2024-01-09 22:39:32 -08:00
|
|
|
pub mod boot;
|
2024-01-10 08:57:44 -08:00
|
|
|
pub mod elfloader;
|
2024-01-30 17:42:55 -08:00
|
|
|
pub mod error;
|
2024-01-10 16:07:57 -08:00
|
|
|
pub mod mem;
|
2024-01-09 22:39:32 -08:00
|
|
|
pub mod sys;
|
2024-03-10 00:36:23 -08:00
|
|
|
|
2024-04-29 02:59:49 -07:00
|
|
|
use crate::boot::{BootDomain, BootSetup};
|
2024-01-17 05:22:47 -08:00
|
|
|
use crate::elfloader::ElfImageLoader;
|
2024-01-30 17:42:55 -08:00
|
|
|
use crate::error::{Error, Result};
|
2024-03-27 06:28:47 +00:00
|
|
|
use boot::BootState;
|
2024-05-05 13:39:53 -07:00
|
|
|
use indexmap::IndexMap;
|
2024-03-30 03:49:13 +00:00
|
|
|
use log::{debug, trace, warn};
|
2024-04-29 10:02:20 -07:00
|
|
|
use pci::{PciBdf, XenPciBackend};
|
|
|
|
use sys::XEN_PAGE_SHIFT;
|
2024-03-30 03:49:13 +00:00
|
|
|
use tokio::time::timeout;
|
2024-01-30 17:42:55 -08:00
|
|
|
|
2024-01-21 01:58:07 -08:00
|
|
|
use std::path::PathBuf;
|
|
|
|
use std::str::FromStr;
|
|
|
|
use std::time::Duration;
|
2024-01-17 05:22:47 -08:00
|
|
|
use uuid::Uuid;
|
2024-04-29 10:02:20 -07:00
|
|
|
use xencall::sys::{
|
2024-04-29 02:59:49 -07:00
|
|
|
CreateDomain, DOMCTL_DEV_RDM_RELAXED, XEN_DOMCTL_CDF_HAP, XEN_DOMCTL_CDF_HVM_GUEST,
|
2024-04-29 04:31:56 -07:00
|
|
|
XEN_DOMCTL_CDF_IOMMU, XEN_X86_EMU_LAPIC,
|
2024-04-29 10:02:20 -07:00
|
|
|
};
|
2024-01-30 17:42:55 -08:00
|
|
|
use xencall::XenCall;
|
2024-03-08 13:08:59 +00:00
|
|
|
use xenstore::{
|
2024-05-05 13:39:53 -07:00
|
|
|
XsPermission, XsdClient, XsdInterface, XsdTransaction, XS_PERM_NONE, XS_PERM_READ,
|
|
|
|
XS_PERM_READ_WRITE,
|
2024-01-18 06:15:42 -08:00
|
|
|
};
|
2024-01-09 15:40:17 -08:00
|
|
|
|
2024-04-29 10:02:20 -07:00
|
|
|
pub mod pci;
|
2024-04-29 02:59:49 -07:00
|
|
|
pub mod x86pv;
|
2024-04-29 04:31:56 -07:00
|
|
|
pub mod x86pvh;
|
2024-04-29 10:02:20 -07:00
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
#[derive(Clone)]
|
2024-01-09 15:40:17 -08:00
|
|
|
pub struct XenClient {
|
2024-01-21 01:58:07 -08:00
|
|
|
pub store: XsdClient,
|
2024-01-09 15:40:17 -08:00
|
|
|
call: XenCall,
|
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
2024-01-21 00:13:05 -08:00
|
|
|
pub struct BlockDeviceRef {
|
|
|
|
pub path: String,
|
|
|
|
pub major: u32,
|
|
|
|
pub minor: u32,
|
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct DomainDisk {
|
|
|
|
pub vdev: String,
|
|
|
|
pub block: BlockDeviceRef,
|
2024-01-18 06:15:42 -08:00
|
|
|
pub writable: bool,
|
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct DomainFilesystem {
|
|
|
|
pub path: String,
|
|
|
|
pub tag: String,
|
2024-01-22 02:15:53 -08:00
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct DomainNetworkInterface {
|
|
|
|
pub mac: String,
|
2024-02-01 13:56:03 +00:00
|
|
|
pub mtu: u32,
|
2024-04-22 12:48:45 -07:00
|
|
|
pub bridge: Option<String>,
|
|
|
|
pub script: Option<String>,
|
2024-02-01 13:56:03 +00:00
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
2024-03-27 06:28:47 +00:00
|
|
|
pub struct DomainChannel {
|
|
|
|
pub typ: String,
|
|
|
|
pub initialized: bool,
|
|
|
|
}
|
2024-02-06 14:35:55 +00:00
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct DomainEventChannel {
|
|
|
|
pub name: String,
|
2024-02-23 03:25:06 +00:00
|
|
|
}
|
|
|
|
|
2024-04-29 10:02:20 -07:00
|
|
|
#[derive(Clone, Debug, Default, Eq, PartialEq)]
|
|
|
|
pub enum DomainPciRdmReservePolicy {
|
|
|
|
Invalid,
|
|
|
|
#[default]
|
|
|
|
Strict,
|
|
|
|
Relaxed,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl DomainPciRdmReservePolicy {
|
|
|
|
pub fn to_option_str(&self) -> &str {
|
|
|
|
match self {
|
|
|
|
DomainPciRdmReservePolicy::Invalid => "-1",
|
|
|
|
DomainPciRdmReservePolicy::Strict => "0",
|
|
|
|
DomainPciRdmReservePolicy::Relaxed => "1",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct DomainPciDevice {
|
|
|
|
pub bdf: PciBdf,
|
|
|
|
pub permissive: bool,
|
|
|
|
pub msi_translate: bool,
|
|
|
|
pub power_management: bool,
|
|
|
|
pub rdm_reserve_policy: DomainPciRdmReservePolicy,
|
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
pub struct DomainConfig {
|
2024-01-18 06:15:42 -08:00
|
|
|
pub backend_domid: u32,
|
2024-04-22 12:48:45 -07:00
|
|
|
pub name: String,
|
2024-01-17 12:36:13 -08:00
|
|
|
pub max_vcpus: u32,
|
|
|
|
pub mem_mb: u64,
|
2024-04-22 12:48:45 -07:00
|
|
|
pub kernel: Vec<u8>,
|
|
|
|
pub initrd: Vec<u8>,
|
|
|
|
pub cmdline: String,
|
|
|
|
pub disks: Vec<DomainDisk>,
|
|
|
|
pub use_console_backend: Option<String>,
|
2024-03-27 06:28:47 +00:00
|
|
|
pub channels: Vec<DomainChannel>,
|
2024-04-22 12:48:45 -07:00
|
|
|
pub vifs: Vec<DomainNetworkInterface>,
|
|
|
|
pub filesystems: Vec<DomainFilesystem>,
|
|
|
|
pub event_channels: Vec<DomainEventChannel>,
|
2024-04-29 10:02:20 -07:00
|
|
|
pub pcis: Vec<DomainPciDevice>,
|
2024-01-21 01:58:07 -08:00
|
|
|
pub extra_keys: Vec<(String, String)>,
|
