_propagate(errp, local_err); - object_unref(OBJECT(vrng->conf.default_backend)); + object_unref(default_backend); return; } =20 - object_property_add_child(OBJECT(dev), - "default-backend", - OBJECT(vrng->conf.default_backend), - NULL); + object_property_add_child(OBJECT(dev), "default-backend", + default_backend, &error_abort); =20 /* The child property took a reference, we can safely drop ours no= w */ - object_unref(OBJECT(vrng->conf.default_backend)); + object_unref(default_backend); =20 - object_property_set_link(OBJECT(dev), - OBJECT(vrng->conf.default_backend), - "rng", NULL); + object_property_set_link(OBJECT(dev), default_backend, + "rng", &error_abort); } =20 vrng->rng =3D vrng->conf.rng; diff --git a/include/hw/virtio/virtio-rng.h b/include/hw/virtio/virtio-rng.h index 922dce7caccf..28ff752c4096 100644 --- a/include/hw/virtio/virtio-rng.h +++ b/include/hw/virtio/virtio-rng.h @@ -13,7 +13,6 @@ #define QEMU_VIRTIO_RNG_H =20 #include "sysemu/rng.h" -#include "sysemu/rng-random.h" #include "standard-headers/linux/virtio_rng.h" =20 #define TYPE_VIRTIO_RNG "virtio-rng-device" @@ -26,7 +25,6 @@ struct VirtIORNGConf { RngBackend *rng; uint64_t max_bytes; uint32_t period_ms; - RngRandom *default_backend; }; =20 typedef struct VirtIORNG { --=20 2.20.1 From nobody Thu Apr 25 16:13:23 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1557851545; cv=none; d=zoho.com; s=zohoarc; b=Kf6H+jffxNTe1YLP/jCLsVERs+d8flyb64zonjb+nAc4yVz50O+h6bsUFwsjW2H93MdiX2+fZhXkWCHh1vGxpWSB7tyQhzyN4oRMFydoNMyZ1jQEZeGzFenBjmugwW8iByagiqhratsDWVMGZhGPRqPzyMM4t2Pb6CBxyqOk9mI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1557851545; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=auJR5BXQn5ZQbzH4hbi3bMxAqEA/YIvhUrxXPtZ0Zt8=; b=Omh3ThutQXRgniy1ImK4OqKBwxNwPEz0ECU44pCFdZOxdi3xuCdzDrl5A++hDlriqtvHZdbgREocd2j7PehNF4eXjGgboK3pWrHSVeckrnQkkxdeYPerBggtdkSurg5LUdbI4gMJJJ+GkVV99kJp9lQRnUzjJq23+qlFf/Cxh4A= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1557851545788299.32526001889846; Tue, 14 May 2019 09:32:25 -0700 (PDT) Received: from localhost ([127.0.0.1]:51027 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaLl-000237-EN for importer@patchew.org; Tue, 14 May 2019 12:32:21 -0400 Received: from eggs.gnu.org ([209.51.188.92]:43117) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hQaHl-0007He-0U for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:14 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hQaHk-0006rS-1C for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:12 -0400 Received: from mx1.redhat.com ([209.132.183.28]:44798) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hQaHj-0006qS-RX for qemu-devel@nongnu.org; Tue, 14 May 2019 12:28:11 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 32905307D8BE; Tue, 14 May 2019 16:28:11 +0000 (UTC) Received: from thinkpad.redhat.com (unknown [10.40.205.6]) by smtp.corp.redhat.com (Postfix) with ESMTP id A704162723; Tue, 14 May 2019 16:28:04 +0000 (UTC) From: Laurent Vivier To: qemu-devel@nongnu.org Date: Tue, 14 May 2019 18:27:44 +0200 Message-Id: <20190514162744.30398-5-lvivier@redhat.com> In-Reply-To: <20190514162744.30398-1-lvivier@redhat.com> References: <20190514162744.30398-1-lvivier@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.48]); Tue, 14 May 2019 16:28:11 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v5 4/4] virtio-rng: change default backend to rng-builtin X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , =?UTF-8?q?Daniel=20P=20=2E=20Berrang=C3=A9?= , "Michael S. Tsirkin" , Kashyap Chamarthy , Richard Henderson , "Richard W . M . Jones" , Amit Shah , Markus Armbruster Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" Signed-off-by: Laurent Vivier Reviewed-by: Markus Armbruster --- backends/rng-builtin.c | 1 - hw/virtio/virtio-rng.c | 2 +- include/sysemu/rng.h | 2 ++ qemu-options.hx | 2 +- 4 files changed, 4 insertions(+), 3 deletions(-) diff --git a/backends/rng-builtin.c b/backends/rng-builtin.c index 6b9543a7de87..868055cbc723 100644 --- a/backends/rng-builtin.c +++ b/backends/rng-builtin.c @@ -10,7 +10,6 @@ #include "qemu/main-loop.h" #include "qemu/guest-random.h" =20 -#define TYPE_RNG_BUILTIN "rng-builtin" #define RNG_BUILTIN(obj) OBJECT_CHECK(RngBuiltin, (obj), TYPE_RNG_BUILTIN) =20 typedef struct RngBuiltin { diff --git a/hw/virtio/virtio-rng.c b/hw/virtio/virtio-rng.c index 73ffb476e030..f3706eaba55f 100644 --- a/hw/virtio/virtio-rng.c +++ b/hw/virtio/virtio-rng.c @@ -190,7 +190,7 @@ static void virtio_rng_device_realize(DeviceState *dev,= Error **errp) } =20 if (vrng->conf.rng =3D=3D NULL) { - Object *default_backend =3D object_new(TYPE_RNG_RANDOM); + Object *default_backend =3D object_new(TYPE_RNG_BUILTIN); =20 user_creatable_complete(USER_CREATABLE(default_backend), &local_err); diff --git a/include/sysemu/rng.h b/include/sysemu/rng.h index 27b37da05d2e..9dc5e0e90100 100644 --- a/include/sysemu/rng.h +++ b/include/sysemu/rng.h @@ -24,6 +24,8 @@ #define RNG_BACKEND_CLASS(klass) \ OBJECT_CLASS_CHECK(RngBackendClass, (klass), TYPE_RNG_BACKEND) =20 +#define TYPE_RNG_BUILTIN "rng-builtin" + typedef struct RngRequest RngRequest; typedef struct RngBackendClass RngBackendClass; typedef struct RngBackend RngBackend; diff --git a/qemu-options.hx b/qemu-options.hx index dc82a8c7ea14..c9784be83cb5 100644 --- a/qemu-options.hx +++ b/qemu-options.hx @@ -4285,7 +4285,7 @@ The @option{share} boolean option is @var{on} by defa= ult with memfd. Creates a random number generator backend which obtains entropy from QEMU builtin functions. The @option{id} parameter is a unique ID that will be used to reference this entropy backend from the @option{virtio-rng} -device. +device. By default, the @option{virtio-rng} device uses this RNG backend. =20 @item -object rng-random,id=3D@var{id},filename=3D@var{/dev/random} =20 --=20 2.20.1