From: David Woodhouse <dwmw2@infradead.org>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>, Paul Durrant <paul@xen.org>,
Joao Martins <joao.m.martins@oracle.com>,
Ankur Arora <ankur.a.arora@oracle.com>,
Stefano Stabellini <sstabellini@kernel.org>,
vikram.garhwal@amd.com,
Anthony Perard <anthony.perard@citrix.com>,
xen-devel@lists.xenproject.org,
Juan Quintela <quintela@redhat.com>,
"Dr . David Alan Gilbert" <dgilbert@redhat.com>,
Peter Maydell <peter.maydell@linaro.org>
Subject: [PATCH v2 08/27] hw/xen: Create initial XenStore nodes
Date: Tue, 7 Mar 2023 17:17:31 +0000 [thread overview]
Message-ID: <20230307171750.2293175-9-dwmw2@infradead.org> (raw)
In-Reply-To: <20230307171750.2293175-1-dwmw2@infradead.org>
From: Paul Durrant <pdurrant@amazon.com>
Signed-off-by: Paul Durrant <pdurrant@amazon.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
hw/i386/kvm/xen_xenstore.c | 70 ++++++++++++++++++++++++++++++++++++++
1 file changed, 70 insertions(+)
diff --git a/hw/i386/kvm/xen_xenstore.c b/hw/i386/kvm/xen_xenstore.c
index 520422b147..fb3648a058 100644
--- a/hw/i386/kvm/xen_xenstore.c
+++ b/hw/i386/kvm/xen_xenstore.c
@@ -76,9 +76,39 @@ struct XenXenstoreState *xen_xenstore_singleton;
static void xen_xenstore_event(void *opaque);
static void fire_watch_cb(void *opaque, const char *path, const char *token);
+static void G_GNUC_PRINTF (4, 5) relpath_printf(XenXenstoreState *s,
+ GList *perms,
+ const char *relpath,
+ const char *fmt, ...)
+{
+ gchar *abspath;
+ gchar *value;
+ va_list args;
+ GByteArray *data;
+ int err;
+
+ abspath = g_strdup_printf("/local/domain/%u/%s", xen_domid, relpath);
+ va_start(args, fmt);
+ value = g_strdup_vprintf(fmt, args);
+ va_end(args);
+
+ data = g_byte_array_new_take((void *)value, strlen(value));
+
+ err = xs_impl_write(s->impl, DOMID_QEMU, XBT_NULL, abspath, data);
+ assert(!err);
+
+ g_byte_array_unref(data);
+
+ err = xs_impl_set_perms(s->impl, DOMID_QEMU, XBT_NULL, abspath, perms);
+ assert(!err);
+
+ g_free(abspath);
+}
+
static void xen_xenstore_realize(DeviceState *dev, Error **errp)
{
XenXenstoreState *s = XEN_XENSTORE(dev);
+ GList *perms;
if (xen_mode != XEN_EMULATE) {
error_setg(errp, "Xen xenstore support is for Xen emulation");
@@ -102,6 +132,46 @@ static void xen_xenstore_realize(DeviceState *dev, Error **errp)
xen_xenstore_event, NULL, NULL, NULL, s);
s->impl = xs_impl_create(xen_domid);
+
+ /* Populate the default nodes */
+
+ /* Nodes owned by 'dom0' but readable by the guest */
+ perms = g_list_append(NULL, xs_perm_as_string(XS_PERM_NONE, DOMID_QEMU));
+ perms = g_list_append(perms, xs_perm_as_string(XS_PERM_READ, xen_domid));
+
+ relpath_printf(s, perms, "", "%s", "");
+
+ relpath_printf(s, perms, "domid", "%u", xen_domid);
+
+ relpath_printf(s, perms, "control/platform-feature-xs_reset_watches", "%u", 1);
+ relpath_printf(s, perms, "control/platform-feature-multiprocessor-suspend", "%u", 1);
+
+ relpath_printf(s, perms, "platform/acpi", "%u", 1);
+ relpath_printf(s, perms, "platform/acpi_s3", "%u", 1);
+ relpath_printf(s, perms, "platform/acpi_s4", "%u", 1);
+ relpath_printf(s, perms, "platform/acpi_laptop_slate", "%u", 0);
+
+ g_list_free_full(perms, g_free);
+
+ /* Nodes owned by the guest */
+ perms = g_list_append(NULL, xs_perm_as_string(XS_PERM_NONE, xen_domid));
+
+ relpath_printf(s, perms, "attr", "%s", "");
+
+ relpath_printf(s, perms, "control/shutdown", "%s", "");
+ relpath_printf(s, perms, "control/feature-poweroff", "%u", 1);
+ relpath_printf(s, perms, "control/feature-reboot", "%u", 1);
+ relpath_printf(s, perms, "control/feature-suspend", "%u", 1);
+ relpath_printf(s, perms, "control/feature-s3", "%u", 1);
+ relpath_printf(s, perms, "control/feature-s4", "%u", 1);
+
+ relpath_printf(s, perms, "data", "%s", "");
+ relpath_printf(s, perms, "device", "%s", "");
+ relpath_printf(s, perms, "drivers", "%s", "");
+ relpath_printf(s, perms, "error", "%s", "");
+ relpath_printf(s, perms, "feature", "%s", "");
+
+ g_list_free_full(perms, g_free);
}
static bool xen_xenstore_is_needed(void *opaque)
--
2.39.0
next prev parent reply other threads:[~2023-03-07 17:18 UTC|newest]
Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-03-07 17:17 [PATCH v2 00/27] Enable PV backends with Xen/KVM emulation David Woodhouse
2023-03-07 17:17 ` [PATCH v2 01/27] hw/xen: Add xenstore wire implementation and implementation stubs David Woodhouse
2023-03-07 17:17 ` [PATCH v2 02/27] hw/xen: Add basic XenStore tree walk and write/read/directory support David Woodhouse
2023-03-07 17:17 ` [PATCH v2 03/27] hw/xen: Implement XenStore watches David Woodhouse
2023-03-07 17:17 ` [PATCH v2 04/27] hw/xen: Implement XenStore transactions David Woodhouse
2023-03-07 17:17 ` [PATCH v2 05/27] hw/xen: Watches on " David Woodhouse
2023-03-07 17:17 ` [PATCH v2 06/27] hw/xen: Implement XenStore permissions David Woodhouse
2023-03-07 17:17 ` [PATCH v2 07/27] hw/xen: Implement core serialize/deserialize methods for xenstore_impl David Woodhouse
2023-03-07 17:17 ` David Woodhouse [this message]
2023-03-07 17:17 ` [PATCH v2 09/27] hw/xen: Add evtchn operations to allow redirection to internal emulation David Woodhouse
2023-03-23 10:29 ` Anthony PERARD via
2023-03-23 10:42 ` David Woodhouse
2023-03-23 10:57 ` [PATCH] hw/xenpv: Initialize Xen backend operations David Woodhouse
2023-03-23 13:26 ` Paul Durrant
2023-03-24 14:51 ` Anthony PERARD via
2023-03-07 17:17 ` [PATCH v2 10/27] hw/xen: Add gnttab operations to allow redirection to internal emulation David Woodhouse
2023-03-07 17:17 ` [PATCH v2 11/27] hw/xen: Pass grant ref to gnttab unmap operation David Woodhouse
2023-03-07 17:17 ` [PATCH v2 12/27] hw/xen: Add foreignmem operations to allow redirection to internal emulation David Woodhouse
2023-03-07 17:17 ` [PATCH v2 13/27] hw/xen: Add xenstore " David Woodhouse
2023-03-07 17:17 ` [PATCH v2 14/27] hw/xen: Move xenstore_store_pv_console_info to xen_console.c David Woodhouse
2023-03-07 17:17 ` [PATCH v2 15/27] hw/xen: Use XEN_PAGE_SIZE in PV backend drivers David Woodhouse
2023-03-07 17:17 ` [PATCH v2 16/27] hw/xen: Rename xen_common.h to xen_native.h David Woodhouse
2023-03-07 17:17 ` [PATCH v2 17/27] hw/xen: Build PV backend drivers for CONFIG_XEN_BUS David Woodhouse
2023-03-07 17:17 ` [PATCH v2 18/27] hw/xen: Avoid crash when backend watch fires too early David Woodhouse
2023-03-07 17:17 ` [PATCH v2 19/27] hw/xen: Only advertise ring-page-order for xen-block if gnttab supports it David Woodhouse
2023-03-07 17:17 ` [PATCH v2 20/27] hw/xen: Hook up emulated implementation for event channel operations David Woodhouse
2023-03-07 17:17 ` [PATCH v2 21/27] hw/xen: Add emulated implementation of grant table operations David Woodhouse
2023-03-07 17:17 ` [PATCH v2 22/27] hw/xen: Add emulated implementation of XenStore operations David Woodhouse
2023-03-07 17:17 ` [PATCH v2 23/27] hw/xen: Map guest XENSTORE_PFN grant in emulated Xenstore David Woodhouse
2023-03-07 17:17 ` [PATCH v2 24/27] hw/xen: Implement soft reset for emulated gnttab David Woodhouse
2023-03-07 17:17 ` [PATCH v2 25/27] i386/xen: Initialize Xen backends from pc_basic_device_init() for emulation David Woodhouse
2023-03-07 17:56 ` Paul Durrant
2023-03-07 17:17 ` [PATCH v2 26/27] MAINTAINERS: Add entry for Xen on KVM emulation David Woodhouse
2023-03-07 17:17 ` [PATCH v2 27/27] docs: Update Xen-on-KVM documentation for PV disk support David Woodhouse
2023-03-07 17:57 ` [PATCH v2 00/27] Enable PV backends with Xen/KVM emulation Paul Durrant
2023-03-07 18:27 ` David Woodhouse
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230307171750.2293175-9-dwmw2@infradead.org \
--to=dwmw2@infradead.org \
--cc=ankur.a.arora@oracle.com \
--cc=anthony.perard@citrix.com \
--cc=dgilbert@redhat.com \
--cc=joao.m.martins@oracle.com \
--cc=paul@xen.org \
--cc=pbonzini@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=quintela@redhat.com \
--cc=sstabellini@kernel.org \
--cc=vikram.garhwal@amd.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).