From patchwork Wed May 10 14:35:14 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bhupinder Thakur X-Patchwork-Id: 99006 Delivered-To: patch@linaro.org Received: by 10.182.142.97 with SMTP id rv1csp234319obb; Wed, 10 May 2017 07:39:45 -0700 (PDT) X-Received: by 10.107.189.194 with SMTP id n185mr1315177iof.13.1494427185701; Wed, 10 May 2017 07:39:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1494427185; cv=none; d=google.com; s=arc-20160816; b=rBsUqd5whdHoi2qSj1lTKC6qn7rtrhRAt7lLUrNXbaHt6hYDuFiLSryXnzOL2MIXIh K++29GWk4popG0I8u+5tOC93ly7Ex2mQwAk7fw25HYZoQsKYBetlSGeCy+hYwF/n2Are Jg5SVxyfWLdVfoHy3y3DxTVCjAsjbCTXXqNC7saLv4OpGA0029Pu0N7G+y8CYaxnMyfg 40sxsWsDd4uCfKAqW4hF41jcPe4exGgJS/ez/3rxd5NJwFRj5UCOFiDkZzUCrI/5c+PV z07SAjD76opbM3kdz52UN9y3Ailsu2W6KexeD143HfCXt1s3GrJ5X7A8CqMwBHQMDMrR BFlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-unsubscribe:list-id :precedence:subject:cc:references:in-reply-to:message-id:date:to :from:dkim-signature:arc-authentication-results; bh=FrRoJVUeXIiMgXrzEjvYLeqRs+NxvpGWQBizWW2qzBk=; b=WFgCVfvBtpN8/K0/l3JG8GnzW0sT0cGVK2Xai9hYBfu8lPDf4w7qkdlJ1czjpVZh6C 1eQ93+tOFi/uSuNo3L9QEbRyk4aZfLOHJdgS7TkpUkbwgdLkQBFoDuIzDUD+uoy4ROiO xbFMZE+ubCPEHwuCRMc+tLtq5PkHyvyQTfGHTchZxkTSQ0FQmR8eMYgNgFBKlOJcXcNs xFA3Faa+uGQSjwpWXzNPXjmySsyleBxvtdJ3NSJgEHh+6dXomNZrlOjx+6mG07w8B3QP yDEHFg3UAl4NvAzgjsQxwrKVEoYb+Jf1Ip96azDH2wTXc5q8TTo3ZIcE1BBJeD3XYkQX q8kA== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org; spf=neutral (google.com: 192.237.175.120 is neither permitted nor denied by best guess record for domain of xen-devel-bounces@lists.xen.org) smtp.mailfrom=xen-devel-bounces@lists.xen.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.xenproject.org (lists.xenproject.org. [192.237.175.120]) by mx.google.com with ESMTPS id c5si3582217ith.16.2017.05.10.07.39.45 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 10 May 2017 07:39:45 -0700 (PDT) Received-SPF: neutral (google.com: 192.237.175.120 is neither permitted nor denied by best guess record for domain of xen-devel-bounces@lists.xen.org) client-ip=192.237.175.120; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org; spf=neutral (google.com: 192.237.175.120 is neither permitted nor denied by best guess record for domain of xen-devel-bounces@lists.xen.org) smtp.mailfrom=xen-devel-bounces@lists.xen.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1d8SkT-0004qn-4A; Wed, 10 May 2017 14:37:53 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1d8SkR-0004qG-N3 for xen-devel@lists.xenproject.org; Wed, 10 May 2017 14:37:51 +0000 Received: from [193.109.254.147] by server-10.bemta-6.messagelabs.com id C4/E1-03613-FB523195; Wed, 10 May 2017 14:37:51 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrHIsWRWlGSWpSXmKPExsVyMfTAKt29qsK RBpefmll83zKZyYHR4/CHKywBjFGsmXlJ+RUJrBnLTuxnKui9wFix+fx+tgbGrysYuxi5OIQE ZjFKLN38hgnEYRGYxyzx7cArsIyEQD+rxPRZr9i6GDmBnDSJrT+3M0LYlRJ7JpwHs4UEtCSOn prNCjGqmUni4CWQBAcHm4CJxKwOCZAaEQEliXurJjOB2MwC3hIfjvxjB7GFBSIl1i56BjaHRU BVYnvnUrAaXqCapR1zWCB2yUncPNfJDGJzCvhILHr1kgVir7fEo89/WCYwCixgZFjFqFGcWlS WWqRrZKKXVJSZnlGSm5iZo2toYKaXm1pcnJiempOYVKyXnJ+7iREYXgxAsINx38fIQ4ySHExK ory6u4QihfiS8lMqMxKLM+KLSnNSiw8xynBwKEnwnlARjhQSLEpNT61Iy8wBBjpMWoKDR0mEt xkkzVtckJhbnJkOkTrFaMnx4vL790wc75Z+AJJPVv54zyTEkpeflyolzisN0iAA0pBRmgc3Dh aNlxhlpYR5GYEOFOIpSC3KzSxBlX/FKM7BqCTMGwkyhSczrwRu6yugg5iADgpkEAA5qCQRISX VwKjGtiGMx3zSoW6fW2dfHdjBZXypc+W8nqnhl0q855zZon9Ym+eUj/fHdVcMEk6Vr+TynvBq WX/FbhY1w1lL0hlFbjG1RK563xnV9jCjIln0wTFxt1k1BzSUDDkWPYrZIrUsfcaO4CmxNsaNm 99NjWj3tPq5+RXzS905h+3zU9jtk9apb1x/hEuJpTgj0VCLuag4EQBYL6IwwQIAAA== X-Env-Sender: bhupinder.thakur@linaro.org X-Msg-Ref: server-8.tower-27.messagelabs.com!1494427068!91082852!1 X-Originating-IP: [209.85.192.170] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.12; banners=-,-,- X-VirusChecked: Checked Received: (qmail 57052 invoked from network); 10 May 2017 14:37:49 -0000 Received: from mail-pf0-f170.google.com (HELO mail-pf0-f170.google.com) (209.85.192.170) by server-8.tower-27.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP; 10 May 2017 14:37:49 -0000 Received: by mail-pf0-f170.google.com with SMTP id e193so16900086pfh.0 for ; Wed, 10 May 2017 07:37:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=bxM0Bssas6tHj1St6JXCyFMy85TKHgrDqFdzjWmykqg=; b=ezYMVfls6KYFJTL0FkRqYlDj4fCJhubeRl6mICg0SRu5f1Fa1dKwwt9fSwU4QQWFyc ZnAc9brIhY6tTzE7yU/QhE0A5JF3FOI1TORCHgHkTMJxE/vHi6+/WSdkoPqlGnubngYE o9rluhs58Lz7S4qWfv5vtzQsDcxZbdqn0zYNU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=bxM0Bssas6tHj1St6JXCyFMy85TKHgrDqFdzjWmykqg=; b=d/xxcmx/d4lr7cq1wjVp4+iI7WX/3EDRIAFIk1nN+bjYdGLsosSSIPzda5yrO9kQmE pWzyp932DwKQm0OXrim5WVxwer0HUs/ztOnf6mm2KMEWPWAKW+uwJNsAsVirA+VOCa6S G1KOAIQrVlstubKdoX1HsqEgPGre/4NI89YwJd4aDvcAGUtHOMJjoEK7dBATvvdSDdQ8 Ya4GuHShOeZZ19yGfV9Xcgc+HdsApViEe4p6Eub+yS07tQQ0dwRpF24a8U+ccVsiF3ZO uryNBcVLU+fSTPLPL9EqltBcefEs5nHGDiBOUwmMoiOHPJAKi1J1io1DO0MWU3pE8tiH qiSQ== X-Gm-Message-State: AODbwcBs4/b4OfXgXp8Vl+DMIn8WLJDN99TgzkJOvVcdjKErvkJ9VtDD daHjC3Sr0aXSiRirMtvATw== X-Received: by 10.84.176.129 with SMTP id v1mr8655318plb.192.1494427067630; Wed, 10 May 2017 07:37:47 -0700 (PDT) Received: from blr-ubuntu-linaro.wlan.qualcomm.com ([61.0.91.57]) by smtp.gmail.com with ESMTPSA id r73sm6167781pfa.65.2017.05.10.07.37.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 10 May 2017 07:37:47 -0700 (PDT) From: Bhupinder Thakur To: xen-devel@lists.xenproject.org Date: Wed, 10 May 2017 20:05:14 +0530 Message-Id: <1494426918-32737-3-git-send-email-bhupinder.thakur@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1494426918-32737-1-git-send-email-bhupinder.thakur@linaro.org> References: <1494426918-32737-1-git-send-email-bhupinder.thakur@linaro.org> Cc: Wei Liu , Ian Jackson Subject: [Xen-devel] [PATCH 08/12 v3] xen/arm: vpl011: Modify xenconsole to support multiple consoles X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" Xenconsole supports only PV console currently. This patch adds support for supporting multiple consoles. This patch modifies different data structures and APIs used in xenconsole to support multiple consoles. Change summary: 1. Split the domain structure into a console structure and the domain structure, where each console structure represents one console. 2. Modify different APIs such as buffer_append() etc. to take console structure as input and perform per console specific operations. 3. Define a generic console_create_ring(), which sets up the ring buffer and event channel for each console. 3. Modify domain_create_ring() to use console_create_ring(). 4. Modifications in handle_ring_read() to read ring buffer data from multiple consoles. 5. Add log file support for multiple consoles. Signed-off-by: Bhupinder Thakur --- Changes since v2: - Defined a new function console_create_ring() which sets up the ring buffer and event channel a new console. domain_create_ring() uses this function to setup a console. - This patch does not contain vuart specific changes, which would be introduced in the next patch. - Changes for keeping the PV log file name unchanged. Changes since v1: - Split the domain struture to a separate console structure - Modified the functions to operate on the console struture - Replaced repetitive per console code with generic code tools/console/daemon/io.c | 650 ++++++++++++++++++++++++++++++++-------------- 1 file changed, 460 insertions(+), 190 deletions(-) diff --git a/tools/console/daemon/io.c b/tools/console/daemon/io.c index 7e6a886..9bb14de 100644 --- a/tools/console/daemon/io.c +++ b/tools/console/daemon/io.c @@ -89,29 +89,139 @@ struct buffer { size_t max_capacity; }; -struct domain { - int domid; +struct console { + char *xsname; + char *ttyname; int master_fd; int master_pollfd_idx; int slave_fd; int log_fd; - bool