[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 13/17 v5] xen/arm: vpl011: Modify xenconsole to support multiple consoles
On Thu, 22 Jun 2017, Bhupinder Thakur wrote: > This patch adds the support for multiple consoles and introduces the iterator > functions to operate on multiple consoles. > > This patch is in preparation to support a new vuart console. > > Signed-off-by: Bhupinder Thakur <bhupinder.thakur@xxxxxxxxxx> > --- > CC: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> > CC: Wei Liu <wei.liu2@xxxxxxxxxx> > CC: Stefano Stabellini <sstabellini@xxxxxxxxxx> > CC: Julien Grall <julien.grall@xxxxxxx> > > Changes since v4: > - Changes to make event channel handling per console rather than per domain. > > Changes since v3: > - The changes in xenconsole have been split into four patches. This is the > third patch. > > tools/console/daemon/io.c | 435 > ++++++++++++++++++++++++++++++++-------------- > 1 file changed, 302 insertions(+), 133 deletions(-) > > diff --git a/tools/console/daemon/io.c b/tools/console/daemon/io.c > index a2a3496..baf0e2e 100644 > --- a/tools/console/daemon/io.c > +++ b/tools/console/daemon/io.c > @@ -90,12 +90,14 @@ struct buffer { > }; > > struct console { > + char *ttyname; > int master_fd; > int master_pollfd_idx; > int slave_fd; > int log_fd; > struct buffer buffer; > char *xspath; > + char *log_suffix; > int ring_ref; > xenevtchn_handle *xce_handle; > int xce_pollfd_idx; > @@ -107,16 +109,112 @@ struct console { > struct domain *d; > }; > > +struct console_data { > + char *xsname; > + char *ttyname; > + char *log_suffix; > +}; > + > +static struct console_data console_data[] = { > + > + { > + .xsname = "/console", > + .ttyname = "tty", > + .log_suffix = "", > + }, > +}; > + > +#define MAX_CONSOLE (sizeof(console_data)/sizeof(struct console_data)) > + > struct domain { > int domid; > bool is_dead; > unsigned last_seen; > struct domain *next; > - struct console console; > + struct console console[MAX_CONSOLE]; > }; > > static struct domain *dom_head; > > +typedef void (*VOID_ITER_FUNC_ARG1)(struct console *); > +typedef bool (*BOOL_ITER_FUNC_ARG1)(struct console *); > +typedef int (*INT_ITER_FUNC_ARG1)(struct console *); > +typedef void (*VOID_ITER_FUNC_ARG2)(struct console *, void *); > +typedef int (*INT_ITER_FUNC_ARG3)(struct console *, > + struct domain *dom, void **); > + > +static inline bool console_enabled(struct console *con) > +{ > + return con->local_port != -1; > +} > + > +static inline void console_iter_void_arg1(struct domain *d, > + > VOID_ITER_FUNC_ARG1 iter_func) > +{ > + int i = 0; > + struct console *con = &(d->console[0]); > + > + for (i = 0; i < MAX_CONSOLE; i++, con++) > + { > + iter_func(con); > + } > +} > + > +static inline void console_iter_void_arg2(struct domain *d, > + > VOID_ITER_FUNC_ARG2 iter_func, > + > void *iter_data) > +{ > + int i = 0; > + struct console *con = &(d->console[0]); > + > + for (i = 0; i < MAX_CONSOLE; i++, con++) > + { > + iter_func(con, iter_data); > + } > +} > + > +static inline bool console_iter_bool_arg1(struct domain *d, > + > BOOL_ITER_FUNC_ARG1 iter_func) > +{ > + int i = 0; > + struct console *con = &(d->console[0]); > + > + for (i = 0; i < MAX_CONSOLE; i++, con++) > + { > + if (iter_func(con)) > + return true; > + } > + return false; > +} > + > +static inline int console_iter_int_arg1(struct domain *d, > + > INT_ITER_FUNC_ARG1 iter_func) > +{ > + int i = 0; > + struct console *con = &(d->console[0]); > + > + for (i = 0; i < MAX_CONSOLE; i++, con++) > + { > + if (iter_func(con)) > + return 