From nobody Fri Apr 26 12:24:00 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1560274881; cv=none; d=zoho.com; s=zohoarc; b=CnkcTUVW/9h0pct1N+a6DeyCEY0bRMcHUz9Dh9AGIgXpILf/a03UTTxJSRenJuQUDKBSR9gTA4rXYmEGoPR5J/qPrVXyf/GG9YeRnL8Jp2DCYmhY4tXAKUHWZq4uBYhurwUBkXyAw9OrkuXfjJcxD1wtOhVzG1YZkZivjC6IxMY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1560274881; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To:ARC-Authentication-Results; bh=hA2Kce/j3I136rx8+wuub8jOmtDuStQ64DP8ACZpjKM=; b=ZgIYfuKaQ039U/YJfz7wMC/RwKiVmNhQJLKVlGFruuiPtRm2PEOQJ8SJwgKAwGqlPerZY6PdIhdEbhdW3UqHHoGkfZ3rhJvNadE69ayevnfNLUZq2tRZnoWXM1A0dSNOaZ65oyRdyco4DW1OyLuOQPdsYmEQ9/Zo7AFNEP2H1yg= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (209.51.188.17 [209.51.188.17]) by mx.zohomail.com with SMTPS id 1560274881913708.9828837816897; Tue, 11 Jun 2019 10:41:21 -0700 (PDT) Received: from localhost ([::1]:33406 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.86_2) (envelope-from ) id 1haklh-0001Ug-82 for importer@patchew.org; Tue, 11 Jun 2019 13:41:09 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:33925) by lists.gnu.org with esmtp (Exim 4.86_2) (envelope-from ) id 1hakcr-00045p-3J for qemu-devel@nongnu.org; Tue, 11 Jun 2019 13:32:05 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hakS5-0001g5-LX for qemu-devel@nongnu.org; Tue, 11 Jun 2019 13:20:55 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43870) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hakS0-0001Yg-4w for qemu-devel@nongnu.org; Tue, 11 Jun 2019 13:20:51 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 9D5FB81F01; Tue, 11 Jun 2019 17:20:37 +0000 (UTC) Received: from thinkpad.redhat.com (ovpn-117-111.ams2.redhat.com [10.36.117.111]) by smtp.corp.redhat.com (Postfix) with ESMTP id C626D2B3DC; Tue, 11 Jun 2019 17:20:33 +0000 (UTC) From: Laurent Vivier To: qemu-devel@nongnu.org Date: Tue, 11 Jun 2019 19:20:32 +0200 Message-Id: <20190611172032.19143-1-lvivier@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Tue, 11 Jun 2019 17:20:37 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [RFC] virtio-rng: add a watchdog X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , "Michael S. Tsirkin" , Amit Shah Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" The virtio-rng linux driver can be stuck in virtio_read() on a wait_for_completion_killable() call if the virtio-rng device in QEMU doesn't provide data. It's a problem, because virtio_read() is called from rng_get_data() with reading_mutex() held. The same mutex is taken by add_early_randomness() and hwrng_fillfn() and this brings to a hang during the boot sequence if the virtio-rng driver is builtin. Moreover, another lock is taken (rng_mutex) when the hwrng driver wants to switch the RNG device or the user tries to unplug the virtio-rng PCI card, and this can hang too because the virtio-rng driver is only able to release the card if the virtio-rng device sends back the virtqueue eleme= nt. # echo -n virtio_rng.1 > /sys/class/misc/hw_random/rng_current [ 240.165234] INFO: task kworker/u2:1:34 blocked for more than 120 secon= ds. [ 240.165961] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disable= s this message. [ 240.166708] kworker/u2:1 D ffffffffb86b85a8 0 34 2 0x00= 000000 [ 240.166714] Workqueue: kacpi_hotplug acpi_hotplug_work_fn [ 240.166716] ffffa0e8f3c0b890 0000000000000046 ffffa0e8f3c00000 ffffa0= e8f3c0bfd8 [ 240.166717] ffffa0e8f3c0bfd8 ffffa0e8f3c0bfd8 ffffa0e8f3c00000 ffffff= ffb86b85a0 [ 240.166719] ffffffffb86b85a4 ffffa0e8f3c00000 00000000ffffffff ffffff= ffb86b85a8 [ 