is_dead; - unsigned last_seen; struct buffer buffer; - struct domain *next; - char *conspath; int ring_ref; xenevtchn_port_or_error_t local_port; xenevtchn_port_or_error_t remote_port; + struct xencons_interface *interface; + struct domain *d; /* Reference to the domain it is contained in. */ + char *xspath; + int (*map_ring_ref)(struct console *, int); + bool mandatory; +}; + +struct console_data { + char *xsname; + char *ttyname; + int (*mapfunc)(struct console *, int); + bool mandatory; +}; + +static int map_pvcon_ring_ref(struct console *, int ); + +static struct console_data console_data[] = { + + { + .xsname = "/console", + .ttyname = "tty", + .mapfunc = map_pvcon_ring_ref, + .mandatory = true + }, +}; + +#define MAX_CONSOLE (sizeof(console_data)/sizeof(struct console_data)) + +struct domain { + int domid; + bool is_dead; + unsigned last_seen; + struct domain *next; xenevtchn_handle *xce_handle; int xce_pollfd_idx; - struct xencons_interface *interface; int event_count; long long next_period; + struct console console[MAX_CONSOLE]; }; static struct domain *dom_head; +typedef void (*VOID_ITER_FUNC_ARG1)(struct console *); +typedef bool (*BOOL_ITER_FUNC_ARG1)(struct console *); +typedef int (*INT_ITER_FUNC_ARG1)(struct console *); +typedef void (*VOID_ITER_FUNC_ARG2)(struct console *, unsigned int); +typedef int (*INT_ITER_FUNC_ARG3)(struct console *, + struct domain *dom, void **); + +static inline bool console_enabled(struct console *con) +{ + return con->local_port != -1; +} + +static inline void console_iter_void_arg1(struct domain *d, + VOID_ITER_FUNC_ARG1 iter_func) +{ + int i = 0; + struct console *con = &(d->console[0]); + + for (i = 0; i < MAX_CONSOLE; i++, con++) + { + iter_func(con); + } +} + +static inline void console_iter_void_arg2(struct domain *d, + VOID_ITER_FUNC_ARG2 iter_func, + unsigned int iter_data) +{ + int i = 0; + struct console *con = &(d->console[0]); + + for (i = 0; i < MAX_CONSOLE; i++, con++) + { + iter_func(con, iter_data); + } +} + +static inline bool console_iter_bool_arg1(struct domain *d, + BOOL_ITER_FUNC_ARG1 iter_func) +{ + int i = 0; + struct console *con = &(d->console[0]); + + for (i = 0; i < MAX_CONSOLE; i++, con++) + { + if (iter_func(con)) + return true; + } + return false; +} + +static inline int console_iter_int_arg1(struct domain *d, + INT_ITER_FUNC_ARG1 iter_func) +{ + int i = 0; + struct console *con = &(d->console[0]); + + for (i = 0; i < MAX_CONSOLE; i++, con++) + { + if (iter_func(con)) + return 1; + } + return 0; +} + +static inline int console_iter_int_arg3(struct domain *d, + INT_ITER_FUNC_ARG3 iter_func, + void *iter_data) +{ + int i = 0; + struct console *con = &(d->console[0]); + + for (i = 0; i < MAX_CONSOLE; i++, con++) + { + if (iter_func(con, d, iter_data)) + return 1; + } + return 0; +} + static int write_all(int fd, const char* buf, size_t len) { while (len) { @@ -158,11 +268,29 @@ static int write_with_timestamp(int fd, const char *data, size_t sz, return 0; } -static void buffer_append(struct domain *dom) +static inline bool buffer_available(struct console *con) { - struct buffer *buffer = &dom->buffer; + if (discard_overflowed_data || + !con->buffer.max_capacity || + con->buffer.size < con->buffer.max_capacity) + return true; + else + return false; +} + +static void buffer_append(struct console *con, unsigned int data) +{ + struct buffer *buffer = &con->buffer; + struct xencons_interface *intf = con->interface; + xenevtchn_port_or_error_t port = con->local_port; + struct domain *dom = con->d; + xenevtchn_port_or_error_t rxport = (xenevtchn_port_or_error_t)data; + XENCONS_RING_IDX cons, prod, size; - struct xencons_interface *intf = dom->interface; + + /* If incoming data is not for the current console then ignore. */ + if (port != rxport) + return; cons = intf->out_cons; prod = intf->out_prod; @@ -187,22 +315,22 @@ static void