1; > + } > + return 0; > +} > + > +static inline int console_iter_int_arg3(struct domain *d, > + > INT_ITER_FUNC_ARG3 iter_func, > + > void **iter_data) > +{ > + int i = 0; > + struct console *con = &(d->console[0]); > + > + for (i = 0; i < MAX_CONSOLE; i++, con++) > + { > + if (iter_func(con, d, iter_data)) > + return 1; > + } > + return 0; > +} > static int write_all(int fd, const char* buf, size_t len) > { > while (len) { > @@ -163,12 +261,22 @@ static int write_with_timestamp(int fd, const char > *data, size_t sz, > return 0; > } > > -static void buffer_append(struct console *con) > +static inline bool buffer_available(struct console *con) > +{ > + if (discard_overflowed_data || > + !con->buffer.max_capacity || > + con->buffer.size < con->buffer.max_capacity) > + return true; > + else > + return false; > +} > + > +static void buffer_append(struct console *con, xenevtchn_port_or_error_t > port) > { it doesn't look like port is used anywhere here > struct buffer *buffer = &con->buffer; > + struct xencons_interface *intf = con->interface; > struct domain *dom = con->d; > XENCONS_RING_IDX cons, prod, size; > - struct xencons_interface *intf = con->interface; Spurious change? > cons = intf->out_cons; > prod = intf->out_prod; > @@ -321,7 +429,7 @@ static int create_console_log(struct console *con) > return -1; > } > > - snprintf(logfile, PATH_MAX-1, "%s/guest-%s.log", log_dir, data); > + snprintf(logfile, PATH_MAX-1, "%s/guest-%s%s.log", log_dir, data, > con->log_suffix); > free(data); > logfile[PATH_MAX-1] = '\0'; > > @@ -473,7 +581,7 @@ static int console_create_tty(struct console *con) > } > free(path); > > - success = (asprintf(&path, "%s/tty", con->xspath) != -1); > + success = (asprintf(&path, "%s/%s", con->xspath, con->ttyname) != -1); > if (!success) > goto out; > success = xs_write(xs, XBT_NULL, path, slave, strlen(slave)); > @@ -594,6 +702,7 @@ static int console_create_ring(struct console *con) > > con->local_port = -1; > con->remote_port = -1; > + > if (con->xce_handle != NULL) > xenevtchn_close(con->xce_handle); Spurious change > @@ -639,13 +748,13 @@ static bool watch_domain(struct domain *dom, bool watch) > { > char domid_str[3 + MAX_STRLEN(dom->domid)]; > bool success; > - struct console *con = &dom->console; > + struct console *con = &dom->console[0]; > > snprintf(domid_str, sizeof(domid_str), "dom%u", dom->domid); > if (watch) { > success = xs_watch(xs, con->xspath, domid_str); > if (success) > - console_create_ring(con); > + console_iter_int_arg1(dom, console_create_ring); > else > xs_unwatch(xs, con->xspath, domid_str); > } else { > @@ -655,20 +764,59 @@ static bool watch_domain(struct domain *dom, bool watch) > return success; > } > > - > -static struct domain *create_domain(int domid) > +static int console_init(struct console *con, struct domain *dom, void **data) > { > - struct domain *dom; > char *s; > + int err = -1; > struct timespec ts; > - struct console *con; > + struct console_data **con_data = (struct console_data **)data; > + char *xsname; > > if (clock_gettime(CLOCK_MONOTONIC, &ts) < 0) { > dolog(LOG_ERR, "Cannot get time of day %s:%s:L%d", > __FILE__, __FUNCTION__, __LINE__); > - return NULL; > + return err; > + } > + > + con->master_fd = -1; > + con->master_pollfd_idx = -1; > + con->slave_fd = -1; > + con->log_fd = -1; > + con->ring_ref = -1; > + con->local_port = -1; > + con->remote_port = -1; > + con->xce_pollfd_idx = -1; > + con->next_period = ((long long)ts.tv_sec * 1000) + (ts.tv_nsec / > 1000000) + RATE_LIMIT_PERIOD; > + con->d = dom; > + con->ttyname = (*con_data)->ttyname; > + con->log_suffix = (*con_data)->log_suffix; > + xsname = (*con_data)->xsname; > + con->xspath = xs_get_domain_path(xs, dom->domid); > + s = realloc(con->xspath, strlen(con->xspath) + > + strlen(xsname) + 1); > + if (s) > + { > + con->xspath = s; > + strcat(con->xspath, xsname); > + err = 0; > } > > + (*con_data)++; > + > + return err; > +} > + > +static void console_free(struct console *con) > +{ > + if (con->xspath) > + free(con->xspath); > +} > + > +static struct domain *create_domain(int domid) > +{ > + struct domain *dom; > + struct console_data *con_data = &console_data[0]; > + > dom = calloc(1, sizeof *dom); > if (dom == NULL) { > dolog(LOG_ERR, "Out of memory %s:%s():L%d", > @@ -678,27 +826,8 @@ static struct domain *create_domain(int domid) > > dom->domid = domid; > > - con = &dom->console; > - con->xspath = xs_get_domain_path(xs, dom->domid); > - s = realloc(con->xspath, strlen(con->xspath) + > - strlen("/console") + 1); > - if (s == NULL) > + if (console_iter_int_arg3(dom, console_init, (void **)&con_data)) > goto out; > - con->xspath = s; > - strcat(con->xspath, "/console"); > - > - con->master_fd = -1; > - con->master_pollfd_idx = -1; > - con->slave_fd = -1; > - con->log_fd = -1; > - con->xce_pollfd_idx = -1; > - con->d = dom; > - > - con->next_period = ((long long)ts.tv_sec * 1000) + (ts.tv_nsec / > 1000000) + RATE_LIMIT_PERIOD; > - > - con->ring_ref = -1; > - con->local_port = -1; > - con->remote_port = -1; > > if (!watch_domain(dom, true)) > goto out; > @@ -710,7 +839,7 @@ static struct domain *create_domain(int domid) > > return dom; > out: > - free(con->xspath); > + console_iter_void_arg1(dom, console_free); > free(dom); > return NULL; > } > @@ -740,38 +869,51 @@ static void remove_domain(struct domain *dom) > } > } > > -static void cleanup_domain(struct domain *d) > +static void console_cleanup(struct console *con) > { > - struct console *con = &d->console; > - > - console_close_tty(con); > - > if (con->log_fd != -1) { > close(con->log_fd); > con->log_fd = -1; > } > > - free(con->buffer.data); > - con->buffer.data = NULL; > + if (con->buffer.data) > + { > + free(con->buffer.data); > + con->buffer.data = NULL; > + } > + > + if (con->xspath) > + { > + free(con->xspath); > + con->xspath = NULL; > + } > +} > + > +static void cleanup_domain(struct domain *d) > +{ > + console_iter_void_arg1(d, console_close_tty); > > - free(con->xspath); > - con->xspath = NULL; > + console_iter_void_arg1(d, console_cleanup); > > remove_domain(d); > } > > -static void shutdown_domain(struct domain *d) > +static void console_close_evtchn(struct console *con) > { > - struct console *con = &d->console; > - > - d->is_dead = true; > - watch_domain(d, false); > - console_unmap_interface(con); > if (con->xce_handle != NULL) > xenevtchn_close(con->xce_handle); > + > con->xce_handle = NULL; > } > > +static void shutdown_domain(struct domain *d) > +{ > + d->is_dead = true; > + watch_domain(d, false); > + console_iter_void_arg1(d, console_unmap_interface); > + console_iter_void_arg1(d, console_close_evtchn); > +} > + > static unsigned enum_pass = 0; > > static void enum_domains(void) > @@ -885,12 +1027,32 @@ static void handle_tty_write(struct console *con) > } > } > > -static void handle_ring_read(struct domain *dom) > +static void console_evtchn_unmask(struct console *con, void *data) > +{ > + long long now = (long long)data; > + > + if (!console_enabled(con)) > + return; > + > + /* CS 16257:955ee4fa1345 introduces a 5ms fuzz > + * for select(), it is not clear poll() has > + * similar behavior (returning a couple of ms > + * sooner than requested) as well. Just leave > + * the fuzz here. Remove it with a separate > + * patch if necessary */ > + if ((now+5) > con->next_period) { > + con->next_period = now + RATE_LIMIT_PERIOD; > + if (con->event_count >= RATE_LIMIT_ALLOWANCE) > + (void)xenevtchn_unmask(con->xce_handle, > con->local_port); > + con->event_count = 0; > + } > +} > + > +static void handle_ring_read(struct console *con) > { > xenevtchn_port_or_error_t port; > - struct console *con = &dom->console; > > - if (dom->is_dead) > + if (con->d->is_dead) > return; > > if ((port = xenevtchn_pending(con->xce_handle)) == -1) > @@ -898,10 +1060,23 @@ static void handle_ring_read(struct domain *dom) > > con->event_count++; > > - buffer_append(con); > + buffer_append(con, port); > > if (con->event_count < RATE_LIMIT_ALLOWANCE) > - (void)xenevtchn_unmask(con->xce_handle, port); > + (void)xenevtchn_unmask(con->xce_handle, con->local_port); > +} > + > +static void handle_console_ring(struct console *con) > +{ > + if (con->event_count < RATE_LIMIT_ALLOWANCE) { > + if (con->xce_handle != NULL && > + con->xce_pollfd_idx != -1 && > + !(fds[con->xce_pollfd_idx].revents & > + ~(POLLIN|POLLOUT|POLLPRI)) && > + (fds[con->xce_pollfd_idx].revents & > + POLLIN)) > + handle_ring_read(con); > + } > } > > static void handle_xs(void) > @@ -922,7 +1097,7 @@ static void handle_xs(void) > /* We may get watches firing for domains that have recently > been removed, so dom may be NULL here. */ > if (dom && dom->is_dead == false) > - console_create_ring(&dom->console); > + console_iter_int_arg1(dom, console_create_ring); > } > > free(vec); > @@ -963,16 +1138,22 @@ static void handle_hv_logs(xenevtchn_handle > *xce_handle, bool force) > (void)xenevtchn_unmask(xce_handle, port); > } > > +static void console_open_log(struct console *con) > +{ > + if (console_enabled(con)) > + { > + if (con->log_fd != -1) > + close(con->log_fd); > + con->log_fd = create_console_log(con); > + } > +} > + > static void handle_log_reload(void) > { > if (log_guest) { > struct domain *d; > for (d = dom_head; d; d = d->next) { > - struct console *con = &d->console; > - > - if (con->log_fd != -1) > - close(con->log_fd); > - con->log_fd = create_console_log(con); > + console_iter_void_arg1(d, console_open_log); > } > } > > @@ -1024,6 +1205,62 @@ static void reset_fds(void) > memset(fds, 0, sizeof(struct pollfd) * current_array_size); > } > > +static void add_console_evtchn_fd(struct console *con, void *data) > +{ > + long long next_timeout = *((long long *)data); > + > + if (con->event_count >= RATE_LIMIT_ALLOWANCE) { > + /* Determine if we're going to be the next time slice to expire > */ > + if (!next_timeout || > + con->next_period < next_timeout) > + next_timeout = con->next_period; > + } else if (con->xce_handle != NULL) { > + if (buffer_available(con)) > + { > + int evtchn_fd = xenevtchn_fd(con->xce_handle); > + con->xce_pollfd_idx = set_fds(evtchn_fd, > + > POLLIN|POLLPRI); > + } > + } > + > + *((long long *)data) = next_timeout; > +} > + > +static void add_console_tty_fd(struct console *con) > +{ > + if (con->master_fd != -1) { > + short events = 0; > + if (!con->d->is_dead && ring_free_bytes(con)) > + events |= POLLIN; > + > + if (!buffer_empty(&con->buffer)) > + events |= POLLOUT; > + > + if (events) > + con->master_pollfd_idx = > + set_fds(con->master_fd, events|POLLPRI); > + } > +} > + > +static void handle_console_tty(struct console *con) > +{ > + if (con->master_fd != -1 && con->master_pollfd_idx != -1) { > + if (fds[con->master_pollfd_idx].revents & > + ~(POLLIN|POLLOUT|POLLPRI)) > + console_handle_broken_tty(con, > domain_is_valid(con->d->domid)); > + else { > + if (fds[con->master_pollfd_idx].revents & > + POLLIN) > + handle_tty_read(con); > + if (fds[con->master_pollfd_idx].revents & > + POLLOUT) > + handle_tty_write(con); > + } > + } > + con->master_pollfd_idx = -1; > + con->xce_pollfd_idx = -1; > +} > + > void handle_io(void) > { > int ret; > @@ -1081,55 +1318,11 @@ void handle_io(void) > /* Re-calculate any event counter allowances & unblock > domains with new allowance */ > for (d = dom_head; d; d = d->next) { > - struct console *con = &d->console; > - > - /* CS 16257:955ee4fa1345 introduces a 5ms fuzz > - * for select(), it is not clear poll() has > - * similar behavior (returning a couple of ms > - * sooner than requested) as well. Just leave > - * the fuzz here. Remove it with a separate > - * patch if necessary */ > - if ((now+5) > con->next_period) { > - con->next_period = now + RATE_LIMIT_PERIOD; > - if (con->event_count >= RATE_LIMIT_ALLOWANCE) { > - (void)xenevtchn_unmask(con->xce_handle, > con->local_port); > - } > - con->event_count = 0; > - } > - } > > - for (d = dom_head; d; d = d->next) { > - struct console *con = &d->console; > - > - if (con->event_count >= RATE_LIMIT_ALLOWANCE) { > - /* Determine if we're going to be the next time > slice to expire */ > - if (!next_timeout || > - con->next_period < next_timeout) > - next_timeout = con->next_period; > - } else if (con->xce_handle != NULL) { > - if (discard_overflowed_data || > - !con->buffer.max_capacity || > - con->buffer.size < > con->buffer.max_capacity) { > - int evtchn_fd = > xenevtchn_fd(con->xce_handle); > - con->xce_pollfd_idx = set_fds(evtchn_fd, > - > POLLIN|POLLPRI); > - } > - } > - > - if (con->master_fd != -1) { > - short events = 0; > - if (!d->is_dead && ring_free_bytes(con)) > - events |= POLLIN; > - > - if (!buffer_empty(&con->buffer)) > - events |= POLLOUT; > - > - if (events) > - con->master_pollfd_idx = > - set_fds(con->master_fd, > - events|POLLPRI); > - } > - } > + console_iter_void_arg2(d, console_evtchn_unmask, (void > *)now); > + console_iter_void_arg2(d, add_console_evtchn_fd, (void > *)&next_timeout); > + console_iter_void_arg1(d, add_console_tty_fd); > + } > > /* If any domain has been rate limited, we need to work > out what timeout to supply to poll */ > @@ -1189,35 +1382,11 @@ void handle_io(void) > } > > for (d = dom_head; d; d = n) { > - struct console *con = &d->console; > > n = d->next; > - if (con->event_count < RATE_LIMIT_ALLOWANCE) { > - if (con->xce_handle != NULL && > - con->xce_pollfd_idx != -1 && > - !(fds[con->xce_pollfd_idx].revents & > - ~(POLLIN|POLLOUT|POLLPRI)) && > - (fds[con->xce_pollfd_idx].revents & > - POLLIN)) > - handle_ring_read(d); > - } > - > - if (con->master_fd != -1 && con->master_pollfd_idx != > -1) { > - if (fds[con->master_pollfd_idx].revents & > - ~(POLLIN|POLLOUT|POLLPRI)) > - console_handle_broken_tty(con, > - domain_is_valid(d->domid)); > - else { > - if (fds[con->master_pollfd_idx].revents > & > - POLLIN) > - handle_tty_read(con); > - if (fds[con->master_pollfd_idx].revents > & > - POLLOUT) > - handle_tty_write(con); > - } > - } > > - con->xce_pollfd_idx = con->master_pollfd_idx = -1; > + console_iter_void_arg1(d, handle_console_ring); > + console_iter_void_arg1(d, handle_console_tty); > > if (d->last_seen != enum_pass) > shutdown_domain(d); > -- > 2.7.4 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |