From: Anthony Liguori <anthony@codemonkey.ws>
To: "Daniel P. Berrange" <berrange@redhat.com>
Cc: Amit Shah <amit.shah@redhat.com>,
Markus Armbruster <armbru@redhat.com>,
qemu list <qemu-devel@nongnu.org>
Subject: Re: [Qemu-devel] [PATCH v3 1/1] virtio-rng: hardware random number generator device
Date: Fri, 22 Jun 2012 08:44:52 -0500 [thread overview]
Message-ID: <4FE476D4.7090300@codemonkey.ws> (raw)
In-Reply-To: <20120622133425.GK10128@redhat.com>
On 06/22/2012 08:34 AM, Daniel P. Berrange wrote:
> On Fri, Jun 22, 2012 at 07:58:53AM -0500, Anthony Liguori wrote:
>> On 06/22/2012 07:31 AM, Daniel P. Berrange wrote:
>>> On Fri, Jun 22, 2012 at 07:22:51AM -0500, Anthony Liguori wrote:
>>>> On 06/22/2012 07:12 AM, Markus Armbruster wrote:
>>>>> Anthony Liguori<anthony@codemonkey.ws> writes:
>>>>>> Nack.
>>>>>>
>>>>>> Use a protocol. This is not what QMP events are designed for!
>>>>>>
>>>>>> No human is going to launch nc to a unix domain socket to launch QEMU.
>>>>>> That's a silly use-case to design for.
>>>>>
>>>>> To be honest, I'm a bit surprised to see working code that got an ACK
>>>> >from the guys with the problem it solves rejected out of hand over
>>>>> something that feels like artistic license to me.
>>>>
>>>> This is an ABI! We have to support it for the rest of time.
>>>> Everything else is a detail that is fixable but ABIs need to not
>>>> suck from the beginning.
>>>>
>>>> And using a QMP event here is sucks. It disappoints me that this is
>>>> even something I need to explain.
>>>>
>>>> QMP events occur over a single socket. If you trigger them from
>>>> guest initiated activities (that have no intrinsic rate limit), you
>>>> run into a situation where the guest could flood the management tool
>>>> and/or queue infinite amounts of memory (because events have to be
>>>> queued before they're sent). So we have rate limiting for QMP
>>>> events.
>>>>
>>>> That means QMP events (like this one) are unreliable.
>>>
>>> No it doesn't. As it stands currently, the only events that are
>>> rate limited, are those where there is no state information to
>>> loose. ie, the new event completely superceeds the old event
>>> without loosing any information.
>>>
>>>> But since QMP
>>>> events aren't acked, there's no way for the management tool to know
>>>> whether a QMP event was dropped or not. So you can run into the
>>>> following scenario:
>>>>
>>>> - Guest sends randomness request for 10 bytes
>>>> - QMP event gets sent for 10 bytes
>>>> - Guest sends randomness request for 4 bytes
>>>> - QMP is dropped
>>>>
>>>> Now what happens? With the current virtio-rng, nothing. It gets
>>>> stuck in read() for ever. Now what do we do?
>>>
>>> The RNG event will not be able to use the generic rate limiting
>>> since it has state associated with it. The rate limiting of the
>>> RNG QMP event will need to take account of this state, ie it
>>> will have to accumulate the byte count of any events dropped for
>>> rate limiting:
>>>
>>> - Guest sends randomness request for 10 bytes
>>> - QMP event gets sent for 10 bytes
>>> - Guest sends randomness request for 4 bytes
>>> - QMP is dropped
>>> - Guest sends randomness request for 8 bytes
>>> - QMP event gets sent for 12 bytes
>>
>> BTW, in the current design, there's no way to tell *which*
>> virtio-rng device needs entropy if you have multiple virtio-rng
>> devices.
>
> Oh, that's a good point.
>
>> All of these problems are naturally solved using a protocol over a CharDriverState.
>
> Can we at least agree on merging a patch which just includes the
> raw chardev backend support for virtio-rng ? ie drop the QMP
> event for now, so we can make some step forward.
All we need to do to support EGD is instead of doing:
+ QObject *data;
+
+ data = qobject_from_jsonf("{ 'bytes': %" PRId64 " }",
+ size);
+ monitor_protocol_event(QEVENT_ENTROPY_NEEDED, data);
+ qobject_decref(data);
Do:
while (size > 0) {
uint8_t partial_size = MIN(255, size);
uint8_t msg[2] = { 0x02, partial_size };
qemu_chr_write(s->chr, msg, sizeof(msg));
size -= partial_size;
}
And that's it. It's an extremely simple protocol to support. It would actually
reduce the total size of the patch.
> As mentioned in the previous thread, I see no issue with
> later implementing an alternate protocol on the chardev
> backend eg as we have raw vs telnet mode for serial ports,
> we ought to be able to have a choice of raw vs egd mode for
> virtio-rng backends
I don't really understand how raw mode works other than reading as much from
/dev/urandom as possible and filling the socket buffer buffer with it.
I think the only two modes that make sense are EGD over a socket and direct open
of /dev/urandom.
But I think the EGD mode is the more important of the two.
Regards,
Anthony Liguori
> Daniel
next prev parent reply other threads:[~2012-06-22 13:45 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-06-20 6:59 [Qemu-devel] [PATCH v3 0/1] virtio-rng: hardware random number generator Amit Shah
2012-06-20 6:59 ` [Qemu-devel] [PATCH v3 1/1] virtio-rng: hardware random number generator device Amit Shah
2012-06-20 8:36 ` Daniel P. Berrange
2012-06-20 21:29 ` Anthony Liguori
2012-06-22 11:06 ` Amit Shah
2012-07-02 17:56 ` Stefan Berger
2012-06-22 12:12 ` Markus Armbruster
2012-06-22 12:22 ` Anthony Liguori
2012-06-22 12:31 ` Daniel P. Berrange
2012-06-22 12:58 ` Anthony Liguori
2012-06-22 13:34 ` Daniel P. Berrange
2012-06-22 13:44 ` Anthony Liguori [this message]
2012-06-22 18:50 ` Amit Shah
2012-06-22 19:59 ` Anthony Liguori
2012-09-16 20:42 ` [Qemu-devel] [PATCH v3 0/1] virtio-rng: hardware random number generator H. Peter Anvin
2012-09-16 23:23 ` Anthony Liguori
2012-09-16 23:36 ` H. Peter Anvin
2012-09-17 3:21 ` Amit Shah
2012-09-17 4:27 ` H. Peter Anvin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4FE476D4.7090300@codemonkey.ws \
--to=anthony@codemonkey.ws \
--cc=amit.shah@redhat.com \
--cc=armbru@redhat.com \
--cc=berrange@redhat.com \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).