Skip to content

Commit ff29629

Browse files
bebarinoherbertx
authored andcommitted
random: Support freezable kthreads in add_hwgenerator_randomness()
The kthread calling this function is freezable after commit 03a3bb7 ("hwrng: core - Freeze khwrng thread during suspend") is applied. Unfortunately, this function uses wait_event_interruptible() but doesn't check for the kthread being woken up by the fake freezer signal. When a user suspends the system, this kthread will wake up and if it fails the entropy size check it will immediately go back to sleep and not go into the freezer. Eventually, suspend will fail because the task never froze and a warning message like this may appear: PM: suspend entry (deep) Filesystems sync: 0.000 seconds Freezing user space processes ... (elapsed 0.001 seconds) done. OOM killer disabled. Freezing remaining freezable tasks ... Freezing of tasks failed after 20.003 seconds (1 tasks refusing to freeze, wq_busy=0): hwrng R running task 0 289 2 0x00000020 [<c08c64c4>] (__schedule) from [<c08c6a10>] (schedule+0x3c/0xc0) [<c08c6a10>] (schedule) from [<c05dbd8c>] (add_hwgenerator_randomness+0xb0/0x100) [<c05dbd8c>] (add_hwgenerator_randomness) from [<bf1803c8>] (hwrng_fillfn+0xc0/0x14c [rng_core]) [<bf1803c8>] (hwrng_fillfn [rng_core]) from [<c015abec>] (kthread+0x134/0x148) [<c015abec>] (kthread) from [<c01010e8>] (ret_from_fork+0x14/0x2c) Check for a freezer signal here and skip adding any randomness if the task wakes up because it was frozen. This should make the kthread freeze properly and suspend work again. Fixes: 03a3bb7 ("hwrng: core - Freeze khwrng thread during suspend") Reported-by: Keerthy <[email protected]> Tested-by: Keerthy <[email protected]> Signed-off-by: Stephen Boyd <[email protected]> Signed-off-by: Herbert Xu <[email protected]>
1 parent 1984296 commit ff29629

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

drivers/char/random.c

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2429,6 +2429,7 @@ void add_hwgenerator_randomness(const char *buffer, size_t count,
24292429
size_t entropy)
24302430
{
24312431
struct entropy_store *poolp = &input_pool;
2432+
bool frozen = false;
24322433

24332434
if (unlikely(crng_init == 0)) {
24342435
crng_fast_load(buffer, count);
@@ -2439,9 +2440,12 @@ void add_hwgenerator_randomness(const char *buffer, size_t count,
24392440
* We'll be woken up again once below random_write_wakeup_thresh,
24402441
* or when the calling thread is about to terminate.
24412442
*/
2442-
wait_event_interruptible(random_write_wait, kthread_should_stop() ||
2443+
wait_event_interruptible(random_write_wait,
2444+
kthread_freezable_should_stop(&frozen) ||
24432445
ENTROPY_BITS(&input_pool) <= random_write_wakeup_bits);
2444-
mix_pool_bytes(poolp, buffer, count);
2445-
credit_entropy_bits(poolp, entropy);
2446+
if (!frozen) {
2447+
mix_pool_bytes(poolp, buffer, count);
2448+
credit_entropy_bits(poolp, entropy);
2449+
}
24462450
}
24472451
EXPORT_SYMBOL_GPL(add_hwgenerator_randomness);

0 commit comments

Comments
 (0)