2024-02-23 04:48:44 +00:00
|
|
|
pub extra_rw_paths: Vec<String>,
|
2024-01-17 12:36:13 -08:00
|
|
|
}
|
|
|
|
|
2024-03-27 06:28:47 +00:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct CreatedChannel {
|
|
|
|
pub ring_ref: u64,
|
|
|
|
pub evtchn: u32,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct CreatedDomain {
|
|
|
|
pub domid: u32,
|
|
|
|
pub channels: Vec<CreatedChannel>,
|
|
|
|
}
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
#[allow(clippy::too_many_arguments)]
|
2024-01-09 15:40:17 -08:00
|
|
|
impl XenClient {
|
2024-03-10 00:22:24 +00:00
|
|
|
pub async fn open(current_domid: u32) -> Result<XenClient> {
|
2024-02-23 04:37:53 +00:00
|
|
|
let store = XsdClient::open().await?;
|
2024-03-10 00:22:24 +00:00
|
|
|
let call = XenCall::open(current_domid)?;
|
2024-01-09 15:40:17 -08:00
|
|
|
Ok(XenClient { store, call })
|
|
|
|
}
|
|
|
|
|
2024-04-22 12:48:45 -07:00
|
|
|
pub async fn create(&self, config: &DomainConfig) -> Result<CreatedDomain> {
|
2024-04-29 02:59:49 -07:00
|
|
|
let mut domain = CreateDomain {
|
|
|
|
max_vcpus: config.max_vcpus,
|
|
|
|
..Default::default()
|
|
|
|
};
|
2024-04-29 10:02:20 -07:00
|
|
|
domain.max_vcpus = config.max_vcpus;
|
2024-03-10 00:36:23 -08:00
|
|
|
|
2024-03-13 07:48:20 -07:00
|
|
|
if cfg!(target_arch = "aarch64") {
|
|
|
|
domain.flags = XEN_DOMCTL_CDF_HVM_GUEST | XEN_DOMCTL_CDF_HAP;
|
2024-04-29 10:02:20 -07:00
|
|
|
} else {
|
2024-04-29 04:31:56 -07:00
|
|
|
domain.flags = XEN_DOMCTL_CDF_HVM_GUEST | XEN_DOMCTL_CDF_HAP | XEN_DOMCTL_CDF_IOMMU;
|
|
|
|
domain.arch_domain_config.emulation_flags = XEN_X86_EMU_LAPIC;
|
2024-03-13 07:48:20 -07:00
|
|
|
}
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
let domid = self.call.create_domain(domain).await?;
|
2024-02-23 04:37:53 +00:00
|
|
|
match self.init(domid, &domain, config).await {
|
2024-03-27 06:28:47 +00:00
|
|
|
Ok(created) => Ok(created),
|
2024-01-20 20:29:36 -08:00
|
|
|
Err(err) => {
|
|
|
|
// ignore since destroying a domain is best
|
|
|
|
// effort when an error occurs
|
2024-02-23 04:37:53 +00:00
|
|
|
let _ = self.destroy(domid).await;
|
2024-01-20 20:29:36 -08:00
|
|
|
Err(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
async fn init(
|
2024-04-02 00:56:18 +00:00
|
|
|
&self,
|
2024-02-23 04:37:53 +00:00
|
|
|
domid: u32,
|
|
|
|
domain: &CreateDomain,
|
2024-04-22 12:48:45 -07:00
|
|
|
config: &DomainConfig,
|
2024-03-27 06:28:47 +00:00
|
|
|
) -> Result<CreatedDomain> {
|
2024-01-22 21:37:30 -08:00
|
|
|
trace!(
|
|
|
|
"XenClient init domid={} domain={:?} config={:?}",
|
|
|
|
domid,
|
|
|
|
domain,
|
|
|
|
config
|
|
|
|
);
|
2024-02-23 04:37:53 +00:00
|
|
|
let backend_dom_path = self.store.get_domain_path(0).await?;
|
|
|
|
let dom_path = self.store.get_domain_path(domid).await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
let uuid_string = Uuid::from_bytes(domain.handle).to_string();
|
|
|
|
let vm_path = format!("/vm/{}", uuid_string);
|
2024-01-09 15:40:17 -08:00
|
|
|
|
2024-01-18 06:15:42 -08:00
|
|
|
let ro_perm = &[
|
|
|
|
XsPermission {
|
|
|
|
id: 0,
|
|
|
|
perms: XS_PERM_NONE,
|
|
|
|
},
|
|
|
|
XsPermission {
|
|
|
|
id: domid,
|
|
|
|
perms: XS_PERM_READ,
|
|
|
|
},
|
|
|
|
];
|
|
|
|
|
|
|
|
let rw_perm = &[XsPermission {
|
|
|
|
id: domid,
|
|
|
|
perms: XS_PERM_READ_WRITE,
|
|
|
|
}];
|
|
|
|
|
|
|
|
let no_perm = &[XsPermission {
|
|
|
|
id: 0,
|
|
|
|
perms: XS_PERM_NONE,
|
|
|
|
}];
|
2024-01-17 05:22:47 -08:00
|
|
|
|
|
|
|
{
|
2024-03-07 04:14:25 -08:00
|
|
|
let tx = self.store.transaction().await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.rm(dom_path.as_str()).await?;
|
|
|
|
tx.mknod(dom_path.as_str(), ro_perm).await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.rm(vm_path.as_str()).await?;
|
|
|
|
tx.mknod(vm_path.as_str(), ro_perm).await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mknod(vm_path.as_str(), no_perm).await?;
|
|
|
|
tx.mknod(format!("{}/device", vm_path).as_str(), no_perm)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(format!("{}/vm", dom_path).as_str(), &vm_path)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mknod(format!("{}/cpu", dom_path).as_str(), ro_perm)
|
|
|
|
.await?;
|
|
|
|
tx.mknod(format!("{}/memory", dom_path).as_str(), ro_perm)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mknod(format!("{}/control", dom_path).as_str(), ro_perm)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mknod(format!("{}/control/shutdown", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.mknod(
|
|
|
|
format!("{}/control/feature-poweroff", dom_path).as_str(),
|
2024-01-18 06:15:42 -08:00
|
|
|
rw_perm,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.mknod(
|
|
|
|
format!("{}/control/feature-reboot", dom_path).as_str(),
|
2024-01-18 06:15:42 -08:00
|
|
|
rw_perm,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.mknod(
|
|
|
|
format!("{}/control/feature-suspend", dom_path).as_str(),
|
2024-01-18 06:15:42 -08:00
|
|
|
rw_perm,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
tx.mknod(format!("{}/control/sysrq", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
tx.mknod(format!("{}/data", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
|
|
|
tx.mknod(format!("{}/drivers", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
|
|
|
tx.mknod(format!("{}/feature", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
|
|
|
tx.mknod(format!("{}/attr", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
|
|
|
tx.mknod(format!("{}/error", dom_path).as_str(), rw_perm)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
|
|
|
tx.write_string(
|
|
|
|
format!("{}/uuid", vm_path).as_str(),
|
|
|
|
&Uuid::from_bytes(domain.handle).to_string(),
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-04-22 12:48:45 -07:00
|
|
|
tx.write_string(format!("{}/name", dom_path).as_str(), &config.name)
|
2024-02-23 04:37:53 +00:00
|
|
|
.await?;
|
2024-04-22 12:48:45 -07:00
|
|
|
tx.write_string(format!("{}/name", vm_path).as_str(), &config.name)
|
2024-02-23 04:37:53 +00:00
|
|
|
.await?;
|
2024-01-21 01:58:07 -08:00
|
|
|
|
|
|
|
for (key, value) in &config.extra_keys {
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(format!("{}/{}", dom_path, key).as_str(), value)
|
|
|
|
.await?;
|
2024-01-21 01:58:07 -08:00
|
|
|
}
|
|
|
|
|
2024-02-23 04:48:44 +00:00
|
|
|
for path in &config.extra_rw_paths {
|
|
|
|
tx.mknod(format!("{}/{}", dom_path, path).as_str(), rw_perm)
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.commit().await?;
|
2024-01-09 15:40:17 -08:00
|
|
|
}
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
self.call.set_max_vcpus(domid, config.max_vcpus).await?;
|
|
|
|
self.call.set_max_mem(domid, config.mem_mb * 1024).await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
let xenstore_evtchn: u32;
|
|
|
|
let xenstore_mfn: u64;
|
2024-01-09 15:40:17 -08:00
|
|
|
|
2024-04-29 02:59:49 -07:00
|
|
|
let mut domain: BootDomain;
|
2024-01-17 05:22:47 -08:00
|
|
|
{
|
2024-04-29 02:59:49 -07:00
|
|
|
let loader = ElfImageLoader::load_file_kernel(&config.kernel)?;
|
|
|
|
let mut boot =
|
2024-04-29 04:31:56 -07:00
|
|
|
BootSetup::new(self.call.clone(), domid, X86PvhPlatform::new(), loader, None);
|
2024-04-29 02:59:49 -07:00
|
|
|
domain = boot.initialize(&config.initrd, config.mem_mb).await?;
|
|
|
|
boot.boot(&mut domain, &config.cmdline).await?;
|
|
|
|
xenstore_evtchn = domain.store_evtchn;
|
|
|
|
xenstore_mfn = domain.xenstore_mfn;
|
2024-01-09 15:40:17 -08:00
|
|
|
}
|
|
|
|
|
2024-01-17 05:22:47 -08:00
|
|
|
{
|
2024-03-07 04:14:25 -08:00
|
|
|
let tx = self.store.transaction().await?;
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(format!("{}/image/os_type", vm_path).as_str(), "linux")
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.write_string(
|
|
|
|
format!("{}/image/cmdline", vm_path).as_str(),
|
2024-04-22 12:48:45 -07:00
|
|
|
&config.cmdline,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
|
|
|
|
tx.write_string(
|
|
|
|
format!("{}/memory/static-max", dom_path).as_str(),
|
|
|
|
&(config.mem_mb * 1024).to_string(),
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.write_string(
|
|
|
|
format!("{}/memory/target", dom_path).as_str(),
|
|
|
|
&(config.mem_mb * 1024).to_string(),
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
tx.write_string(format!("{}/memory/videoram", dom_path).as_str(), "0")
|
|
|
|
.await?;
|
|
|
|
tx.write_string(format!("{}/domid", dom_path).as_str(), &domid.to_string())
|
|
|
|
.await?;
|
2024-05-04 00:33:05 -07:00
|
|
|
tx.write_string(format!("{}/type", dom_path).as_str(), "PVH")
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.write_string(
|
|
|
|
format!("{}/store/port", dom_path).as_str(),
|
|
|
|
&xenstore_evtchn.to_string(),
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
tx.write_string(
|
|
|
|
format!("{}/store/ring-ref", dom_path).as_str(),
|
|
|
|
&xenstore_mfn.to_string(),
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
for i in 0..config.max_vcpus {
|
2024-01-18 06:15:42 -08:00
|
|
|
let path = format!("{}/cpu/{}", dom_path, i);
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mkdir(&path).await?;
|
|
|
|
tx.set_perms(&path, ro_perm).await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
let path = format!("{}/cpu/{}/availability", dom_path, i);
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(&path, "online").await?;
|
|
|
|
tx.set_perms(&path, ro_perm).await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
}
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.commit().await?;
|
2024-01-17 05:22:47 -08:00
|
|
|
}
|
2024-01-18 06:15:42 -08:00
|
|
|
if !self
|
|
|
|
.store
|
2024-02-23 04:37:53 +00:00
|
|
|
.introduce_domain(domid, xenstore_mfn, xenstore_evtchn)
|
|
|
|
.await?
|
2024-01-18 06:15:42 -08:00
|
|
|
{
|
2024-01-30 18:02:32 -08:00
|
|
|
return Err(Error::IntroduceDomainFailed);
|
2024-01-18 06:15:42 -08:00
|
|
|
}
|
2024-05-05 13:39:53 -07:00
|
|
|
|
|
|
|
let tx = self.store.transaction().await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
self.console_device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
&tx,
|
2024-03-27 06:28:47 +00:00
|
|
|
&DomainChannel {
|
2024-04-02 08:57:34 +00:00
|
|
|
typ: config
|
|
|
|
.use_console_backend
|
2024-04-22 12:48:45 -07:00
|
|
|
.clone()
|
|
|
|
.unwrap_or("xenconsoled".to_string())
|
2024-04-02 08:57:34 +00:00
|
|
|
.to_string(),
|
2024-03-27 06:28:47 +00:00
|
|
|
initialized: true,
|
|
|
|
},
|
2024-01-18 06:15:42 -08:00
|
|
|
&dom_path,
|
|
|
|
&backend_dom_path,
|
|
|
|
config.backend_domid,
|
|
|
|
domid,
|
2024-02-06 14:35:55 +00:00
|
|
|
0,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-02-06 14:35:55 +00:00
|
|
|
|
2024-03-27 06:28:47 +00:00
|
|
|
let mut channels: Vec<CreatedChannel> = Vec::new();
|
|
|
|
for (index, channel) in config.channels.iter().enumerate() {
|
|
|
|
let (Some(ring_ref), Some(evtchn)) = self
|
|
|
|
.console_device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
&tx,
|
2024-03-27 06:28:47 +00:00
|
|
|
channel,
|
|
|
|
&dom_path,
|
|
|
|
&backend_dom_path,
|
|
|
|
config.backend_domid,
|
|
|
|
domid,
|
|
|
|
index + 1,
|
|
|
|
)
|
|
|
|
.await?
|
|
|
|
else {
|
|
|
|
continue;
|
|
|
|
};
|
|
|
|
channels.push(CreatedChannel { ring_ref, evtchn });
|
2024-02-06 14:35:55 +00:00
|
|
|
}
|
|
|
|
|
2024-01-18 06:15:42 -08:00
|
|
|
for (index, disk) in config.disks.iter().enumerate() {
|
|
|
|
self.disk_device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
&tx,
|
2024-01-18 06:15:42 -08:00
|
|
|
&dom_path,
|
|
|
|
&backend_dom_path,
|
|
|
|
config.backend_domid,
|
|
|
|
domid,
|
|
|
|
index,
|
|
|
|
disk,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
}
|
2024-02-01 13:56:03 +00:00
|
|
|
|
2024-01-22 02:15:53 -08:00
|
|
|
for (index, filesystem) in config.filesystems.iter().enumerate() {
|
|
|
|
self.fs_9p_device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
&tx,
|
2024-01-22 02:15:53 -08:00
|
|
|
&dom_path,
|
|
|
|
&backend_dom_path,
|
|
|
|
config.backend_domid,
|
|
|
|
domid,
|
|
|
|
index,
|
|
|
|
filesystem,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-22 02:15:53 -08:00
|
|
|
}
|
2024-02-01 13:56:03 +00:00
|
|
|
|
|
|
|
for (index, vif) in config.vifs.iter().enumerate() {
|
|
|
|
self.vif_device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
&tx,
|
2024-02-01 13:56:03 +00:00
|
|
|
&dom_path,
|
|
|
|
&backend_dom_path,
|
|
|
|
config.backend_domid,
|
|
|
|
domid,
|
|
|
|
index,
|
|
|
|
vif,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-02-01 13:56:03 +00:00
|
|
|
}
|
2024-02-23 03:25:06 +00:00
|
|
|
|
2024-04-29 10:02:20 -07:00
|
|
|
for (index, pci) in config.pcis.iter().enumerate() {
|
|
|
|
self.pci_device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
&tx,
|
2024-04-29 10:02:20 -07:00
|
|
|
&dom_path,
|
|
|
|
&backend_dom_path,
|
|
|
|
config.backend_domid,
|
|
|
|
domid,
|
|
|
|
index,
|
|
|
|
config.pcis.len(),
|
|
|
|
pci,
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
|
2024-02-23 03:25:06 +00:00
|
|
|
for channel in &config.event_channels {
|
|
|
|
let id = self
|
|
|
|
.call
|
2024-04-02 00:56:18 +00:00
|
|
|
.evtchn_alloc_unbound(domid, config.backend_domid)
|
|
|
|
.await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
let channel_path = format!("{}/evtchn/{}", dom_path, channel.name);
|
2024-05-05 13:39:53 -07:00
|
|
|
tx.write_string(&format!("{}/name", channel_path), &channel.name)
|
2024-02-23 04:37:53 +00:00
|
|
|
.await?;
|
2024-05-05 13:39:53 -07:00
|
|
|
tx.write_string(&format!("{}/channel", channel_path), &id.to_string())
|
2024-02-23 04:37:53 +00:00
|
|
|
.await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
}
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
tx.commit().await?;
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
self.call.unpause_domain(domid).await?;
|
2024-03-27 06:28:47 +00:00
|
|
|
Ok(CreatedDomain { domid, channels })
|
2024-01-17 05:22:47 -08:00
|
|
|
}
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
async fn disk_device_add(
|
2024-04-02 00:56:18 +00:00
|
|
|
&self,
|
2024-05-05 13:39:53 -07:00
|
|
|
tx: &XsdTransaction,
|
2024-01-18 06:15:42 -08:00
|
|
|
dom_path: &str,
|
|
|
|
backend_dom_path: &str,
|
|
|
|
backend_domid: u32,
|
|
|
|
domid: u32,
|
|
|
|
index: usize,
|
2024-04-22 12:48:45 -07:00
|
|
|
disk: &DomainDisk,
|
2024-01-30 17:42:55 -08:00
|
|
|
) -> Result<()> {
|
2024-01-18 06:15:42 -08:00
|
|
|
let id = (202 << 8) | (index << 4) as u64;
|
|
|
|
let backend_items: Vec<(&str, String)> = vec![
|
|
|
|
("frontend-id", domid.to_string()),
|
|
|
|
("online", "1".to_string()),
|
|
|
|
("removable", "0".to_string()),
|
|
|
|
("bootable", "1".to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("dev", disk.vdev.to_string()),
|
|
|
|
("type", "phy".to_string()),
|
|
|
|
("mode", if disk.writable { "w" } else { "r" }.to_string()),
|
|
|
|
("device-type", "disk".to_string()),
|
|
|
|
("discard-enable", "0".to_string()),
|
|
|
|
("specification", "xen".to_string()),
|
2024-01-21 00:13:05 -08:00
|
|
|
("physical-device-path", disk.block.path.to_string()),
|
|
|
|
(
|
|
|
|
"physical-device",
|
2024-01-21 01:58:07 -08:00
|
|
|
format!("{:02x}:{:02x}", disk.block.major, disk.block.minor),
|
2024-01-21 00:13:05 -08:00
|
|
|
),
|
2024-01-18 06:15:42 -08:00
|
|
|
];
|
|
|
|
|
|
|
|
let frontend_items: Vec<(&str, String)> = vec![
|
|
|
|
("backend-id", backend_domid.to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("virtual-device", id.to_string()),
|
|
|
|
("device-type", "disk".to_string()),
|
|
|
|
("trusted", "1".to_string()),
|
|
|
|
("protocol", "x86_64-abi".to_string()),
|
|
|
|
];
|
|
|
|
|
|
|
|
self.device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
tx,
|
2024-01-18 06:15:42 -08:00
|
|
|
"vbd",
|
|
|
|
id,
|
|
|
|
dom_path,
|
|
|
|
backend_dom_path,
|
|
|
|
backend_domid,
|
|
|
|
domid,
|
|
|
|
frontend_items,
|
|
|
|
backend_items,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
#[allow(clippy::unnecessary_unwrap)]
|
2024-02-23 04:37:53 +00:00
|
|
|
async fn console_device_add(
|
2024-04-02 00:56:18 +00:00
|
|
|
&self,
|
2024-05-05 13:39:53 -07:00
|
|
|
tx: &XsdTransaction,
|
2024-03-27 06:28:47 +00:00
|
|
|
channel: &DomainChannel,
|
2024-01-18 06:15:42 -08:00
|
|
|
dom_path: &str,
|
|
|
|
backend_dom_path: &str,
|
|
|
|
backend_domid: u32,
|
2024-01-17 05:22:47 -08:00
|
|
|
domid: u32,
|
2024-02-06 14:35:55 +00:00
|
|
|
index: usize,
|
2024-03-27 06:28:47 +00:00
|
|
|
) -> Result<(Option<u64>, Option<u32>)> {
|
2024-04-29 02:59:49 -07:00
|
|
|
let console = domain.consoles.get(index);
|
2024-03-27 06:28:47 +00:00
|
|
|
let port = console.map(|x| x.0);
|
2024-04-29 02:59:49 -07:00
|
|
|
let ring = console.map(|x| x.1);
|
2024-03-27 06:28:47 +00:00
|
|
|
|
2024-02-06 14:35:55 +00:00
|
|
|
let mut backend_entries = vec![
|
2024-01-18 06:15:42 -08:00
|
|
|
("frontend-id", domid.to_string()),
|
|
|
|
("online", "1".to_string()),
|
|
|
|
("protocol", "vt100".to_string()),
|
|
|
|
];
|
|
|
|
|
2024-02-06 14:35:55 +00:00
|
|
|
let mut frontend_entries = vec![
|
2024-01-18 06:15:42 -08:00
|
|
|
("backend-id", backend_domid.to_string()),
|
|
|
|
("limit", "1048576".to_string()),
|
|
|
|
("output", "pty".to_string()),
|
|
|
|
("tty", "".to_string()),
|
|
|
|
];
|
|
|
|
|
2024-03-27 06:28:47 +00:00
|
|
|
frontend_entries.push(("type", channel.typ.clone()));
|
|
|
|
backend_entries.push(("type", channel.typ.clone()));
|
2024-02-06 14:35:55 +00:00
|
|
|
|
2024-03-13 07:48:20 -07:00
|
|
|
if port.is_some() && ring.is_some() {
|
2024-03-27 06:28:47 +00:00
|
|
|
if channel.typ != "xenconsoled" {
|
|
|
|
frontend_entries.push(("state", "1".to_string()));
|
|
|
|
}
|
|
|
|
|
2024-02-06 14:35:55 +00:00
|
|
|
frontend_entries.extend_from_slice(&[
|
|
|
|
("port", port.unwrap().to_string()),
|
2024-03-13 07:48:20 -07:00
|
|
|
("ring-ref", ring.unwrap().to_string()),
|
2024-02-06 14:35:55 +00:00
|
|
|
]);
|
|
|
|
} else {
|
|
|
|
frontend_entries.extend_from_slice(&[
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("protocol", "vt100".to_string()),
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2024-03-27 06:28:47 +00:00
|
|
|
if channel.initialized {
|
|
|
|
backend_entries.push(("state", "4".to_string()));
|
|
|
|
} else {
|
|
|
|
backend_entries.push(("state", "1".to_string()));
|
|
|
|
}
|
|
|
|
|
2024-01-18 06:15:42 -08:00
|
|
|
self.device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
tx,
|
2024-01-18 06:15:42 -08:00
|
|
|
"console",
|
2024-02-06 14:35:55 +00:00
|
|
|
index as u64,
|
2024-01-18 06:15:42 -08:00
|
|
|
dom_path,
|
|
|
|
backend_dom_path,
|
|
|
|
backend_domid,
|
|
|
|
domid,
|
|
|
|
frontend_entries,
|
|
|
|
backend_entries,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-03-27 06:28:47 +00:00
|
|
|
Ok((ring, port))
|
2024-01-18 06:15:42 -08:00
|
|
|
}
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
async fn fs_9p_device_add(
|
2024-04-02 00:56:18 +00:00
|
|
|
&self,
|
2024-05-05 13:39:53 -07:00
|
|
|
tx: &XsdTransaction,
|
2024-01-22 02:15:53 -08:00
|
|
|
dom_path: &str,
|
|
|
|
backend_dom_path: &str,
|
|
|
|
backend_domid: u32,
|
|
|
|
domid: u32,
|
|
|
|
index: usize,
|
2024-04-22 12:48:45 -07:00
|
|
|
filesystem: &DomainFilesystem,
|
2024-01-30 17:42:55 -08:00
|
|
|
) -> Result<()> {
|
2024-01-22 02:15:53 -08:00
|
|
|
let id = 90 + index as u64;
|
|
|
|
let backend_items: Vec<(&str, String)> = vec![
|
|
|
|
("frontend-id", domid.to_string()),
|
|
|
|
("online", "1".to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("path", filesystem.path.to_string()),
|
|
|
|
("security-model", "none".to_string()),
|
|
|
|
];
|
|
|
|
|
|
|
|
let frontend_items: Vec<(&str, String)> = vec![
|
|
|
|
("backend-id", backend_domid.to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("tag", filesystem.tag.to_string()),
|
|
|
|
];
|
|
|
|
|
|
|
|
self.device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
tx,
|
2024-01-22 02:15:53 -08:00
|
|
|
"9pfs",
|
|
|
|
id,
|
|
|
|
dom_path,
|
|
|
|
backend_dom_path,
|
|
|
|
backend_domid,
|
|
|
|
domid,
|
|
|
|
frontend_items,
|
|
|
|
backend_items,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-01-22 02:15:53 -08:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
async fn vif_device_add(
|
2024-04-02 00:56:18 +00:00
|
|
|
&self,
|
2024-05-05 13:39:53 -07:00
|
|
|
tx: &XsdTransaction,
|
2024-02-01 13:56:03 +00:00
|
|
|
dom_path: &str,
|
|
|
|
backend_dom_path: &str,
|
|
|
|
backend_domid: u32,
|
|
|
|
domid: u32,
|
|
|
|
index: usize,
|
2024-04-22 12:48:45 -07:00
|
|
|
vif: &DomainNetworkInterface,
|
2024-02-01 13:56:03 +00:00
|
|
|
) -> Result<()> {
|
|
|
|
let id = 20 + index as u64;
|
2024-02-05 12:45:45 +00:00
|
|
|
let mut backend_items: Vec<(&str, String)> = vec![
|
2024-02-01 13:56:03 +00:00
|
|
|
("frontend-id", domid.to_string()),
|
|
|
|
("online", "1".to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("mac", vif.mac.to_string()),
|
|
|
|
("mtu", vif.mtu.to_string()),
|
|
|
|
("type", "vif".to_string()),
|
|
|
|
("handle", id.to_string()),
|
|
|
|
];
|
|
|
|
|
2024-02-05 12:45:45 +00:00
|
|
|
if vif.bridge.is_some() {
|
2024-04-22 12:48:45 -07:00
|
|
|
backend_items.extend_from_slice(&[("bridge", vif.bridge.clone().unwrap())]);
|
2024-02-05 12:45:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if vif.script.is_some() {
|
|
|
|
backend_items.extend_from_slice(&[
|
2024-04-22 12:48:45 -07:00
|
|
|
("script", vif.script.clone().unwrap()),
|
2024-02-05 12:45:45 +00:00
|
|
|
("hotplug-status", "".to_string()),
|
|
|
|
]);
|
|
|
|
} else {
|
|
|
|
backend_items.extend_from_slice(&[
|
|
|
|
("script", "".to_string()),
|
|
|
|
("hotplug-status", "connected".to_string()),
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2024-02-01 13:56:03 +00:00
|
|
|
let frontend_items: Vec<(&str, String)> = vec![
|
|
|
|
("backend-id", backend_domid.to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("mac", vif.mac.to_string()),
|
|
|
|
("trusted", "1".to_string()),
|
2024-02-05 12:45:45 +00:00
|
|
|
("mtu", vif.mtu.to_string()),
|
2024-02-01 13:56:03 +00:00
|
|
|
];
|
|
|
|
|
|
|
|
self.device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
tx,
|
2024-02-01 13:56:03 +00:00
|
|
|
"vif",
|
|
|
|
id,
|
|
|
|
dom_path,
|
|
|
|
backend_dom_path,
|
|
|
|
backend_domid,
|
|
|
|
domid,
|
|
|
|
frontend_items,
|
|
|
|
backend_items,
|
2024-02-23 04:37:53 +00:00
|
|
|
)
|
|
|
|
.await?;
|
2024-02-01 13:56:03 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-04-29 10:02:20 -07:00
|
|
|
async fn pci_device_add(
|
|
|
|
&self,
|
2024-05-05 13:39:53 -07:00
|
|
|
tx: &XsdTransaction,
|
2024-04-29 10:02:20 -07:00
|
|
|
dom_path: &str,
|
|
|
|
backend_dom_path: &str,
|
|
|
|
backend_domid: u32,
|
|
|
|
domid: u32,
|
|
|
|
index: usize,
|
|
|
|
device_count: usize,
|
|
|
|
device: &DomainPciDevice,
|
|
|
|
) -> Result<()> {
|
|
|
|
let backend = XenPciBackend::new();
|
|
|
|
if !backend.is_assigned(&device.bdf).await? {
|
|
|
|
return Err(Error::PciDeviceNotAssignable(device.bdf));
|
|
|
|
}
|
|
|
|
let resources = backend.read_resources(&device.bdf).await?;
|
|
|
|
for resource in resources {
|
|
|
|
if resource.is_bar_io() {
|
|
|
|
self.call
|
|
|
|
.ioport_permission(domid, resource.start as u32, resource.size() as u32, true)
|
|
|
|
.await?;
|
|
|
|
} else {
|
|
|
|
self.call
|
|
|
|
.iomem_permission(
|
|
|
|
domid,
|
|
|
|
resource.start >> XEN_PAGE_SHIFT,
|
|
|
|
(resource.size() + (XEN_PAGE_SHIFT - 1)) >> XEN_PAGE_SHIFT,
|
|
|
|
true,
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
if let Some(irq) = backend.read_irq(&device.bdf).await? {
|
|
|
|
let irq = self.call.map_pirq(domid, irq as isize, None).await?;
|
|
|
|
self.call.irq_permission(domid, irq, true).await?;
|
|
|
|
}
|
|
|
|
|
|
|
|
backend.reset(&device.bdf).await?;
|
2024-04-29 10:02:20 -07:00
|
|
|
|
|
|
|
self.call
|
|
|
|
.assign_device(
|
|
|
|
domid,
|
|
|
|
device.bdf.encode(),
|
|
|
|
if device.rdm_reserve_policy == DomainPciRdmReservePolicy::Relaxed {
|
|
|
|
DOMCTL_DEV_RDM_RELAXED
|
|
|
|
} else {
|
|
|
|
0
|
|
|
|
},
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
if device.permissive {
|
|
|
|
backend.enable_permissive(&device.bdf).await?;
|
|
|
|
}
|
|
|
|
|
2024-04-29 10:02:20 -07:00
|
|
|
let id = 60;
|
|
|
|
|
|
|
|
if index == 0 {
|
|
|
|
let backend_items: Vec<(&str, String)> = vec![
|
|
|
|
("frontend-id", domid.to_string()),
|
|
|
|
("online", "1".to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
("num_devs", device_count.to_string()),
|
|
|
|
];
|
|
|
|
|
|
|
|
let frontend_items: Vec<(&str, String)> = vec![
|
|
|
|
("backend-id", backend_domid.to_string()),
|
|
|
|
("state", "1".to_string()),
|
|
|
|
];
|
|
|
|
|
|
|
|
self.device_add(
|
2024-05-05 13:39:53 -07:00
|
|
|
tx,
|
2024-04-29 10:02:20 -07:00
|
|
|
"pci",
|
|
|
|
id,
|
|
|
|
dom_path,
|
|
|
|
backend_dom_path,
|
|
|
|
backend_domid,
|
|
|
|
domid,
|
|
|
|
frontend_items,
|
|
|
|
backend_items,
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
|
|
|
|
let backend_path = format!("{}/backend/{}/{}/{}", backend_dom_path, "pci", domid, id);
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
tx.write_string(
|
|
|
|
format!("{}/key-{}", backend_path, index),
|
|
|
|
&device.bdf.to_string(),
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
tx.write_string(
|
|
|
|
format!("{}/dev-{}", backend_path, index),
|
|
|
|
&device.bdf.to_string(),
|
|
|
|
)
|
|
|
|
.await?;
|
2024-04-29 10:02:20 -07:00
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
if let Some(vdefn) = device.bdf.vdefn {
|
|
|
|
tx.write_string(
|
|
|
|
format!("{}/vdefn-{}", backend_path, index),
|
|
|
|
&format!("{:#x}", vdefn),
|
2024-04-29 10:02:20 -07:00
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
let mut options = IndexMap::new();
|
2024-04-29 10:02:20 -07:00
|
|
|
options.insert("permissive", if device.permissive { "1" } else { "0" });
|
|
|
|
options.insert("rdm_policy", device.rdm_reserve_policy.to_option_str());
|
|
|
|
options.insert("msitranslate", if device.msi_translate { "1" } else { "0" });
|
|
|
|
options.insert(
|
|
|
|
"power_mgmt",
|
|
|
|
if device.power_management { "1" } else { "0" },
|
|
|
|
);
|
|
|
|
let options = options
|
|
|
|
.into_iter()
|
|
|
|
.map(|(key, value)| format!("{}={}", key, value))
|
|
|
|
.collect::<Vec<_>>()
|
|
|
|
.join(",");
|
|
|
|
|
2024-05-05 13:39:53 -07:00
|
|
|
tx.write_string(format!("{}/opts-{}", backend_path, index), &options)
|
2024-04-29 10:02:20 -07:00
|
|
|
.await?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
async fn device_add(
|
2024-04-02 00:56:18 +00:00
|
|
|
&self,
|
2024-05-05 13:39:53 -07:00
|
|
|
tx: &XsdTransaction,
|
2024-01-18 06:15:42 -08:00
|
|
|
typ: &str,
|
