Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp244886imn; Wed, 3 Aug 2022 01:59:38 -0700 (PDT) X-Google-Smtp-Source: AA6agR4GnXW6+y0Ove6ZBdPv4j/uYU4biL/9XMopUdSDNfFN9WPvJpfNZOfqEdEBNgGUgli/qisV X-Received: by 2002:a17:902:ce8c:b0:16c:4be6:254d with SMTP id f12-20020a170902ce8c00b0016c4be6254dmr24662744plg.51.1659517178473; Wed, 03 Aug 2022 01:59:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659517178; cv=none; d=google.com; s=arc-20160816; b=W+Smjox3qnC3JkBqd+gA5bgFMKfd+BACLBZDwhR70E4BzpwdzW58dzfLslZ9LKDI/L DWhy/Od/ZMBQjpPVMJaX+smkYN7WUsEIbkxnvP4+rfsjWu0EFcY2EqRPxRMn5YP+lbcZ 7pEYE8IhIASQRNK9TTje63yVbo4U+7DMJ0uB0893uDPVDjGN4kjE3eiSquu9svPW6XnY xqwA6zygS16qCaCS6WXreF7VOsS9lyvYRt7RfjcLWHwzskuPSWUVxinRTvgpDfJX1NZB oTGocbXN6ppwdqCfHp4aAyA7iuaTPlZRCRC7GsXLquThQNseQ9QBAIADnWSrXqOcD//V mYqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=jjMc3logCuBwvQ9sv75bONTYB4Fh++iBKY5byel0XdM=; b=kSevhRs6rrh1jDtPBB3UhpHpDHW7ZYhfcZjD2FKMd8SpmNY8Voqq+40ws0bDbG7ctY qScl3gisjcv7d7kIH2oUhFzKZUAptoLhuYgZ4lSHT6bs6wrVVo+ObKrd9Qq82NH/+jaY /FGLvt85q6twtKbAOMvxAGKNY+B4PhfXGeVsTvJimRuxQ6cdvnvwhbwn9fq9a0qlNZbh aDvBI3kiJOCd43A7se8xuifBFRSB4qbKKLvQXSChQBFkq+8cBmJbThJ9XcgufANoh73v NEADYP+rh7FeFZn9NfvK7uAn6DDVIyOGmpRZYSwhZdLgHSdRxR9ZGKQbFwGwzuULdW9L YT1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oc15-20020a17090b1c0f00b001f2ffb0f258si1578043pjb.149.2022.08.03.01.59.08; Wed, 03 Aug 2022 01:59:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232447AbiHCI5t (ORCPT + 99 others); Wed, 3 Aug 2022 04:57:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51784 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231671AbiHCI5s (ORCPT ); Wed, 3 Aug 2022 04:57:48 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D711A1FCE4; Wed, 3 Aug 2022 01:57:47 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 237BA13D5; Wed, 3 Aug 2022 01:57:48 -0700 (PDT) Received: from [10.1.28.148] (e121487-lin.cambridge.arm.com [10.1.28.148]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8E4F03F67D; Wed, 3 Aug 2022 01:57:44 -0700 (PDT) Message-ID: <2c1198c4-77aa-5cb8-6bb4-b974850651be@arm.com> Date: Wed, 3 Aug 2022 09:57:35 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH v2 4/4] hwrng: virtio - always add a pending request Content-Language: en-US To: Laurent Vivier , linux-kernel@vger.kernel.org Cc: amit@kernel.org, Herbert Xu , Matt Mackall , virtualization@lists.linux-foundation.org, Dmitriy Vyukov , rusty@rustcorp.com.au, akong@redhat.com, Alexander Potapenko , "Michael S . Tsirkin" , linux-crypto@vger.kernel.org, Mauricio De Carvalho , Kevin Brodsky References: <20211028101111.128049-1-lvivier@redhat.com> <20211028101111.128049-5-lvivier@redhat.com> <7e64ce61-89b1-40aa-8295-00ca42b9a959@arm.com> From: Vladimir Murzin In-Reply-To: <7e64ce61-89b1-40aa-8295-00ca42b9a959@arm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 8/2/22 13:49, Vladimir Murzin wrote: > Hi Laurent, > > On 10/28/21 11:11, Laurent Vivier wrote: >> If we ensure we have already some data available by enqueuing >> again the buffer once data are exhausted, we can return what we >> have without waiting for the device answer. >> >> Signed-off-by: Laurent Vivier >> --- >> drivers/char/hw_random/virtio-rng.c | 26 ++++++++++++-------------- >> 1 file changed, 12 insertions(+), 14 deletions(-) >> >> diff --git a/drivers/char/hw_random/virtio-rng.c b/drivers/char/hw_random/virtio-rng.c >> index 8ba97cf4ca8f..0a7dde135db1 100644 >> --- a/drivers/char/hw_random/virtio-rng.c >> +++ b/drivers/char/hw_random/virtio-rng.c >> @@ -20,7 +20,6 @@ struct virtrng_info { >> struct virtqueue *vq; >> char name[25]; >> int index; >> - bool busy; >> bool hwrng_register_done; >> bool hwrng_removed; >> /* data transfer */ >> @@ -44,16 +43,18 @@ static void random_recv_done(struct virtqueue *vq) >> return; >> >> vi->data_idx = 0; >> - vi->busy = false; >> >> complete(&vi->have_data); >> } >> >> -/* The host will fill any buffer we give it with sweet, sweet randomness. */ >> -static void register_buffer(struct virtrng_info *vi) >> +static void request_entropy(struct virtrng_info *vi) >> { >> struct scatterlist sg; >> >> + reinit_completion(&vi->have_data); >> + vi->data_avail = 0; >> + vi->data_idx = 0; >> + >> sg_init_one(&sg, vi->data, sizeof(vi->data)); >> >> /* There should always be room for one buffer. */ >> @@ -69,6 +70,8 @@ static unsigned int copy_data(struct virtrng_info *vi, void *buf, >> memcpy(buf, vi->data + vi->data_idx, size); >> vi->data_idx += size; >> vi->data_avail -= size; >> + if (vi->data_avail == 0) >> + request_entropy(vi); >> return size; >> } >> >> @@ -98,13 +101,7 @@ static int virtio_read(struct hwrng *rng, void *buf, size_t size, bool wait) >> * so either size is 0 or data_avail is 0 >> */ >> while (size != 0) { >> - /* data_avail is 0 */ >> - if (!vi->busy) { >> - /* no pending request, ask for more */ >> - vi->busy = true; >> - reinit_completion(&vi->have_data); >> - register_buffer(vi); >> - } >> + /* data_avail is 0 but a request is pending */ >> ret = wait_for_completion_killable(&vi->have_data); >> if (ret < 0) >> return ret; >> @@ -126,8 +123,7 @@ static void virtio_cleanup(struct hwrng *rng) >> { >> struct virtrng_info *vi = (struct virtrng_info *)rng->priv; >> >> - if (vi->busy) >> - complete(&vi->have_data); >> + complete(&vi->have_data); >> } >> >> static int probe_common(struct virtio_device *vdev) >> @@ -163,6 +159,9 @@ static int probe_common(struct virtio_device *vdev) >> goto err_find; >> } >> >> + /* we always have a pending entropy request */ >> + request_entropy(vi); >> + >> return 0; >> >> err_find: >> @@ -181,7 +180,6 @@ static void remove_common(struct virtio_device *vdev) >> vi->data_idx = 0; >> complete(&vi->have_data); >> vdev->config->reset(vdev); >> - vi->busy = false; >> if (vi->hwrng_register_done) >> hwrng_unregister(&vi->hwrng); >> vdev->config->del_vqs(vdev); > > We observed that after this commit virtio-rng implementation in FVP doesn't > work > > INFO: bp.virtio_rng: Selected Random Generator Device: XORSHIFT DEVICE > INFO: bp.virtio_rng: Using seed value: 0x5674bba8 > Error: FVP_Base_AEMvA: bp.virtio_rng: Found invalid descriptor index > In file: (unknown):0 > In process: FVP_Base_AEMvA.thread_p_12 @ 935500020 ns > Info: FVP_Base_AEMvA: bp.virtio_rng: Could not extract buffer > > while basic baremetal test works as expected > > INFO: bp.virtio_rng: Selected Random Generator Device: XORSHIFT DEVICE > INFO: bp.virtio_rng: Using seed value: 0x541c142e > Info: FVP_Base_AEMv8A: bp.virtio_rng: Generated Number: 0x4b098991ceb377e6 > Info: FVP_Base_AEMv8A: bp.virtio_rng: Generated Number: 0xbdcbe3f765ba62f7 > > We are trying to get an idea what is missing and where, yet none of us familiar > with the driver :( > > I'm looping Kevin who originally reported that and Mauricio who is looking form > the FVP side. With the following diff FVP works agin diff --git a/drivers/char/hw_random/virtio-rng.c b/drivers/char/hw_random/virtio-rng.c index a6f3a8a2ac..042503ad6c 100644 --- a/drivers/char/hw_random/virtio-rng.c +++ b/drivers/char/hw_random/virtio-rng.c @@ -54,6 +54,7 @@ static void request_entropy(struct virtrng_info *vi) reinit_completion(&vi->have_data); vi->data_avail = 0; vi->data_idx = 0; + smp_mb(); sg_init_one(&sg, vi->data, sizeof(vi->data)); What do you reckon? Cheers Vladimir > > Cheers > Vladimir