|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH-for-4.15 v3] tools/libs/store: tidy up libxenstore interface
xenstore_lib.h is in need to be tidied up a little bit:
- the definition of struct xs_tdb_record_hdr shouldn't be here
- some symbols are not namespaced correctly
- the layout of a structure with an enum inside it depends on the
implementation of the compiler
Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
---
V2: minimal variant (Ian Jackson)
V3: replace enum with unsigned int (Andrew Cooper)
---
tools/include/xenstore_lib.h | 37 +++++++++++---------------------
tools/libs/store/libxenstore.map | 6 +++---
tools/libs/store/xs.c | 12 +++++------
tools/xenstore/utils.h | 11 ++++++++++
tools/xenstore/xenstore_client.c | 12 +++++------
tools/xenstore/xenstored_core.c | 16 +++++++-------
tools/xenstore/xenstored_core.h | 8 +++----
tools/xenstore/xenstored_watch.c | 2 +-
tools/xenstore/xs_tdb_dump.c | 2 +-
9 files changed, 52 insertions(+), 54 deletions(-)
diff --git a/tools/include/xenstore_lib.h b/tools/include/xenstore_lib.h
index 4c9b6d1685..fdf8752b16 100644
--- a/tools/include/xenstore_lib.h
+++ b/tools/include/xenstore_lib.h
@@ -26,30 +26,17 @@
#include <stdint.h>
#include <xen/io/xs_wire.h>
-/* Bitmask of permissions. */
-enum xs_perm_type {
- XS_PERM_NONE = 0,
- XS_PERM_READ = 1,
- XS_PERM_WRITE = 2,
- /* Internal use. */
- XS_PERM_ENOENT_OK = 4,
- XS_PERM_OWNER = 8,
- XS_PERM_IGNORE = 16,
-};
-
struct xs_permissions
{
unsigned int id;
- enum xs_perm_type perms;
-};
-
-/* Header of the node record in tdb. */
-struct xs_tdb_record_hdr {
- uint64_t generation;
- uint32_t num_perms;
- uint32_t datalen;
- uint32_t childlen;
- struct xs_permissions perms[0];
+ unsigned int perms; /* Bitmask of permissions. */
+#define XS_PERM_NONE 0x00
+#define XS_PERM_READ 0x01
+#define XS_PERM_WRITE 0x02
+ /* Internal use. */
+#define XS_PERM_ENOENT_OK 0x04
+#define XS_PERM_OWNER 0x08
+#define XS_PERM_IGNORE 0x10
};
/* Each 10 bits takes ~ 3 digits, plus one, plus one for nul terminator. */
@@ -78,18 +65,18 @@ bool xs_perm_to_string(const struct xs_permissions *perm,
unsigned int xs_count_strings(const char *strings, unsigned int len);
/* Sanitising (quoting) possibly-binary strings. */
-struct expanding_buffer {
+struct xs_expanding_buffer {
char *buf;
int avail;
};
/* Ensure that given expanding buffer has at least min_avail characters. */
-char *expanding_buffer_ensure(struct expanding_buffer *, int min_avail);
+char *xs_expanding_buffer_ensure(struct xs_expanding_buffer *, int min_avail);
/* sanitise_value() may return NULL if malloc fails. */
-char *sanitise_value(struct expanding_buffer *, const char *val, unsigned len);
+char *xs_sanitise_value(struct xs_expanding_buffer *, const char *val,
unsigned len);
/* *out_len_r on entry is ignored; out must be at least strlen(in)+1 bytes. */
-void unsanitise_value(char *out, unsigned *out_len_r, const char *in);
+void xs_unsanitise_value(char *out, unsigned *out_len_r, const char *in);
#endif /* XENSTORE_LIB_H */
diff --git a/tools/libs/store/libxenstore.map b/tools/libs/store/libxenstore.map
index 9854305a2c..fc1c213f13 100644
--- a/tools/libs/store/libxenstore.map
+++ b/tools/libs/store/libxenstore.map
@@ -42,8 +42,8 @@ VERS_3.0.3 {
xs_strings_to_perms;
xs_perm_to_string;
xs_count_strings;
- expanding_buffer_ensure;
- sanitise_value;
- unsanitise_value;
+ xs_expanding_buffer_ensure;
+ xs_sanitise_value;
+ xs_unsanitise_value;
local: *; /* Do not expose anything by default */
};
diff --git a/tools/libs/store/xs.c b/tools/libs/store/xs.c
index c91377c27f..109ea16d1e 100644
--- a/tools/libs/store/xs.c
+++ b/tools/libs/store/xs.c
@@ -1358,7 +1358,7 @@ static void *read_thread(void *arg)
}
#endif
-char *expanding_buffer_ensure(struct expanding_buffer *ebuf, int min_avail)
+char *xs_expanding_buffer_ensure(struct xs_expanding_buffer *ebuf, int
min_avail)
{
int want;
char *got;
@@ -1379,8 +1379,8 @@ char *expanding_buffer_ensure(struct expanding_buffer