buffer_append(struct domain *dom) xen_mb(); intf->out_cons = cons; - xenevtchn_notify(dom->xce_handle, dom->local_port); + xenevtchn_notify(dom->xce_handle, port); /* Get the data to the logfile as early as possible because if * no one is listening on the console pty then it will fill up * and handle_tty_write will stop being called. */ - if (dom->log_fd != -1) { + if (con->log_fd != -1) { int logret; if (log_time_guest) { logret = write_with_timestamp( - dom->log_fd, + con->log_fd, buffer->data + buffer->size - size, size, &log_time_guest_needts); } else { logret = write_all( - dom->log_fd, + con->log_fd, buffer->data + buffer->size - size, size); } @@ -290,12 +418,13 @@ static int create_hv_log(void) return fd; } -static int create_domain_log(struct domain *dom) +static int create_console_log(struct console *con) { char logfile[PATH_MAX]; char *namepath, *data, *s; int fd; unsigned int len; + struct domain *dom = con->d; namepath = xs_get_domain_path(xs, dom->domid); s = realloc(namepath, strlen(namepath) + 6); @@ -314,7 +443,9 @@ static int create_domain_log(struct domain *dom) return -1; } - snprintf(logfile, PATH_MAX-1, "%s/guest-%s.log", log_dir, data); + snprintf(logfile, PATH_MAX-1, "%s%s/guest-%s.log", + log_dir, con->xspath, data); + free(data); logfile[PATH_MAX-1] = '\0'; @@ -336,19 +467,24 @@ static int create_domain_log(struct domain *dom) return fd; } -static void domain_close_tty(struct domain *dom) +static void console_close_tty(struct console *con) { - if (dom->master_fd != -1) { - close(dom->master_fd); - dom->master_fd = -1; + if (con->master_fd != -1) { + close(con->master_fd); + con->master_fd = -1; } - if (dom->slave_fd != -1) { - close(dom->slave_fd); - dom->slave_fd = -1; + if (con->slave_fd != -1) { + close(con->slave_fd); + con->slave_fd = -1; } } +static void domain_close_tty(struct domain *dom) +{ + console_iter_void_arg1(dom, console_close_tty); +} + #ifdef __sun__ static int openpty(int *amaster, int *aslave, char *name, struct termios *termp, struct winsize *winp) @@ -409,7 +545,7 @@ void cfmakeraw(struct termios *termios_p) } #endif /* __sun__ */ -static int domain_create_tty(struct domain *dom) +static int console_create_tty(struct console *con) { const char *slave; char *path; @@ -418,19 +554,23 @@ static int domain_create_tty(struct domain *dom) char *data; unsigned int len; struct termios term; + struct domain *dom = con->d; + + if (!console_enabled(con)) + return 0; - assert(dom->slave_fd == -1); - assert(dom->master_fd == -1); + assert(con->master_fd == -1); + assert(con->slave_fd == -1); - if (openpty(&dom->master_fd, &dom->slave_fd, NULL, NULL, NULL) < 0) { + if (openpty(&con->master_fd, &con->slave_fd, NULL, NULL, NULL) < 0) { err = errno; dolog(LOG_ERR, "Failed to create tty for domain-%d " - "(errno = %i, %s)", - dom->domid, err, strerror(err)); - return 0; + "(errno = %i, %s)", + dom->domid, err, strerror(err)); + goto out; } - if (tcgetattr(dom->slave_fd, &term) < 0) { + if (tcgetattr(con->slave_fd, &term) < 0) { err = errno; dolog(LOG_ERR, "Failed to get tty attributes for domain-%d " "(errno = %i, %s)", @@ -438,7 +578,7 @@ static int domain_create_tty(struct domain *dom) goto out; } cfmakeraw(&term); - if (tcsetattr(dom->slave_fd, TCSANOW, &term) < 0) { + if (tcsetattr(con->slave_fd, TCSANOW, &term) < 0) { err = errno; dolog(LOG_ERR, "Failed to set tty attributes for domain-%d " "(errno = %i, %s)", @@ -446,40 +586,54 @@ static int domain_create_tty(struct domain *dom) goto out; } - if ((slave = ptsname(dom->master_fd)) == NULL) { + if ((slave = ptsname(con->master_fd)) == NULL) { err = errno; dolog(LOG_ERR, "Failed to get slave name for domain-%d " - "(errno = %i, %s)", - dom->domid, err, strerror(err)); + "(errno = %i, %s)", + dom->domid, err, strerror(err)); goto out; } - success = asprintf(&path, "%s/limit", dom->conspath) != + success = asprintf(&path, "%s/limit", con->xspath) != -1; if (!success) goto out; data = xs_read(xs, XBT_NULL, path, &len); if (data) { - dom->buffer.max_capacity = strtoul(data, 0, 0); + con->buffer.max_capacity = strtoul(data, 0, 0); free(data); } free(path); - success = (asprintf(&path, "%s/tty", dom->conspath) != -1); + success = (asprintf(&path, "%s/%s", con->xspath, con->ttyname) != -1); + if (!success) goto out; success = xs_write(xs, XBT_NULL, path, slave, strlen(slave)); free(path); - if (!success) + + if (fcntl(con->master_fd, F_SETFL, O_NONBLOCK) == -1) goto out; - if (fcntl(dom->master_fd, F_SETFL, O_NONBLOCK) == -1) + if (!success) goto out; - return 1; -out: - domain_close_tty(dom); return 0; + +out: + return 1; +} + +static int domain_create_tty(struct domain *dom) +{ + int ret; + + ret = console_iter_int_arg1(dom, console_create_tty); + + if (ret) + domain_close_tty(dom); + + return ret; } /* Takes tuples of names, scanf-style args, and void **, NULL terminated. */ @@ -517,31 +671,106 @@ static int xs_gather(struct xs_handle *xs, const char *dir, ...) return ret; } -static void domain_unmap_interface(struct domain *dom) +static void console_unmap_interface(struct console *con) { - if (dom->interface == NULL) + if (con->interface == NULL) return; - if (xgt_handle && dom->ring_ref == -1) - xengnttab_unmap(xgt_handle, dom->interface, 1); + if (xgt_handle && con->ring_ref == -1) + xengnttab_unmap(xgt_handle, con->interface, 1); else - munmap(dom->interface, XC_PAGE_SIZE); - dom->interface = NULL; - dom->ring_ref = -1; + munmap(con->interface, XC_PAGE_SIZE); + con->interface = NULL; + con->ring_ref = -1; +} + +static void domain_unmap_interface(struct domain *dom) +{ + console_iter_void_arg1(dom, console_unmap_interface); +} + +static int bind_event_channel(struct domain *dom, + int new_rport, + int *lport, + int *rport) +{ + int err = 0, rc; + + /* Go no further if port has not changed and we are still bound. */ + if (new_rport == *rport) { + xc_evtchn_status_t status = { + .dom = DOMID_SELF, + .port = *lport }; + if ((xc_evtchn_status(xc, &status) == 0) && + (status.status == EVTCHNSTAT_interdomain)) + goto out; + } + + *lport = -1; + *rport = -1; + rc = xenevtchn_bind_interdomain(dom->xce_handle, + dom->domid, new_rport); + + if (rc == -1) { + err = errno; + goto out; + } + + *lport = rc; + *rport = new_rport; +out: + return err; } -static int domain_create_ring(struct domain *dom) +static int map_pvcon_ring_ref(struct console *con, int ring_ref) { - int err, remote_port, ring_ref, rc; + int err = 0; + struct domain *dom = con->d; + + if (!con->interface && xgt_handle) { + /* Prefer using grant table */ + con->interface = xengnttab_map_grant_ref(xgt_handle, + dom->domid, + GNTTAB_RESERVED_CONSOLE, + PROT_READ|PROT_WRITE); + con->ring_ref = -1; + } + + if (!con->interface) { + con->interface = xc_map_foreign_range(xc, + dom->domid, + XC_PAGE_SIZE, + PROT_READ|PROT_WRITE, + (unsigned long)ring_ref); + if (con->interface == NULL) { + err = EINVAL; + goto out; + } + con->ring_ref = ring_ref; + } + +out: + return err; +} + +static int console_create_ring(struct console *con) +{ + int err, remote_port, ring_ref; char *type, path[PATH_MAX]; + struct domain *dom = con->d; + + err = xs_gather(xs, con->xspath, + "ring-ref", "%u", &ring_ref, + "port", "%i", &remote_port, + NULL); - err = xs_gather(xs, dom->conspath, - "ring-ref", "%u", &ring_ref, - "port", "%i", &remote_port, - NULL); if (err) + { + /* If the console is not mandatory then do not return an error. */ + if (!con->mandatory) + err = 0; goto out; + } - snprintf(path, sizeof(path), "%s/type", dom->conspath); + snprintf(path, sizeof(path), "%s/type", con->xspath); type = xs_read(xs, XBT_NULL, path, NULL); if (type && strcmp(type, "xenconsoled") != 0) { free(type); @@ -550,41 +779,44 @@ static int domain_create_ring(struct domain *dom) free(type); /* If using ring_ref and