From nobody Sat Apr 20 02:17:57 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 149336372682961.54432866077627; Fri, 28 Apr 2017 00:15:26 -0700 (PDT) Received: from localhost ([::1]:35539 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1d407h-00005P-Ia for importer@patchew.org; Fri, 28 Apr 2017 03:15:25 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:50044) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1d406v-0008Bc-5u for qemu-devel@nongnu.org; Fri, 28 Apr 2017 03:14:38 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1d406q-0003Ps-LW for qemu-devel@nongnu.org; Fri, 28 Apr 2017 03:14:37 -0400 Received: from mga14.intel.com ([192.55.52.115]:10608) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1d406q-0003Pe-CY for qemu-devel@nongnu.org; Fri, 28 Apr 2017 03:14:32 -0400 Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Apr 2017 00:14:30 -0700 Received: from unknown (HELO dpdk5.bj.intel.com) ([172.16.182.182]) by fmsmga004.fm.intel.com with ESMTP; 28 Apr 2017 00:14:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.37,387,1488873600"; d="scan'208";a="254508171" From: Zhiyong Yang To: qemu-devel@nongnu.org Date: Fri, 28 Apr 2017 15:09:32 +0800 Message-Id: <1493363372-16861-1-git-send-email-zhiyong.yang@intel.com> X-Mailer: git-send-email 2.7.4 X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 192.55.52.115 Subject: [Qemu-devel] [PATCH] hw/virtio: fix vhost user fails to startup when MQ X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Zhiyong Yang , mst@redhat.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Qemu2.7~2.9 and vhost user for dpdk 17.02 release work together to cause failures of new connection when negotiating to set MQ. (one queue pair works well). Because there exist some bugs in qemu code when introducing VHOST_USER_PROTOCOL_F_REPLY_ACK to qemu. When vhost_user_set_mem_table is invoked to deal with the vhost message VHOST_USER_SET_MEM_TABLE for the second time, qemu indeed doesn't send the messge (The message needs to be sent only once)but still will be waiting for dpdk's reply ack, then, qemu is always freezing, while DPDK is always waiting for next vhost message from qemu. The patch aims to fix the bug, MQ can work well. The same bug is found in function vhost_user_net_set_mtu, it is fixed at the same time. DPDK related patch is as following: http://www.dpdk.org/dev/patchwork/patch/23955/ Signed-off-by: Zhiyong Yang --- hw/virtio/vhost-user.c | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/hw/virtio/vhost-user.c b/hw/virtio/vhost-user.c index 9334a8a..c2c54ce 100644 --- a/hw/virtio/vhost-user.c +++ b/hw/virtio/vhost-user.c @@ -205,10 +205,11 @@ static int vhost_user_write(struct vhost_dev *dev, Vh= ostUserMsg *msg, /* * For non-vring specific requests, like VHOST_USER_SET_MEM_TABLE, * we just need send it once in the first time. For later such - * request, we just ignore it. + * request, we just ignore it. In this case, return value is 1 which is + * different from 0 that stands for message written successfully. */ if (vhost_user_one_time_request(msg->request) && dev->vq_index !=3D 0)= { - return 0; + return 1; } =20 if (qemu_chr_fe_set_msgfds(chr, fds, fd_num) < 0) { @@ -270,7 +271,7 @@ static int vhost_user_set_mem_table(struct vhost_dev *d= ev, struct vhost_memory *mem) { int fds[VHOST_MEMORY_MAX_NREGIONS]; - int i, fd; + int i, fd, ret; size_t fd_num =3D 0; bool reply_supported =3D virtio_has_feature(dev->protocol_features, VHOST_USER_PROTOCOL_F_REPLY_= ACK); @@ -315,11 +316,12 @@ static int vhost_user_set_mem_table(struct vhost_dev = *dev, msg.size +=3D sizeof(msg.payload.memory.padding); msg.size +=3D fd_num * sizeof(VhostUserMemoryRegion); =20 - if (vhost_user_write(dev, &msg, fds, fd_num) < 0) { + ret =3D vhost_user_write(dev, &msg, fds, fd_num); + if (ret < 0) { return -1; } =20 - if (reply_supported) { + if (reply_supported && (ret =3D=3D 0)) { return process_message_reply(dev, msg.request); } =20 @@ -691,6 +693,7 @@ static bool vhost_user_can_merge(struct vhost_dev *dev, static int vhost_user_net_set_mtu(struct vhost_dev *dev, uint16_t mtu) { VhostUserMsg msg; + int ret; bool reply_supported =3D virtio_has_feature(dev->protocol_features, VHOST_USER_PROTOCOL_F_REPLY_= ACK); =20 @@ -706,12 +709,13 @@ static int vhost_user_net_set_mtu(struct vhost_dev *d= ev, uint16_t mtu) msg.flags |=3D VHOST_USER_NEED_REPLY_MASK; } =20 - if (vhost_user_write(dev, &msg, NULL, 0) < 0) { + ret =3D vhost_user_write(dev, &msg, NULL, 0); + if (ret < 0) { return -1; } =20 /* If reply_ack supported, slave has to ack specified MTU is valid */ - if (reply_supported) { + if (reply_supported && (ret =3D=3D 0)) { return process_message_reply(dev, msg.request); } =20 --=20 2.7.4