diff mbox

[v3,2/3] xen: write information about supported backends

Message ID 1462527766-26462-3-git-send-email-jgross@suse.com (mailing list archive)
State New, archived
Headers show

Commit Message

Jürgen Groß May 6, 2016, 9:42 a.m. UTC
Add a Xenstore directory for each supported pv backend. This will allow
Xen tools to decide which backend type to use in case there are
multiple possibilities.

The information is added under
/local/domain/<backend-domid>/device-model/<domid>/backends
before the "running" state is written to Xenstore. Using a directory
for each backend enables us to add parameters for specific backends
in the future.

This interface is documented in the Xen source repository in the file
docs/misc/qemu-backends.txt

In order to reuse the Xenstore directory creation already present in
hw/xen/xen_devconfig.c move the related functions to
hw/xen/xen_backend.c where they fit better.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V3: Added .backend_register function to XenDevOps in order to have a
    way to let the backend decide whether all prerequisites are met
    for support.

V2: update commit message as requested by Stefano
---
 hw/xen/xen_backend.c         | 60 ++++++++++++++++++++++++++++++++++++++++++++
 hw/xen/xen_devconfig.c       | 52 ++------------------------------------
 include/hw/xen/xen_backend.h |  2 ++
 3 files changed, 64 insertions(+), 50 deletions(-)

Comments

Anthony PERARD May 10, 2016, 4:21 p.m. UTC | #1
On Fri, May 06, 2016 at 11:42:45AM +0200, Juergen Gross wrote:
> Add a Xenstore directory for each supported pv backend. This will allow
> Xen tools to decide which backend type to use in case there are
> multiple possibilities.
> 
> The information is added under
> /local/domain/<backend-domid>/device-model/<domid>/backends
> before the "running" state is written to Xenstore. Using a directory
> for each backend enables us to add parameters for specific backends
> in the future.
> 
> This interface is documented in the Xen source repository in the file
> docs/misc/qemu-backends.txt
> 
> In order to reuse the Xenstore directory creation already present in
> hw/xen/xen_devconfig.c move the related functions to
> hw/xen/xen_backend.c where they fit better.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> ---
> V3: Added .backend_register function to XenDevOps in order to have a
>     way to let the backend decide whether all prerequisites are met
>     for support.
> 
> V2: update commit message as requested by Stefano
> ---
>  hw/xen/xen_backend.c         | 60 ++++++++++++++++++++++++++++++++++++++++++++
>  hw/xen/xen_devconfig.c       | 52 ++------------------------------------
>  include/hw/xen/xen_backend.h |  2 ++
>  3 files changed, 64 insertions(+), 50 deletions(-)
> 
> diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
> index 60575ad..6d8b3a5 100644
> --- a/hw/xen/xen_backend.c
> +++ b/hw/xen/xen_backend.c
> @@ -42,11 +42,35 @@ struct xs_handle *xenstore = NULL;
>  const char *xen_protocol;
>  
>  /* private */
> +struct xs_dirs {
> +    char *xs_dir;
> +    QTAILQ_ENTRY(xs_dirs) list;
> +};
> +static QTAILQ_HEAD(xs_dirs_head, xs_dirs) xs_cleanup = QTAILQ_HEAD_INITIALIZER(xs_cleanup);
> +
>  static QTAILQ_HEAD(XenDeviceHead, XenDevice) xendevs = QTAILQ_HEAD_INITIALIZER(xendevs);
>  static int debug = 0;
>  
>  /* ------------------------------------------------------------- */
>  
> +static void xenstore_cleanup_dir(char *dir)
> +{
> +    struct xs_dirs *d;
> +
> +    d = g_malloc(sizeof(*d));
> +    d->xs_dir = dir;
> +    QTAILQ_INSERT_TAIL(&xs_cleanup, d, list);
> +}
> +
> +void xen_config_cleanup(void)
> +{
> +    struct xs_dirs *d;
> +
> +    QTAILQ_FOREACH(d, &xs_cleanup, list) {
> +        xs_rm(xenstore, 0, d->xs_dir);
> +    }
> +}
> +
>  int xenstore_write_str(const char *base, const char *node, const char *val)
>  {
>      char abspath[XEN_BUFSIZE];
> @@ -75,6 +99,28 @@ char *xenstore_read_str(const char *base, const char *node)
>      return ret;
>  }
>  
> +int xenstore_mkdir(char *path, int p)
> +{
> +    struct xs_permissions perms[2] = {{
> +            .id    = 0, /* set owner: dom0 */
> +        },{
> +            .id    = xen_domid,
> +            .perms = p,
> +        }};
> +
> +    if (!xs_mkdir(xenstore, 0, path)) {
> +        xen_be_printf(NULL, 0, "xs_mkdir %s: failed\n", path);
> +        return -1;
> +    }
> +    xenstore_cleanup_dir(g_strdup(path));
> +
> +    if (!xs_set_permissions(xenstore, 0, path, perms, 2)) {
> +        xen_be_printf(NULL, 0, "xs_set_permissions %s: failed\n", path);
> +        return -1;
> +    }
> +    return 0;
> +}
> +
>  int xenstore_write_int(const char *base, const char *node, int ival)
>  {
>      char val[12];
> @@ -726,6 +772,20 @@ err:
>  
>  int xen_be_register(const char *type, struct XenDevOps *ops)
>  {
> +    char path[50];
> +    int rc;
> +
> +    if (ops->backend_register) {
> +        rc = ops->backend_register();
> +        if (rc) {
> +            return rc;
> +        }
> +    }
> +
> +    snprintf(path, sizeof (path), "device-model/%u/backends/%s", xen_domid,
> +             type);
> +    xenstore_mkdir(path, XS_PERM_READ);

Do you actually need the guest to be able to read those paths?

> +
>      return xenstore_scan(type, xen_domid, ops);
>  }
>  
> diff --git a/hw/xen/xen_devconfig.c b/hw/xen/xen_devconfig.c
> index 1f30fe4..b7d290d 100644
> --- a/hw/xen/xen_devconfig.c
> +++ b/hw/xen/xen_devconfig.c
> @@ -5,54 +5,6 @@
>  
>  /* ------------------------------------------------------------- */
>  
> -struct xs_dirs {
> -    char *xs_dir;
> -    QTAILQ_ENTRY(xs_dirs) list;
> -};
> -static QTAILQ_HEAD(xs_dirs_head, xs_dirs) xs_cleanup = QTAILQ_HEAD_INITIALIZER(xs_cleanup);
> -
> -static void xen_config_cleanup_dir(char *dir)
> -{
> -    struct xs_dirs *d;
> -
> -    d = g_malloc(sizeof(*d));
> -    d->xs_dir = dir;
> -    QTAILQ_INSERT_TAIL(&xs_cleanup, d, list);
> -}
> -
> -void xen_config_cleanup(void)
> -{
> -    struct xs_dirs *d;
> -
> -    QTAILQ_FOREACH(d, &xs_cleanup, list) {
> -	xs_rm(xenstore, 0, d->xs_dir);
> -    }
> -}
> -
> -/* ------------------------------------------------------------- */
> -
> -static int xen_config_dev_mkdir(char *dev, int p)
> -{
> -    struct xs_permissions perms[2] = {{
> -            .id    = 0, /* set owner: dom0 */
> -        },{
> -            .id    = xen_domid,
> -            .perms = p,
> -        }};
> -

The function looks like it as been tailored to mkdir for config of
backends. So it does not seems out of place.

