|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] argo: correctly report pending message length
commit 8966a3e9ab485f3a9d2adf66b71265163f8fb8eb
Author: Nicholas Tsirakis <niko.tsirakis@xxxxxxxxx>
AuthorDate: Wed Jun 12 08:34:45 2019 -0400
Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CommitDate: Wed Jun 12 21:06:18 2019 +0100
argo: correctly report pending message length
When a message is requeue'd in Xen's internal queue, the queue
entry contains the length of the message so that Xen knows to
send a VIRQ to the respective domain when enough space frees up
in the ring. Due to a small bug, however, Xen doesn't populate
the length of the msg if a given write fails, so this length is
always reported as zero. This causes Xen to spuriously wake up
a domain even when the ring doesn't have enough space.
This patch makes sure that the msg len is properly reported by
populating it in the event of a write failure.
Signed-off-by: Nicholas Tsirakis <tsirakisn@xxxxxxxxxxxx>
Reviewed-by: Christopher Clark <christopher.w.clark@xxxxxxxxx>
---
xen/common/argo.c | 39 +++++++++++++++++++--------------------
1 file changed, 19 insertions(+), 20 deletions(-)
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 2f874a570d..c8f4302963 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -765,27 +765,20 @@ iov_count(const xen_argo_iov_t *piov, unsigned int niov,
static int
ringbuf_insert(const struct domain *d, struct argo_ring_info *ring_info,
const struct argo_ring_id *src_id, xen_argo_iov_t *iovs,
- unsigned int niov, uint32_t message_type,
- unsigned long *out_len)
+ unsigned int niov, uint32_t message_type, unsigned int len)
{
xen_argo_ring_t ring;
struct xen_argo_ring_message_header mh = { };
int sp, ret;
- unsigned int len = 0;
xen_argo_iov_t *piov;
XEN_GUEST_HANDLE(uint8) NULL_hnd = { };
ASSERT(LOCKING_L3(d, ring_info));
/*
- * Obtain the total size of data to transmit -- sets the 'len' variable
- * -- and sanity check that the iovs conform to size and number limits.
* Enforced below: no more than 'len' bytes of guest data
* (plus the message header) will be sent in this operation.
*/
- ret = iov_count(iovs, niov, &len);
- if ( ret )
- return ret;
/*
* Upper bound check the message len against the ring size.
@@ -983,8 +976,6 @@ ringbuf_insert(const struct domain *d, struct
argo_ring_info *ring_info,
* versus performance cost could be added to decide that here.
*/
- *out_len = len;
-
return ret;
}
@@ -1976,7 +1967,7 @@ sendv(struct domain *src_d, xen_argo_addr_t *src_addr,
struct argo_ring_id src_id;
struct argo_ring_info *ring_info;
int ret = 0;
- unsigned long len = 0;
+ unsigned int len = 0;
argo_dprintk("sendv: (%u:%x)->(%u:%x) niov:%u type:%x\n",
src_addr->domain_id, src_addr->aport, dst_addr->domain_id,
@@ -2044,17 +2035,25 @@ sendv(struct domain *src_d, xen_argo_addr_t *src_addr,
{
spin_lock(&ring_info->L3_lock);
- ret = ringbuf_insert(dst_d, ring_info, &src_id, iovs, niov,
- message_type, &len);
- if ( ret == -EAGAIN )
+ /*
+ * Obtain the total size of data to transmit -- sets the 'len' variable
+ * -- and sanity check that the iovs conform to size and number limits.
+ */
+ ret = iov_count(iovs, niov, &len);
+ if ( !ret )
{
- int rc;
+ ret = ringbuf_insert(dst_d, ring_info, &src_id, iovs, niov,
+ message_type, len);
+ if ( ret == -EAGAIN )
+ {
+ int rc;
- argo_dprintk("argo_ringbuf_sendv failed, EAGAIN\n");
- /* requeue to issue a notification when space is there */
- rc = pending_requeue(dst_d, ring_info, src_id.domain_id, len);
- if ( rc )
- ret = rc;
+ argo_dprintk("argo_ringbuf_sendv failed, EAGAIN\n");
+ /* requeue to issue a notification when space is there */
+ rc = pending_requeue(dst_d, ring_info, src_id.domain_id, len);
+ if ( rc )
+ ret = rc;
+ }
}
spin_unlock(&ring_info->L3_lock);
--
generated by git-patchbot for /home/xen/git/xen.git#staging
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/xen-changelog
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |