[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 4/6] xen_pvdev: Do not assume Dom0 when creating a directory


  • To: "paul@xxxxxxx" <paul@xxxxxxx>
  • From: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Date: Thu, 23 Nov 2023 11:54:01 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xGEx0N50CQG3ILYevRHH28bEXC+2VJPGNIm+YON+jlc=; b=CNbP88UIcnynigLugQql43A6uwmJABcg4q1GCms9U5S0sFwCnrTw24Syo86dDYHC3UlqgFdBmDGytkq9QOCCpTWvUvUJrqqyeaOONryC3MxDgBMTgBztMv6Ss3w5BKJSzFFgb7bAB2qOwZQD+nI4GUVY0Kj2s610X0hBHDs/pft+eA2oGe+t9Aw5YjPhOnsNwQGuJEeqqxmwKVjX0GLwp59EQTtaBy8j3eQ5RPyG05IrltXSC47RMV6qs5xyJgNyOs4+nmVCRUZBNEJ2pDr6RioVT2/H8pE0JUMpLq9tZs7PRKYF8nGzHevnV0/irqR4sB+XDIZ9Bvgzap9klac7Xg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=f2M2RhIDDei5INTBzIsl2XwDIp59alv2acyRsAXa6fo2ZN0iLRviidLLacEuM/NdoF14FfVIJyf7Xw4Z8ht1Ce4T8AgCaTTF61uFbMVXg453VEEpGYPCuU5qUap4HC1xMNdE9Talbjg+uh91u0Nn8//pzdcJmGlWWPfB31SZfOhPgNpsPJQD/BzrclbSRIlCGFjHGFiJV7kIGgmCLhmbEpWhnpDD8YaDfSg726+Ezc/8MdaETjiRAWhZkhUrocn4s2qign/65mAZD6DLXzp9ItVRMpNaEy+1kB+pvBLVcQZVQZDqkHlT1jXBHj6lXgC+vlHu2HBT7aprokvTnYm90Q==
  • Cc: David Woodhouse <dwmw2@xxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "qemu-devel@xxxxxxxxxx" <qemu-devel@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Oleksandr Tyshchenko <Oleksandr_Tyshchenko@xxxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>, "open list:X86 Xen CPUs" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 23 Nov 2023 11:54:18 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHaHMeIsCU+MAEGAkSnPoa9ThBNz7CGlGOAgABYsYCAAAmAgIAAAakAgAAAyoCAAAJ4gIAABwqAgAAFCoCAAJ2+AIAAJb8A
  • Thread-topic: [PATCH v2 4/6] xen_pvdev: Do not assume Dom0 when creating a directory

Hi Paul,

Paul Durrant <xadimgnik@xxxxxxxxx> writes:

> On 23/11/2023 00:07, Volodymyr Babchuk wrote:
>> Hi,
>> Volodymyr Babchuk <volodymyr_babchuk@xxxxxxxx> writes:
>> 
>>> Hi Stefano,
>>>
>>> Stefano Stabellini <sstabellini@xxxxxxxxxx> writes:
>>>
>>>> On Wed, 22 Nov 2023, David Woodhouse wrote:
>>>>> On Wed, 2023-11-22 at 15:09 -0800, Stefano Stabellini wrote:
>>>>>> On Wed, 22 Nov 2023, David Woodhouse wrote:
>>>>>>> On Wed, 2023-11-22 at 14:29 -0800, Stefano Stabellini wrote:
>>>>>>>> On Wed, 22 Nov 2023, Paul Durrant wrote:
>>>>>>>>> On 21/11/2023 22:10, Volodymyr Babchuk wrote:
>>>>>>>>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx>
>>>>>>>>>>
>>>>>>>>>> Instead of forcing the owner to domid 0, use XS_PRESERVE_OWNER to
>>>>>>>>>> inherit the owner of the directory.
>>>>>>>>>
>>>>>>>>> Ah... so that's why the previous patch is there.
>>>>>>>>>
>>>>>>>>> This is not the right way to fix it. The QEMU Xen support is 
>>>>>>>>> *assuming* that
>>>>>>>>> QEMU is either running in, or emulating, dom0. In the emulation case 
>>>>>>>>> this is
>>>>>>>>> probably fine, but the 'real Xen' case it should be using the correct 
>>>>>>>>> domid
>>>>>>>>> for node creation. I guess this could either be supplied on the 
>>>>>>>>> command line
>>>>>>>>> or discerned by reading the local domain 'domid' node.
>>>>>>>>
>>>>>>>> yes, it should be passed as command line option to QEMU
>>>>>>>
>>>>>>> I'm not sure I like the idea of a command line option for something
>>>>>>> which QEMU could discover for itself.
>>>>>>
>>>>>> That's fine too. I meant to say "yes, as far as I know the toolstack
>>>>>> passes the domid to QEMU as a command line option today".
>>>>>
>>>>> The -xen-domid argument on the QEMU command line today is the *guest*
>>>>> domain ID, not the domain ID in which QEMU itself is running.
>>>>>
>>>>> Or were you thinking of something different?
>>>>
>>>> Ops, you are right and I understand your comment better now. The backend
>>>> domid is not on the command line but it should be discoverable (on
>>>> xenstore if I remember right).
>>>
>>> Yes, it is just "~/domid". I'll add a function that reads it.
>> Just a quick question to QEMU folks: is it better to add a global
>> variable where we will store own Domain ID or it will be okay to read
>> domid from Xenstore every time we need it?
>> If global variable variant is better, what is proffered place to
>> define
>> this variable? system/globals.c ?
>> 
>
> Actually... is it possible for QEMU just to use a relative path for
> the backend nodes? That way it won't need to know it's own domid, will
> it?

Well, it is possible to use relative path, AFAIK, linux-based backends
are doing exactly this. But problem is with xenstore_mkdir() function,
which requires domain id to correctly set owner when it causes call to
set_permissions().

As David said, architecturally it will be better to get rid of
xenstore_mkdir() usage, because it is used by legacy backends only. But
to do this, someone needs to convert legacy backends to use newer API. I
have no capacity to do this right now, so I implemented a contained
solution:

static int xenstore_read_own_domid(unsigned int *domid)

in xen_pvdev.c. I believe, this new function will be removed along with
whole xen_pvdev.c when there will be no legacy backends left.

-- 
WBR, Volodymyr


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.