> -    if (!xs_mkdir(xenstore, 0, dev)) {
> -	xen_be_printf(NULL, 0, "xs_mkdir %s: failed\n", dev);
> -	return -1;
> -    }
> -    xen_config_cleanup_dir(g_strdup(dev));
> -
> -    if (!xs_set_permissions(xenstore, 0, dev, perms, 2)) {
> -	xen_be_printf(NULL, 0, "xs_set_permissions %s: failed\n", dev);
> -	return -1;
> -    }
> -    return 0;
> -}
> -
>  static int xen_config_dev_dirs(const char *ftype, const char *btype, int vdev,
>  			       char *fe, char *be, int len)
>  {
> @@ -66,8 +18,8 @@ static int xen_config_dev_dirs(const char *ftype, const char *btype, int vdev,
>      snprintf(be, len, "%s/backend/%s/%d/%d", dom, btype, xen_domid, vdev);
>      free(dom);
>  
> -    xen_config_dev_mkdir(fe, XS_PERM_READ | XS_PERM_WRITE);
> -    xen_config_dev_mkdir(be, XS_PERM_READ);
> +    xenstore_mkdir(fe, XS_PERM_READ | XS_PERM_WRITE);
> +    xenstore_mkdir(be, XS_PERM_READ);
>      return 0;
>  }
>  
> diff --git a/include/hw/xen/xen_backend.h b/include/hw/xen/xen_backend.h
> index b4b4ff0..63364f7 100644
> --- a/include/hw/xen/xen_backend.h
> +++ b/include/hw/xen/xen_backend.h
> @@ -28,6 +28,7 @@ struct XenDevOps {
>      int       (*free)(struct XenDevice *xendev);
>      void      (*backend_changed)(struct XenDevice *xendev, const char *node);
>      void      (*frontend_changed)(struct XenDevice *xendev, const char *node);
> +    int       (*backend_register)(void);
>  };
>  
>  struct XenDevice {
> @@ -63,6 +64,7 @@ extern const char *xen_protocol;
>  extern DeviceState *xen_sysdev;
>  
>  /* xenstore helper functions */
> +int xenstore_mkdir(char *path, int p);
>  int xenstore_write_str(const char *base, const char *node, const char *val);
>  int xenstore_write_int(const char *base, const char *node, int ival);
>  int xenstore_write_int64(const char *base, const char *node, int64_t ival);
> -- 
> 2.6.6
>
Jürgen Groß May 11, 2016, 8:36 a.m. UTC | #2
On 10/05/16 18:21, Anthony PERARD wrote:
> On Fri, May 06, 2016 at 11:42:45AM +0200, Juergen Gross wrote:
>> Add a Xenstore directory for each supported pv backend. This will allow
>> Xen tools to decide which backend type to use in case there are
>> multiple possibilities.
>>
>> The information is added under
>> /local/domain/<backend-domid>/device-model/<domid>/backends
>> before the "running" state is written to Xenstore. Using a directory
>> for each backend enables us to add parameters for specific backends
>> in the future.
>>
>> This interface is documented in the Xen source repository in the file
>> docs/misc/qemu-backends.txt
>>
>> In order to reuse the Xenstore directory creation already present in
>> hw/xen/xen_devconfig.c move the related functions to
>> hw/xen/xen_backend.c where they fit better.
>>
>> Signed-off-by: Juergen Gross <jgross@suse.com>
>> ---
>> V3: Added .backend_register function to XenDevOps in order to have a
>>     way to let the backend decide whether all prerequisites are met
>>     for support.
>>
>> V2: update commit message as requested by Stefano
>> ---
>>  hw/xen/xen_backend.c         | 60 ++++++++++++++++++++++++++++++++++++++++++++
>>  hw/xen/xen_devconfig.c       | 52 ++------------------------------------
>>  include/hw/xen/xen_backend.h |  2 ++
>>  3 files changed, 64 insertions(+), 50 deletions(-)
>>
>> diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
>> index 60575ad..6d8b3a5 100644
>> --- a/hw/xen/xen_backend.c
>> +++ b/hw/xen/xen_backend.c
>> @@ -726,6 +772,20 @@ err:
>>  
>>  int xen_be_register(const char *type, struct XenDevOps *ops)
>>  {
>> +    char path[50];
>> +    int rc;
>> +
>> +    if (ops->backend_register) {
>> +        rc = ops->backend_register();
>> +        if (rc) {
>> +            return rc;
>> +        }
>> +    }
>> +
>> +    snprintf(path, sizeof (path), "device-model/%u/backends/%s", xen_domid,
>> +             type);
>> +    xenstore_mkdir(path, XS_PERM_READ);
> 
> Do you actually need the guest to be able to read those paths?

No, you are right.

>> diff --git a/hw/xen/xen_devconfig.c b/hw/xen/xen_devconfig.c
>> index 1f30fe4..b7d290d 100644
>> --- a/hw/xen/xen_devconfig.c
>> +++ b/hw/xen/xen_devconfig.c
>> @@ -5,54 +5,6 @@
>>  
>>  /* ------------------------------------------------------------- */
>>  
>> -struct xs_dirs {
>> -    char *xs_dir;
>> -    QTAILQ_ENTRY(xs_dirs) list;
>> -};
>> -static QTAILQ_HEAD(xs_dirs_head, xs_dirs) xs_cleanup = QTAILQ_HEAD_INITIALIZER(xs_cleanup);
>> -
>> -static void xen_config_cleanup_dir(char *dir)
>> -{
>> -    struct xs_dirs *d;
>> -
>> -    d = g_malloc(sizeof(*d));
>> -    d->xs_dir = dir;
>> -    QTAILQ_INSERT_TAIL(&xs_cleanup, d, list);
>> -}
>> -
>> -void xen_config_cleanup(void)
>> -{
>> -    struct xs_dirs *d;
>> -
>> -    QTAILQ_FOREACH(d, &xs_cleanup, list) {
>> -	xs_rm(xenstore, 0, d->xs_dir);
>> -    }
>> -}
>> -
>> -/* ------------------------------------------------------------- */
>> -
>> -static int xen_config_dev_mkdir(char *dev, int p)
>> -{
>> -    struct xs_permissions perms[2] = {{
>> -            .id    = 0, /* set owner: dom0 */
>> -        },{
>> -            .id    = xen_domid,
>> -            .perms = p,
>> -        }};
>> -
> 
> The function looks like it as been tailored to mkdir for config of
> backends. So it does not seems out of place.

It has been tailored for config of _devices_ by the backend.

I still think it would fit better now into xen_backend.c, OTOH in case
you like it better in xen_devconfig.c I won't argue against it.


Juergen
diff mbox

Patch

diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
index 60575ad..6d8b3a5 100644
--- a/hw/xen/xen_backend.c
+++ b/hw/xen/xen_backend.c
@@ -42,11 +42,35 @@  struct xs_handle *xenstore = NULL;
 const char *xen_protocol;
 
 /* private */
+struct xs_dirs {
+    char *xs_dir;
+    QTAILQ_ENTRY(xs_dirs) list;
+};
+static QTAILQ_HEAD(xs_dirs_head, xs_dirs) xs_cleanup = QTAILQ_HEAD_INITIALIZER(xs_cleanup);
+
 static QTAILQ_HEAD(XenDeviceHead, XenDevice) xendevs = QTAILQ_HEAD_INITIALIZER(xendevs);
 static int debug = 0;
 
 /* ------------------------------------------------------------- */
 
+static void xenstore_cleanup_dir(char *dir)
+{
+    struct xs_dirs *d;
+
+    d = g_malloc(sizeof(*d));
+    d->xs_dir = dir;
+    QTAILQ_INSERT_TAIL(&xs_cleanup, d, list);
+}
+
+void xen_config_cleanup(void)
+{
+    struct xs_dirs *d;
+
+    QTAILQ_FOREACH(d, &xs_cleanup, list) {
+        xs_rm(xenstore, 0, d->xs_dir);
+    }
+}
+
 int xenstore_write_str(const char *base, const char *node, const char *val)
 {
     char abspath[XEN_BUFSIZE];
@@ -75,6 +99,28 @@  char *xenstore_read_str(const char *base, const char *node)
     return ret;
 }
 
+int xenstore_mkdir(char *path, int p)
+{
+    struct xs_permissions perms[2] = {{
+            .id    = 0, /* set owner: dom0 */
+        },{
+            .id    = xen_domid,
+            .perms = p,
+        }};
+
+    if (!xs_mkdir(xenstore, 0, path)) {
+        xen_be_printf(NULL, 0, "xs_mkdir %s: failed\n", path);
+        return -1;
+    }
+    xenstore_cleanup_dir(g_strdup(path));
+
+    if (!xs_set_permissions(xenstore, 0, path, perms, 2)) {
+        xen_be_printf(NULL, 0, "xs_set_permissions %s: failed\n", path);
+        return -1;
+    }
+    return 0;
+}
+
 int xenstore_write_int(const char *base, const char *node, int ival)
 {
     char val[12];
@@ -726,6 +772,20 @@  err:
 
 int xen_be_register(const char *type, struct XenDevOps *ops)
 {
+    char path[50];
+    int rc;
+
+    if (ops->backend_register) {
+        rc = ops->backend_register();
+        if (rc) {
+            return rc;
+        }
+    }
+
+    snprintf(path, sizeof (path), "device-model/%u/backends/%s", xen_domid,
+             type);
+    xenstore_mkdir(path, XS_PERM_READ);
+
     return xenstore_scan(type, xen_domid, ops);
 }
 
diff --git a/hw/xen/xen_devconfig.c b/hw/xen/xen_devconfig.c
index 1f30fe4..b7d290d 100644
--- a/hw/xen/xen_devconfig.c
+++ b/hw/xen/xen_devconfig.c
@@ -5,54 +5,6 @@ 
 
 /* ------------------------------------------------------------- */
 
-struct xs_dirs {
-    char *xs_dir;
-    QTAILQ_ENTRY(xs_dirs) list;
-};
-static QTAILQ_HEAD(xs_dirs_head, xs_dirs) xs_cleanup = QTAILQ_HEAD_INITIALIZER(xs_cleanup);
-
-static void xen_config_cleanup_dir(char *dir)
-{
-    struct xs_dirs *d;
-
-    d = g_malloc(sizeof(*d));
-    d->xs_dir = dir;
-    QTAILQ_INSERT_TAIL(&xs_cleanup, d, list);
-}
-
-void xen_config_cleanup(void)
-{
-    struct xs_dirs *d;
-
-    QTAILQ_FOREACH(d, &xs_cleanup, list) {
-	xs_rm(xenstore, 0, d->xs_dir);
-    }
-}
-
-/* ------------------------------------------------------------- */
-
-static int xen_config_dev_mkdir(char *dev, int p)
-{
-    struct xs_permissions perms[2] = {{
-            .id    = 0, /* set owner: dom0 */
-        },{
-            .id    = xen_domid,
-            .perms = p,
-        }};
-
-    if (!xs_mkdir(xenstore, 0, dev)) {
-	xen_be_printf(NULL, 0, "xs_mkdir %s: failed\n", dev);
-	return -1;
-    }
-    xen_config_cleanup_dir(g_strdup(dev));
-
-    if (!xs_set_permissions(xenstore, 0, dev, perms, 2)) {
-	xen_be_printf(NULL, 0, "xs_set_permissions %s: failed\n", dev);
-	return -1;
-    }
-    return 0;
-}
-
 static int xen_config_dev_dirs(const char *ftype, const char *btype, int vdev,
 			       char *fe, char *be, int len)
 {
@@ -66,8 +18,8 @@  static int xen_config_dev_dirs(const char *ftype, const char *btype, int vdev,
     snprintf(be, len, "%s/backend/%s/%d/%d", dom, btype, xen_domid, vdev);
     free(dom);
 
-    xen_config_dev_mkdir(fe, XS_PERM_READ | XS_PERM_WRITE);
-    xen_config_dev_mkdir(be, XS_PERM_READ);
+    xenstore_mkdir(fe, XS_PERM_READ | XS_PERM_WRITE);
+    xenstore_mkdir(be, XS_PERM_READ);
     return 0;
 }
 
diff --git a/include/hw/xen/xen_backend.h b/include/hw/xen/xen_backend.h
index b4b4ff0..63364f7 100644
--- a/include/hw/xen/xen_backend.h
+++ b/include/hw/xen/xen_backend.h
@@ -28,6 +28,7 @@  struct XenDevOps {
     int       (*free)(struct XenDevice *xendev);
     void      (*backend_changed)(struct XenDevice *xendev, const char *node);
     void      (*frontend_changed)(struct XenDevice *xendev, const char *node);
+    int       (*backend_register)(void);
 };
 
 struct XenDevice {
@@ -63,6 +64,7 @@  extern const char *xen_protocol;
 extern DeviceState *xen_sysdev;
 
 /* xenstore helper functions */
+int xenstore_mkdir(char *path, int p);
 int xenstore_write_str(const char *base, const char *node, const char *val);
 int xenstore_write_int(const char *base, const char *node, int ival);
 int xenstore_write_int64(const char *base, const char *node, int64_t ival);