[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v4 00/12] xenstored patches from split hardware control


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Thu, 24 Jul 2025 22:28:00 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4N4fnYrcRCJHqRp+B7ex/dgKqFVie0lY309qbf+hRUM=; b=dfaZoSCvwJV1TYwmhhjdZEShiGcw6bmLhSOhKXNl+J+VAxc+54n3Vwoj+ljSOCmhfI3yUax20te6rbf80cZ/805U4BVvBkRVjP6v1ZWAQ3lPZSfi90DQr4oWEZVV3pC2QPvWrSuVw/YlN6m2i3KOjpplAwVXa1SULwT/DPqWTVMsH1LSEtdW0nOM9VBa0tL81LMvwWITQ3JoMdRC9cahTv+6w0fZ4ON7hIaDmS47vLLb8p5tU2K2NKZ9jv5xwAwHhvPhX6wHXOSaHe7gWf3xo9upxE9/EPX6XV7NPR6+PGAACKoguKlw8XqxhU+R56C0S11TzfWLlytK0940iTgWuA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wPAEs9wY52PZ7nZq6z1PgyiqXiIDa1DhaEsLKqlkyQJtEAaMpdJ5JLCUPibwkQuzkCOeFKn9TLz8LN9XVZlSxE1GsL5pyB5rdgfpOHnV3l8Cw/P3uwATH2Bw16l/lJFKrVsAW/zByNInqRRpWRqrRC6EKyb+qD+tnzPv+KKl4DrB+6bGDZyEupnUalyF/xSVfe5DdYMVJVZ0w3YmCCMEEWSstNlc29L0OcT7E2x7UgYiB9Hl+6LfxhLw7c8QvWzj1N3tXmrZR9exeEHnJ0mieCGGz+ZPtW2menKFY93MbSMB5HfFgS24D8rxRnbNj2NySFlMpOeIWidOslXUgubXQQ==
  • Cc: Jason Andryuk <jason.andryuk@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, "Julien Grall" <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Juergen Gross" <jgross@xxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>
  • Delivery-date: Fri, 25 Jul 2025 02:28:40 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

This is a subset of patches focusing on xenstored changes from my split
hardware control domain series.

It should address the stubdom breakage from the previous series.  Due to
a lack of x86 test systems, I haven't tested with a stubdom yet :(
I'll try to remedy that.

"tools/xenstored: Use priv_domid for manual nodes and permission" is an
interesting result of looking to rename some internal variables to
better align their purpose.

Any review or guidance on the approach is appreciated.

Jason Andryuk (12):
  xen: Add capabilities to get_domain_state
  tools/manage: Expose domain capabilities
  public/io: xs_wire: Include event channel in interface page
  xen/dom0less: store xenstore event channel in page
  tools/xenstored: Read event channel from xenstored page
  tools/xenstored: Add get_domain_evtchn() to find evtchn
  tools/xenstored: Auto-introduce domains
  tools/xenstored: Remove stubdom special casing
  tools/xenstored: Use priv_domid for manual nodes and permission
  tools/xenstored: Rename dom0_domid to store_domid
  tools/xenstored: Rename xenbus_master_domid -> xenbus_store_domain
  tools/xenstored: Remove hardcoded implicit path

 tools/include/xenmanage.h               |  14 ++-
 tools/libs/manage/core.c                |  21 +++-
 tools/xenstored/core.c                  |  15 ++-
 tools/xenstored/core.h                  |   6 +-
 tools/xenstored/domain.c                | 146 ++++++++++++++++++------
 tools/xenstored/domain.h                |   2 +-
 tools/xenstored/minios.c                |   4 +-
 tools/xenstored/posix.c                 |   2 +-
 xen/common/device-tree/dom0less-build.c |   7 ++
 xen/common/domain.c                     |  10 +-
 xen/include/public/domctl.h             |   7 +-
 xen/include/public/io/xs_wire.h         |   7 ++
 12 files changed, 182 insertions(+), 59 deletions(-)

-- 
2.50.1




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.