|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] xenconsoled: use grant references instead of map_foreign_range
On 01/10/2013 11:11 AM, Ian Campbell wrote:
> On Thu, 2012-12-13 at 16:08 +0000, Daniel De Graaf wrote:
>> Grant references for the xenstore and xenconsole shared pages exist, but
>> currently only xenstore uses these references. Change the xenconsole
>> daemon to prefer using the grant reference over map_foreign_range when
>> mapping the shared console ring.
>>
>> This allows xenconsoled to be run in a domain other than dom0 if set up
>> correctly - for libxl, the xenstore path /tool/xenconsoled/domid
>> specifies the domain containing xenconsoled.
>>
>> Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
>> Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
>> Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
>> Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
>> ---
>> tools/console/daemon/io.c | 45 +++++++++++++++++++++++++++++++++++++++------
>> 1 file changed, 39 insertions(+), 6 deletions(-)
>>
>> diff --git a/tools/console/daemon/io.c b/tools/console/daemon/io.c
>> index 48fe151..e24247d 100644
>> --- a/tools/console/daemon/io.c
>> +++ b/tools/console/daemon/io.c
>> @@ -24,6 +24,7 @@
>> #include "io.h"
>> #include <xenstore.h>
>> #include <xen/io/console.h>
>> +#include <xen/grant_table.h>
>>
>> #include <stdlib.h>
>> #include <errno.h>
>> @@ -69,6 +70,7 @@ static int log_hv_fd = -1;
>> static evtchn_port_or_error_t log_hv_evtchn = -1;
>> static xc_interface *xch; /* why does xenconsoled have two xc handles ? */
>> static xc_evtchn *xce_handle = NULL;
>> +static xc_gnttab *xcg_handle = NULL;
>>
>> struct buffer {
>> char *data;
>> @@ -501,6 +503,17 @@ static int xs_gather(struct xs_handle *xs, const char
>> *dir, ...)
>> va_end(ap);
>> return ret;
>> }
>> +
>> +static void domain_unmap_interface(struct domain *dom)
>> +{
>> + if (dom->interface == NULL)
>> + return;
>> + if (xcg_handle && dom->ring_ref == -1)
>> + xc_gnttab_munmap(xcg_handle, dom->interface, 1);
>> + else
>> + munmap(dom->interface, getpagesize());
>> + dom->interface = NULL;
>> +}
>>
>> static int domain_create_ring(struct domain *dom)
>> {
>> @@ -522,9 +535,19 @@ static int domain_create_ring(struct domain *dom)
>> }
>> free(type);
>>
>> - if (ring_ref != dom->ring_ref) {
>> - if (dom->interface != NULL)
>> - munmap(dom->interface, getpagesize());
>> + /* If using ring_ref and it has changed, remap */
>> + if (ring_ref != dom->ring_ref && dom->ring_ref != -1)
>> + domain_unmap_interface(dom);
>> +
>> + if (!dom->interface && xcg_handle) {
>> + /* Prefer using grant table */
>> + dom->interface = xc_gnttab_map_grant_ref(xcg_handle,
>> + dom->domid, GNTTAB_RESERVED_CONSOLE,
>> + PROT_READ|PROT_WRITE);
>> + dom->ring_ref = -1;
>> + }
>> + if (!dom->interface) {
>> + /* Fall back to xc_map_foreign_range */
>
> If you get here and then xc_map_foreign_range fails nothing will reset
> dom->ring_ref to -1, so in the case where it has changed and you are
> remapping it will retain its previous value. That's going to cause
> confusion if the ring ref changes again I think? Easily fixed by
> resetting ring_ref in domain_unmap_interface.
Yep, will add that next version.
> Hrm, that's probably a preexisting issue now I think about it.
>
> I notice that nothing checks the error returns from this function. Oh
> well.
>
>> d->xce_handle = NULL;
>> @@ -736,6 +757,13 @@ void enum_domains(void)
>> xc_dominfo_t dominfo;
>> struct domain *dom;
>>
>> + if (enum_pass == 0) {
>> + xcg_handle = xc_gnttab_open(NULL, 0);
>> + if (xcg_handle == NULL) {
>> + dolog(LOG_DEBUG, "Failed to open xcg handle: %d (%s)",
>> + errno, strerror(errno));
>> + }
>> + }
>
> I think it would be preferable to open this along with the other handles
> in handle_io.
>
> Ian.
>
That's too late: the grant table file descriptor must be open when enum_domains
is run, and main() calls enum_domains() just before it calls handle_io().
I could move that call to enum_domains() into handle_io() if that's preferred;
it seems like that would be cleaner, especially since that's where the cleanup
is located.
--
Daniel De Graaf
National Security Agency
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |