mirror of
https://github.com/RGBCube/serenity
synced 2025-05-14 08:04:57 +00:00

Until now, our kernel has reimplemented a number of AK classes to provide automatic internal locking: - RefPtr - NonnullRefPtr - WeakPtr - Weakable This patch renames the Kernel classes so that they can coexist with the original AK classes: - RefPtr => LockRefPtr - NonnullRefPtr => NonnullLockRefPtr - WeakPtr => LockWeakPtr - Weakable => LockWeakable The goal here is to eventually get rid of the Lock* classes in favor of using external locking.
78 lines
2.2 KiB
C++
78 lines
2.2 KiB
C++
/*
|
|
* Copyright (c) 2021, the SerenityOS developers.
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <Kernel/Bus/VirtIO/RNG.h>
|
|
#include <Kernel/Sections.h>
|
|
|
|
namespace Kernel::VirtIO {
|
|
|
|
UNMAP_AFTER_INIT NonnullLockRefPtr<RNG> RNG::must_create(PCI::DeviceIdentifier const& device_identifier)
|
|
{
|
|
return adopt_lock_ref_if_nonnull(new RNG(device_identifier)).release_nonnull();
|
|
}
|
|
|
|
UNMAP_AFTER_INIT void RNG::initialize()
|
|
{
|
|
Device::initialize();
|
|
bool success = negotiate_features([&](auto) {
|
|
return 0;
|
|
});
|
|
if (success) {
|
|
success = setup_queues(1);
|
|
}
|
|
if (success) {
|
|
finish_init();
|
|
m_entropy_buffer = MM.allocate_contiguous_kernel_region(PAGE_SIZE, "VirtIO::RNG"sv, Memory::Region::Access::ReadWrite).release_value();
|
|
if (m_entropy_buffer) {
|
|
memset(m_entropy_buffer->vaddr().as_ptr(), 0, m_entropy_buffer->size());
|
|
request_entropy_from_host();
|
|
}
|
|
}
|
|
}
|
|
|
|
UNMAP_AFTER_INIT RNG::RNG(PCI::DeviceIdentifier const& device_identifier)
|
|
: VirtIO::Device(device_identifier)
|
|
{
|
|
}
|
|
|
|
bool RNG::handle_device_config_change()
|
|
{
|
|
return false; // Device has no config
|
|
}
|
|
|
|
void RNG::handle_queue_update(u16 queue_index)
|
|
{
|
|
VERIFY(queue_index == REQUESTQ);
|
|
size_t available_entropy = 0, used;
|
|
auto& queue = get_queue(REQUESTQ);
|
|
{
|
|
SpinlockLocker lock(queue.lock());
|
|
auto chain = queue.pop_used_buffer_chain(used);
|
|
if (chain.is_empty())
|
|
return;
|
|
VERIFY(chain.length() == 1);
|
|
chain.for_each([&available_entropy](PhysicalAddress, size_t length) {
|
|
available_entropy = length;
|
|
});
|
|
chain.release_buffer_slots_to_queue();
|
|
}
|
|
dbgln_if(VIRTIO_DEBUG, "VirtIO::RNG: received {} bytes of entropy!", available_entropy);
|
|
for (auto i = 0u; i < available_entropy; i++) {
|
|
m_entropy_source.add_random_event(m_entropy_buffer->vaddr().as_ptr()[i]);
|
|
}
|
|
// TODO: When should we get some more entropy?
|
|
}
|
|
|
|
void RNG::request_entropy_from_host()
|
|
{
|
|
auto& queue = get_queue(REQUESTQ);
|
|
SpinlockLocker lock(queue.lock());
|
|
QueueChain chain(queue);
|
|
chain.add_buffer_to_chain(m_entropy_buffer->physical_page(0)->paddr(), PAGE_SIZE, BufferType::DeviceWritable);
|
|
supply_chain_and_notify(REQUESTQ, chain);
|
|
}
|
|
|
|
}
|