240.166720] Call Trace: [ 240.166725] [] schedule_preempt_disabled+0x29/0x70 [ 240.166727] [] __mutex_lock_slowpath+0xc7/0x1d0 [ 240.166728] [] mutex_lock+0x1f/0x2f [ 240.166730] [] hwrng_register+0x32/0x1d0 [ 240.166733] [] virtrng_scan+0x19/0x30 [virtio_rng] [ 240.166744] [] virtio_dev_probe+0x1eb/0x290 [virtio] [ 240.166746] [] driver_probe_device+0x145/0x3c0 ... In some case, the QEMU RNG backend is not able to provide data, and the virtio-rng device is not aware of that: - with rng-random using /dev/random and no entropy is available, - with rng-egd started with a socket in "server,nowait" mode and no daemon connected, - with rng-egd and an egd daemon that is not providing enough data, - ... To release the locks regularly, this patch adds a watchdog in QEMU virtio-rng device that sends back to the guest the virtqueue buffer with a 0 byte payload. This case is expected and correctly managed by the hwrng core. Signed-off-by: Laurent Vivier --- hw/virtio/virtio-rng.c | 23 +++++++++++++++++++++++ include/hw/virtio/virtio-rng.h | 1 + 2 files changed, 24 insertions(+) diff --git a/hw/virtio/virtio-rng.c b/hw/virtio/virtio-rng.c index 30493a258622..173ecd370c0e 100644 --- a/hw/virtio/virtio-rng.c +++ b/hw/virtio/virtio-rng.c @@ -19,6 +19,8 @@ #include "qom/object_interfaces.h" #include "trace.h" =20 +#define VIRTIO_RNG_WATCHDOG_MS 500 + static bool is_guest_ready(VirtIORNG *vrng) { VirtIODevice *vdev =3D VIRTIO_DEVICE(vrng); @@ -38,6 +40,21 @@ static size_t get_request_size(VirtQueue *vq, unsigned q= uota) return in; } =20 +static void watchdog(void *opaque) +{ + VirtIORNG *vrng =3D opaque; + VirtIODevice *vdev =3D VIRTIO_DEVICE(vrng); + VirtQueueElement *elem; + + /* wake up driver */ + elem =3D virtqueue_pop(vrng->vq, sizeof(VirtQueueElement)); + if (!elem) { + return; + } + virtqueue_push(vrng->vq, elem, 0); + virtio_notify(vdev, vrng->vq); +} + static void virtio_rng_process(VirtIORNG *vrng); =20 /* Send data from a char device over to the guest */ @@ -98,6 +115,9 @@ static void virtio_rng_process(VirtIORNG *vrng) return; } =20 + timer_mod(vrng->watchdog_timer, + qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) + VIRTIO_RNG_WATCHDOG_= MS); + if (vrng->activate_timer) { timer_mod(vrng->rate_limit_timer, qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) + vrng->conf.perio= d_ms); @@ -222,6 +242,7 @@ static void virtio_rng_device_realize(DeviceState *dev,= Error **errp) =20 vrng->vq =3D virtio_add_queue(vdev, 8, handle_input); vrng->quota_remaining =3D vrng->conf.max_bytes; + vrng->watchdog_timer =3D timer_new_ms(QEMU_CLOCK_VIRTUAL, watchdog, vr= ng); vrng->rate_limit_timer =3D timer_new_ms(QEMU_CLOCK_VIRTUAL, check_rate_limit, vrng); vrng->activate_timer =3D true; @@ -236,6 +257,8 @@ static void virtio_rng_device_unrealize(DeviceState *de= v, Error **errp) VirtIORNG *vrng =3D VIRTIO_RNG(dev); =20 qemu_del_vm_change_state_handler(vrng->vmstate); + timer_del(vrng->watchdog_timer); + timer_free(vrng->watchdog_timer); timer_del(vrng->rate_limit_timer); timer_free(vrng->rate_limit_timer); virtio_cleanup(vdev); diff --git a/include/hw/virtio/virtio-rng.h b/include/hw/virtio/virtio-rng.h index 922dce7caccf..05d6b0e7d881 100644 --- a/include/hw/virtio/virtio-rng.h +++ b/include/hw/virtio/virtio-rng.h @@ -42,6 +42,7 @@ typedef struct VirtIORNG { /* We purposefully don't migrate this state. The quota will reset on = the * destination as a result. Rate limiting is host state, not guest st= ate. */ + QEMUTimer *watchdog_timer; QEMUTimer *rate_limit_timer; int64_t quota_remaining; bool activate_timer; --=20 2.21.0