*ebuf, int min_avail)
return ebuf->buf;
}
-char *sanitise_value(struct expanding_buffer *ebuf,
- const char *val, unsigned len)
+char *xs_sanitise_value(struct xs_expanding_buffer *ebuf,
+ const char *val, unsigned len)
{
int used, remain, c;
unsigned char *ip;
@@ -1394,7 +1394,7 @@ char *sanitise_value(struct expanding_buffer *ebuf,
used = 0;
remain = len;
- if (!expanding_buffer_ensure(ebuf, remain + 1))
+ if (!xs_expanding_buffer_ensure(ebuf, remain + 1))
return NULL;
while (remain-- > 0) {
@@ -1405,7 +1405,7 @@ char *sanitise_value(struct expanding_buffer *ebuf,
continue;
}
- if (!expanding_buffer_ensure(ebuf, used + remain + 5))
+ if (!xs_expanding_buffer_ensure(ebuf, used + remain + 5))
/* for "<used>\\nnn<remain>\0" */
return 0;
@@ -1429,7 +1429,7 @@ char *sanitise_value(struct expanding_buffer *ebuf,
#undef ADDF
}
-void unsanitise_value(char *out, unsigned *out_len_r, const char *in)
+void xs_unsanitise_value(char *out, unsigned *out_len_r, const char *in)
{
const char *ip;
char *op;
diff --git a/tools/xenstore/utils.h b/tools/xenstore/utils.h
index 87713a8e5d..9d012b97c1 100644
--- a/tools/xenstore/utils.h
+++ b/tools/xenstore/utils.h
@@ -7,6 +7,17 @@
#include <xen-tools/libs.h>
+#include "xenstore_lib.h"
+
+/* Header of the node record in tdb. */
+struct xs_tdb_record_hdr {
+ uint64_t generation;
+ uint32_t num_perms;
+ uint32_t datalen;
+ uint32_t childlen;
+ struct xs_permissions perms[0];
+};
+
/* Is A == B ? */
#define streq(a,b) (strcmp((a),(b)) == 0)
diff --git a/tools/xenstore/xenstore_client.c b/tools/xenstore/xenstore_client.c
index 8015bfe5be..3d9d399e91 100644
--- a/tools/xenstore/xenstore_client.c
+++ b/tools/xenstore/xenstore_client.c
@@ -40,7 +40,7 @@ enum mode {
static char *output_buf = NULL;
static int output_pos = 0;
-static struct expanding_buffer ebuf;
+static struct xs_expanding_buffer ebuf;
static int output_size = 0;
@@ -203,11 +203,11 @@ static void do_ls(struct xs_handle *h, char *path, int
cur_depth, int show_perms
if (max_width < (linewid + len + TAG_LEN)) {
printf(" = \"%.*s\\...\"",
(int)(max_width - TAG_LEN - linewid),
- sanitise_value(&ebuf, val, len));
+ xs_sanitise_value(&ebuf, val, len));
}
else {
linewid += printf(" = \"%s\"",
- sanitise_value(&ebuf, val, len));
+ xs_sanitise_value(&ebuf, val, len));
if (show_perms) {
putchar(' ');
for (linewid++;
@@ -346,7 +346,7 @@ perform(enum mode mode, int optind, int argc, char **argv,
struct xs_handle *xsh
if (raw)
output_raw(val, len);
else
- output("%s\n", sanitise_value(&ebuf, val, len));
+ output("%s\n", xs_sanitise_value(&ebuf, val, len));
free(val);
optind++;
break;
@@ -359,8 +359,8 @@ perform(enum mode mode, int optind, int argc, char **argv,
struct xs_handle *xsh
val = val_spec;
len = strlen(val_spec);
} else {
- expanding_buffer_ensure(&ebuf, strlen(val_spec)+1);
- unsanitise_value(ebuf.buf, &len, val_spec);
+ xs_expanding_buffer_ensure(&ebuf, strlen(val_spec)+1);
+ xs_unsanitise_value(ebuf.buf, &len, val_spec);
val = ebuf.buf;
}
if (!xs_write(xsh, xth, argv[optind], val, len)) {
diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c
index 8033c1e0eb..244220c5a3 100644
--- a/tools/xenstore/xenstored_core.c
+++ b/tools/xenstore/xenstored_core.c
@@ -542,11 +542,11 @@ static int write_node(struct connection *conn, struct
node *node,
return write_node_raw(conn, &key, node, no_quota_check);
}
-enum xs_perm_type perm_for_conn(struct connection *conn,
- const struct node_perms *perms)
+unsigned int perm_for_conn(struct connection *conn,
+ const struct node_perms *perms)
{
unsigned int i;
- enum xs_perm_type mask = XS_PERM_READ|XS_PERM_WRITE|XS_PERM_OWNER;
+ unsigned int mask = XS_PERM_READ | XS_PERM_WRITE | XS_PERM_OWNER;
/* Owners and tools get it all... */
if (!domain_is_unprivileged(conn) || perms->p[0].id == conn->id
@@ -584,7 +584,7 @@ char *get_parent(const void *ctx, const char *node)
* Temporary memory allocations are done with ctx.
*/
static int ask_parents(struct connection *conn, const void *ctx,
- const char *name, enum xs_perm_type *perm)
+ const char *name, unsigned int *perm)
{
struct node *node;
@@ -619,9 +619,9 @@ static int ask_parents(struct connection *conn, const void
*ctx,
*/
static int errno_from_parents(struct connection *conn, const void *ctx,
const char *node, int errnum,
- enum xs_perm_type perm)
+ unsigned int perm)
{
- enum xs_perm_type parent_perm = XS_PERM_NONE;
+ unsigned int parent_perm = XS_PERM_NONE;
/* We always tell them about memory failures. */
if (errnum == ENOMEM)
@@ -641,7 +641,7 @@ static int errno_from_parents(struct connection *conn,
const void *ctx,
static struct node *get_node(struct connection *conn,
const void *ctx,
const char *name,
- enum xs_perm_type perm)
+ unsigned int perm)
{
struct node *node;
@@ -873,7 +873,7 @@ static struct node *get_node_canonicalized(struct
connection *conn,
const void *ctx,
const char *name,
char **canonical_name,
- enum xs_perm_type perm)
+ unsigned int perm)
{
char *tmp_name;
diff --git a/tools/xenstore/xenstored_core.h b/tools/xenstore/xenstored_core.h
index 0c9a0961b5..0b2f88dd4a 100644
--- a/tools/xenstore/xenstored_core.h
+++ b/tools/xenstore/xenstored_core.h
@@ -186,8 +186,8 @@ void send_ack(struct connection *conn, enum
xsd_sockmsg_type type);
char *canonicalize(struct connection *conn, const void *ctx, const char *node);
/* Get access permissions. */
-enum xs_perm_type perm_for_conn(struct connection *conn,
- const struct node_perms *perms);
+unsigned int perm_for_conn(struct connection *conn,
+ const struct node_perms *perms);
/* Write a node to the tdb data base. */
int write_node_raw(struct connection *conn, TDB_DATA *key, struct node *node,
@@ -201,8 +201,8 @@ struct connection *new_connection(connwritefn_t *write,
connreadfn_t *read);
struct connection *get_connection_by_id(unsigned int conn_id);
void check_store(void);
void corrupt(struct connection *conn, const char *fmt, ...);
-enum xs_perm_type perm_for_conn(struct connection *conn,
- const struct node_perms *perms);
+unsigned int perm_for_conn(struct connection *conn,
+ const struct node_perms *perms);
/* Is this a valid node name? */
bool is_valid_nodename(const char *node);
diff --git a/tools/xenstore/xenstored_watch.c b/tools/xenstore/xenstored_watch.c
index db89e0141f..aca0a71bad 100644
--- a/tools/xenstore/xenstored_watch.c
+++ b/tools/xenstore/xenstored_watch.c
@@ -124,7 +124,7 @@ static bool watch_permitted(struct connection *conn, const
void *ctx,
const char *name, struct node *node,
struct node_perms *perms)
{
- enum xs_perm_type perm;
+ unsigned int perm;
struct node *parent;
char *parent_name;
diff --git a/tools/xenstore/xs_tdb_dump.c b/tools/xenstore/xs_tdb_dump.c
index f74676cf1c..5d2db392b4 100644
--- a/tools/xenstore/xs_tdb_dump.c
+++ b/tools/xenstore/xs_tdb_dump.c
@@ -17,7 +17,7 @@ static uint32_t total_size(struct xs_tdb_record_hdr *hdr)
+ hdr->datalen + hdr->childlen;
}
-static char perm_to_char(enum xs_perm_type perm)
+static char perm_to_char(unsigned int perm)
{
return perm == XS_PERM_READ ? 'r' :
perm == XS_PERM_WRITE ? 'w' :
--
2.26.2
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |