[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2] tools/ocaml/xb: Correct calculations of data/space the ring



Andrew Cooper, on Tue 10 Nov 2015 10:46:44 +0000, wrote:
> ml_interface_{read,write}() would miscalculate the quantity of
> data/space in the ring if it crossed the ring boundary, and incorrectly
> return a short read/write.
> 
> This causes a protocol stall, as either side of the ring ends up waiting
> for what they believe to be the other side needing to take the next
> action.
> 
> Correct the calculations to cope with crossing the ring boundary.
> 
> In addition, correct the error detection.  It is a hard error if the
> producer index gets more than a ring size ahead of the consumer, or if
> the consumer ever overtakes the producer.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Reviewed-by: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx>

> ---
> CC: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
> CC: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
> CC: Wei Liu <wei.liu2@xxxxxxxxxx>
> CC: David Scott <dave@xxxxxxxxxx>
> CC: Samuel Thibault <samuel.thibault@xxxxxxxxxxxx>
> 
> v2:
>  * Correct error handling adjustments
>  * More fixes to space calculations
>  * Fix whitespace errors
>  * No longer RFC - passed XenServer sanity testing
> ---
>  tools/ocaml/libs/xb/xs_ring_stubs.c | 64 
> +++++++++++++++++++++++++------------
>  1 file changed, 44 insertions(+), 20 deletions(-)
> 
> diff --git a/tools/ocaml/libs/xb/xs_ring_stubs.c 
> b/tools/ocaml/libs/xb/xs_ring_stubs.c
> index fd561a2..4737870 100644
> --- a/tools/ocaml/libs/xb/xs_ring_stubs.c
> +++ b/tools/ocaml/libs/xb/xs_ring_stubs.c
> @@ -50,7 +50,7 @@ CAMLprim value ml_interface_read(value ml_interface,
>  
>       struct xenstore_domain_interface *intf = interface->addr;
>       XENSTORE_RING_IDX cons, prod; /* offsets only */
> -     int to_read;
> +     int total_data, data;
>       uint32_t connection;
>  
>       cons = *(volatile uint32_t*)&intf->req_cons;
> @@ -65,19 +65,28 @@ CAMLprim value ml_interface_read(value ml_interface,
>       if ((prod - cons) > XENSTORE_RING_SIZE)
>               caml_failwith("bad connection");
>  
> -     if (prod == cons) {
> +     /* Check for any pending data at all. */
> +     total_data = prod - cons;
> +     if (total_data == 0) {
> +             /* No pending data at all. */
>               result = 0;
>               goto exit;
>       }
> -     cons = MASK_XENSTORE_IDX(cons);
> -     prod = MASK_XENSTORE_IDX(prod);
> -     if (prod > cons)
> -             to_read = prod - cons;
> -     else
> -             to_read = XENSTORE_RING_SIZE - cons;
> -     if (to_read < len)
> -             len = to_read;
> -     memcpy(buffer, intf->req + cons, len);
> +     else if (total_data < len)
> +             /* Some data - make a partial read. */
> +             len = total_data;
> +
> +     /* Check whether data crosses the end of the ring. */
> +     data = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(cons);
> +     if (len < data)
> +             /* Data within the remaining part of the ring. */
> +             memcpy(buffer, intf->req + MASK_XENSTORE_IDX(cons), len);
> +     else {
> +             /* Data crosses the ring boundary. Read both halves. */
> +             memcpy(buffer, intf->req + MASK_XENSTORE_IDX(cons), data);
> +             memcpy(buffer + data, intf->req, len - data);
> +     }
> +
>       xen_mb();
>       intf->req_cons += len;
>       result = len;
> @@ -100,7 +109,7 @@ CAMLprim value ml_interface_write(value ml_interface,
>  
>       struct xenstore_domain_interface *intf = interface->addr;
>       XENSTORE_RING_IDX cons, prod;
> -     int can_write;
> +     int total_space, space;
>       uint32_t connection;
>  
>       cons = *(volatile uint32_t*)&intf->rsp_cons;
> @@ -111,17 +120,32 @@ CAMLprim value ml_interface_write(value ml_interface,
>               caml_raise_constant(*caml_named_value("Xb.Reconnect"));
>  
>       xen_mb();
> -     if ( (prod - cons) >= XENSTORE_RING_SIZE ) {
> +
> +     if ((prod - cons) > XENSTORE_RING_SIZE)
> +             caml_failwith("bad connection");
> +
> +     /* Check for space to write the full message. */
> +     total_space = XENSTORE_RING_SIZE - (prod - cons);
> +     if (total_space == 0) {
> +             /* No space at all - exit having done nothing. */
>               result = 0;
>               goto exit;
>       }
> -     if (MASK_XENSTORE_IDX(prod) >= MASK_XENSTORE_IDX(cons))
> -             can_write = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(prod);
> -     else 
> -             can_write = MASK_XENSTORE_IDX(cons) - MASK_XENSTORE_IDX(prod);
> -     if (can_write < len)
> -             len = can_write;
> -     memcpy(intf->rsp + MASK_XENSTORE_IDX(prod), buffer, len);
> +     else if (total_space < len)
> +             /* Some space - make a partial write. */
> +             len = total_space;
> +
> +     /* Check for space until the ring wraps. */
> +     space = XENSTORE_RING_SIZE - MASK_XENSTORE_IDX(prod);
> +     if (len < space)
> +             /* Message fits inside the remaining part of the ring. */
> +             memcpy(intf->rsp + MASK_XENSTORE_IDX(prod), buffer, len);
> +     else {
> +             /* Message wraps around the end of the ring. Write both halves. 
> */
> +             memcpy(intf->rsp + MASK_XENSTORE_IDX(prod), buffer, space);
> +             memcpy(intf->rsp, buffer + space, len - space);
> +     }
> +
>       xen_mb();
>       intf->rsp_prod += len;
>       result = len;
> -- 
> 2.1.4
> 

-- 
Samuel
As usual, this being a 1.3.x release, I haven't even compiled this
kernel yet.  So if it works, you should be doubly impressed.
(Linus Torvalds, announcing kernel 1.3.3 on the linux-kernel mailing list.)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.