it has changed, remap */ - if (ring_ref != dom->ring_ref && dom->ring_ref != -1) - domain_unmap_interface(dom); + if (ring_ref != con->ring_ref && con->ring_ref != -1) + console_unmap_interface(con); - if (!dom->interface && xgt_handle) { - /* Prefer using grant table */ - dom->interface = xengnttab_map_grant_ref(xgt_handle, - dom->domid, GNTTAB_RESERVED_CONSOLE, - PROT_READ|PROT_WRITE); - dom->ring_ref = -1; - } - if (!dom->interface) { - /* Fall back to xc_map_foreign_range */ - dom->interface = xc_map_foreign_range( - xc, dom->domid, XC_PAGE_SIZE, - PROT_READ|PROT_WRITE, - (unsigned long)ring_ref); - if (dom->interface == NULL) { - err = EINVAL; - goto out; + err = con->map_ring_ref(con, ring_ref); + + if (err) + goto out; + + err = bind_event_channel(dom, remote_port, + &con->local_port, + &con->remote_port); + if (err) + goto out1; + + if (con->master_fd == -1) { + if (console_create_tty(con)) { + err = errno; + con->local_port = -1; + con->remote_port = -1; + goto out1; } - dom->ring_ref = ring_ref; } - /* Go no further if port has not changed and we are still bound. */ - if (remote_port == dom->remote_port) { - xc_evtchn_status_t status = { - .dom = DOMID_SELF, - .port = dom->local_port }; - if ((xc_evtchn_status(xc, &status) == 0) && - (status.status == EVTCHNSTAT_interdomain)) - goto out; - } + if (log_guest && (con->log_fd == -1)) + con->log_fd = create_console_log(con); + + return err; + + out1: + console_unmap_interface(con); + out: + return err; +} + +static int domain_create_ring(struct domain *dom) +{ + int err; - dom->local_port = -1; - dom->remote_port = -1; if (dom->xce_handle != NULL) xenevtchn_close(dom->xce_handle); @@ -592,37 +824,17 @@ static int domain_create_ring(struct domain *dom) * wasteful, but that's how the code is structured... */ dom->xce_handle = xenevtchn_open(NULL, 0); if (dom->xce_handle == NULL) { - err = errno; - goto out; + return errno; } - - rc = xenevtchn_bind_interdomain(dom->xce_handle, - dom->domid, remote_port); - if (rc == -1) { - err = errno; + err = console_iter_int_arg1(dom, console_create_ring); + + if (err) + { xenevtchn_close(dom->xce_handle); dom->xce_handle = NULL; - goto out; - } - dom->local_port = rc; - dom->remote_port = remote_port; - - if (dom->master_fd == -1) { - if (!domain_create_tty(dom)) { - err = errno; - xenevtchn_close(dom->xce_handle); - dom->xce_handle = NULL; - dom->local_port = -1; - dom->remote_port = -1; - goto out; - } } - if (log_guest && (dom->log_fd == -1)) - dom->log_fd = create_domain_log(dom); - - out: return err; } @@ -630,27 +842,66 @@ static bool watch_domain(struct domain *dom, bool watch) { char domid_str[3 + MAX_STRLEN(dom->domid)]; bool success; + char *path = dom->console[0].xspath; snprintf(domid_str, sizeof(domid_str), "dom%u", dom->domid); if (watch) { - success = xs_watch(xs, dom->conspath, domid_str); + success = xs_watch(xs, path, domid_str); if (success) domain_create_ring(dom); else - xs_unwatch(xs, dom->conspath, domid_str); + xs_unwatch(xs, path, domid_str); } else { - success = xs_unwatch(xs, dom->conspath, domid_str); + success = xs_unwatch(xs, path, domid_str); } return success; } +static int console_init(struct console *con, struct domain *dom, void **data) +{ + char *s; + int err = -1; + struct console_data **con_data = (struct console_data **)data; + + con->master_fd = -1; + con->master_pollfd_idx = -1; + con->slave_fd = -1; + con->log_fd = -1; + con->ring_ref = -1; + con->local_port = -1; + con->remote_port = -1; + con->d = dom; + con->ttyname = (*con_data)->ttyname; + con->xsname = (*con_data)->xsname; + con->map_ring_ref = (*con_data)->mapfunc; + con->mandatory = (*con_data)->mandatory; + con->xspath = xs_get_domain_path(xs, dom->domid); + s = realloc(con->xspath, strlen(con->xspath) + + strlen(con->xsname) + 1); + + (*con_data)++; + + if (s) + { + con->xspath = s; + strcat(con->xspath, con->xsname); + err = 0; + } + return err; +} + +static void console_free(struct console *con) +{ + if (con->xspath) + free(con->xspath); +} static struct domain *create_domain(int domid) { struct domain *dom; - char *s; struct timespec ts; + struct console_data *con_data = &console_data[0]; if (clock_gettime(CLOCK_MONOTONIC, &ts) < 0) { dolog(LOG_ERR, "Cannot get time of day %s:%s:L%d", @@ -667,26 +918,13 @@ static struct domain *create_domain(int domid) dom->domid = domid; - dom->conspath = xs_get_domain_path(xs, dom->domid); - s = realloc(dom->conspath, strlen(dom->conspath) + - strlen("/console") + 1); - if (s == NULL) + if (console_iter_int_arg3(dom, console_init, (void **)&con_data)) goto out; - dom->conspath = s; - strcat(dom->conspath, "/console"); - dom->master_fd = -1; - dom->master_pollfd_idx = -1; - dom->slave_fd = -1; - dom->log_fd = -1; dom->xce_pollfd_idx = -1; dom->next_period = ((long long)ts.tv_sec * 1000) + (ts.tv_nsec / 1000000) + RATE_LIMIT_PERIOD; - dom->ring_ref = -1; - dom->local_port = -1; - dom->remote_port = -1; - if (!watch_domain(dom, true)) goto out; @@ -696,8 +934,10 @@ static struct domain *create_domain(int domid) dolog(LOG_DEBUG, "New domain %d", domid); return dom; + out: - free(dom->conspath); + console_iter_void_arg1(dom, console_free); + free(dom); return NULL; } @@ -727,20 +967,24 @@ static void remove_domain(struct domain *dom) } } -static void cleanup_domain(struct domain *d) -{ - domain_close_tty(d); - if (d->log_fd != -1) { - close(d->log_fd); - d->log_fd = -1; +static void console_cleanup(struct console *con) +{ + if (con->log_fd != -1) { + close(con->log_fd); + con->log_fd = -1; } + free(con->buffer.data); + con->buffer.data = NULL; + free(con->xspath); + con->xspath = NULL; +} - free(d->buffer.data); - d->buffer.data = NULL; +static void cleanup_domain(struct domain *d) +{ + domain_close_tty(d); - free(d->conspath); - d->conspath = NULL; + console_iter_void_arg1(d, console_cleanup); remove_domain(d); } @@ -780,9 +1024,9 @@ static void enum_domains(void) } } -static int ring_free_bytes(struct domain *dom) +static int ring_free_bytes(struct console *con) { - struct xencons_interface *intf = dom->interface; + struct xencons_interface *intf = con->interface; XENCONS_RING_IDX cons, prod, space; cons = intf->in_cons; @@ -807,25 +1051,27 @@ static void domain_handle_broken_tty(struct domain *dom, int recreate) } } -static void handle_tty_read(struct domain *dom) +static void handle_tty_read(struct console *con) { ssize_t len = 0; char msg[80]; int i; - struct xencons_interface *intf = dom->interface; XENCONS_RING_IDX prod; + struct xencons_interface *intf = con->interface; + xenevtchn_port_or_error_t port = con->local_port; + struct domain *dom = con->d; if (dom->is_dead) return; - len = ring_free_bytes(dom); + len = ring_free_bytes(con); if (len == 0) return; if (len > sizeof(msg)) len = sizeof(msg); - len = read(dom->master_fd, msg, len); + len = read(con->master_fd, msg, len); /* * Note: on Solaris, len == 0 means the slave closed, and this * is no problem, but Linux can't handle this usefully, so we @@ -841,31 +1087,39 @@ static void handle_tty_read(struct domain *dom) } xen_wmb(); intf->in_prod = prod; - xenevtchn_notify(dom->xce_handle, dom->local_port); + xenevtchn_notify(dom->xce_handle, port); } else { domain_close_tty(dom); shutdown_domain(dom); } } -static void handle_tty_write(struct domain *dom) +static void handle_tty_write(struct console *con) { ssize_t len; + struct domain *dom = con->d; if (dom->is_dead) return; - len = write(dom->master_fd, dom->buffer.data + dom->buffer.consumed, - dom->buffer.size - dom->buffer.consumed); + len = write(con->master_fd, + con->buffer.data + con->buffer.consumed, + con->buffer.size - con->buffer.consumed); if (len < 1) { dolog(LOG_DEBUG, "Write failed on domain %d: %zd, %d\n", dom->domid, len, errno); domain_handle_broken_tty(dom, domain_is_valid(dom->domid)); } else { - buffer_advance(&dom->buffer, len); + buffer_advance(&con->buffer, len); } } +static void console_event_unmask(struct console *con) +{ + if (con->local_port != -1) + (void)xenevtchn_unmask(con->d->xce_handle, con->local_port); +} + static void handle_ring_read(struct domain *dom) { xenevtchn_port_or_error_t port; @@ -878,10 +1132,10 @@ static void handle_ring_read(struct domain *dom) dom->event_count++; - buffer_append(dom); + console_iter_void_arg2(dom, buffer_append, port); if (dom->event_count < RATE_LIMIT_ALLOWANCE) - (void)xenevtchn_unmask(dom->xce_handle, port); + console_iter_void_arg1(dom, console_event_unmask); } static void handle_xs(void) @@ -943,14 +1197,22 @@ static void handle_hv_logs(xenevtchn_handle *xce_handle, bool force) (void)xenevtchn_unmask(xce_handle, port); } +static void console_open_log(struct console *con) +{ + if (console_enabled(con)) + { + if (con->log_fd != -1) + close(con->log_fd); + con->log_fd = create_console_log(con); + } +} + static void handle_log_reload(void) { if (log_guest) { struct domain *d; for (d = dom_head; d; d = d->next) { - if (d->log_fd != -1) - close(d->log_fd); - d->log_fd = create_domain_log(d); + console_iter_void_arg1(d, console_open_log); } } @@ -1002,6 +1264,40 @@ static void reset_fds(void) memset(fds, 0, sizeof(struct pollfd) * current_array_size); } +static void add_console_fd(struct console *con) +{ + if (con->master_fd != -1) { + short events = 0; + if (!con->d->is_dead && ring_free_bytes(con)) + events |= POLLIN; + + if (!buffer_empty(&con->buffer)) + events |= POLLOUT; + + if (events) + con->master_pollfd_idx = + set_fds(con->master_fd, events|POLLPRI); + } +} + +static void process_console(struct console *con) +{ + if (con->master_fd != -1 && con->master_pollfd_idx != -1) { + if (fds[con->master_pollfd_idx].revents & + ~(POLLIN|POLLOUT|POLLPRI)) + domain_handle_broken_tty(con->d, domain_is_valid(con->d->domid)); + else { + if (fds[con->master_pollfd_idx].revents & + POLLIN) + handle_tty_read(con); + if (fds[con->master_pollfd_idx].revents & + POLLOUT) + handle_tty_write(con); + } + } + con->master_pollfd_idx = -1; +} + void handle_io(void) { int ret; @@ -1068,7 +1364,7 @@ void handle_io(void) if ((now+5) > d->next_period) { d->next_period = now + RATE_LIMIT_PERIOD; if (d->event_count >= RATE_LIMIT_ALLOWANCE) { - (void)xenevtchn_unmask(d->xce_handle, d->local_port); + console_iter_void_arg1(d, console_event_unmask); } d->event_count = 0; } @@ -1081,28 +1377,15 @@ void handle_io(void) d->next_period < next_timeout) next_timeout = d->next_period; } else if (d->xce_handle != NULL) { - if (discard_overflowed_data || - !d->buffer.max_capacity || - d->buffer.size < d->buffer.max_capacity) { + if (console_iter_bool_arg1(d, buffer_available)) + { int evtchn_fd = xenevtchn_fd(d->xce_handle); d->xce_pollfd_idx = set_fds(evtchn_fd, - POLLIN|POLLPRI); + POLLIN|POLLPRI); } } - if (d->master_fd != -1) { - short events = 0; - if (!d->is_dead && ring_free_bytes(d)) - events |= POLLIN; - - if (!buffer_empty(&d->buffer)) - events |= POLLOUT; - - if (events) - d->master_pollfd_idx = - set_fds(d->master_fd, - events|POLLPRI); - } + console_iter_void_arg1(d, add_console_fd); } /* If any domain has been rate limited, we need to work @@ -1170,22 +1453,9 @@ void handle_io(void) handle_ring_read(d); } - if (d->master_fd != -1 && d->master_pollfd_idx != -1) { - if (fds[d->master_pollfd_idx].revents & - ~(POLLIN|POLLOUT|POLLPRI)) - domain_handle_broken_tty(d, - domain_is_valid(d->domid)); - else { - if (fds[d->master_pollfd_idx].revents & - POLLIN) - handle_tty_read(d); - if (fds[d->master_pollfd_idx].revents & - POLLOUT) - handle_tty_write(d); - } - } + console_iter_void_arg1(d, process_console); - d->xce_pollfd_idx = d->master_pollfd_idx = -1; + d->xce_pollfd_idx = -1; if (d->last_seen != enum_pass) shutdown_domain(d);