|
|
|
id: u64,
|
|
|
|
dom_path: &str,
|
|
|
|
backend_dom_path: &str,
|
|
|
|
backend_domid: u32,
|
|
|
|
domid: u32,
|
|
|
|
frontend_items: Vec<(&str, String)>,
|
|
|
|
backend_items: Vec<(&str, String)>,
|
2024-01-30 17:42:55 -08:00
|
|
|
) -> Result<()> {
|
2024-01-18 06:15:42 -08:00
|
|
|
let console_zero = typ == "console" && id == 0;
|
|
|
|
|
|
|
|
let frontend_path = if console_zero {
|
|
|
|
format!("{}/console", dom_path)
|
|
|
|
} else {
|
|
|
|
format!("{}/device/{}/{}", dom_path, typ, id)
|
|
|
|
};
|
|
|
|
let backend_path = format!("{}/backend/{}/{}/{}", backend_dom_path, typ, domid, id);
|
|
|
|
|
|
|
|
let mut backend_items: Vec<(&str, String)> = backend_items.clone();
|
|
|
|
let mut frontend_items: Vec<(&str, String)> = frontend_items.clone();
|
|
|
|
backend_items.push(("frontend", frontend_path.clone()));
|
|
|
|
frontend_items.push(("backend", backend_path.clone()));
|
|
|
|
let frontend_perms = &[
|
|
|
|
XsPermission {
|
|
|
|
id: domid,
|
|
|
|
perms: XS_PERM_NONE,
|
|
|
|
},
|
|
|
|
XsPermission {
|
|
|
|
id: backend_domid,
|
|
|
|
perms: XS_PERM_READ,
|
|
|
|
},
|
|
|
|
];
|
|
|
|
|
|
|
|
let backend_perms = &[
|
|
|
|
XsPermission {
|
|
|
|
id: backend_domid,
|
|
|
|
perms: XS_PERM_NONE,
|
|
|
|
},
|
|
|
|
XsPermission {
|
|
|
|
id: domid,
|
|
|
|
perms: XS_PERM_READ,
|
|
|
|
},
|
|
|
|
];
|
|
|
|
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mknod(&frontend_path, frontend_perms).await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
for (p, value) in &frontend_items {
|
|
|
|
let path = format!("{}/{}", frontend_path, *p);
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(&path, value).await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
if !console_zero {
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.set_perms(&path, frontend_perms).await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
}
|
|
|
|
}
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.mknod(&backend_path, backend_perms).await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
for (p, value) in &backend_items {
|
|
|
|
let path = format!("{}/{}", backend_path, *p);
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(&path, value).await?;
|
2024-01-18 06:15:42 -08:00
|
|
|
}
|
2024-01-09 15:40:17 -08:00
|
|
|
Ok(())
|
|
|
|
}
|
2024-01-21 04:49:31 -08:00
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
pub async fn destroy(&self, domid: u32) -> Result<()> {
|
2024-02-23 04:37:53 +00:00
|
|
|
if let Err(err) = self.destroy_store(domid).await {
|
2024-02-23 03:25:06 +00:00
|
|
|
warn!("failed to destroy store for domain {}: {}", domid, err);
|
|
|
|
}
|
2024-04-02 00:56:18 +00:00
|
|
|
self.call.destroy_domain(domid).await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2024-04-02 00:56:18 +00:00
|
|
|
async fn destroy_store(&self, domid: u32) -> Result<()> {
|
2024-02-23 04:37:53 +00:00
|
|
|
let dom_path = self.store.get_domain_path(domid).await?;
|
|
|
|
let vm_path = self.store.read_string(&format!("{}/vm", dom_path)).await?;
|
|
|
|
if vm_path.is_none() {
|
2024-02-23 03:25:06 +00:00
|
|
|
return Err(Error::DomainNonExistent);
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut backend_paths: Vec<String> = Vec::new();
|
|
|
|
let console_frontend_path = format!("{}/console", dom_path);
|
|
|
|
let console_backend_path = self
|
|
|
|
.store
|
2024-02-23 04:37:53 +00:00
|
|
|
.read_string(format!("{}/backend", console_frontend_path).as_str())
|
|
|
|
.await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
|
|
|
|
for device_category in self
|
|
|
|
.store
|
2024-02-23 04:37:53 +00:00
|
|
|
.list(format!("{}/device", dom_path).as_str())
|
|
|
|
.await?
|
2024-02-23 03:25:06 +00:00
|
|
|
{
|
|
|
|
for device_id in self
|
|
|
|
.store
|
2024-02-23 04:37:53 +00:00
|
|
|
.list(format!("{}/device/{}", dom_path, device_category).as_str())
|
|
|
|
.await?
|
2024-02-23 03:25:06 +00:00
|
|
|
{
|
|
|
|
let device_path = format!("{}/device/{}/{}", dom_path, device_category, device_id);
|
2024-02-23 04:37:53 +00:00
|
|
|
let Some(backend_path) = self
|
2024-02-23 03:25:06 +00:00
|
|
|
.store
|
2024-02-23 04:37:53 +00:00
|
|
|
.read_string(format!("{}/backend", device_path).as_str())
|
|
|
|
.await?
|
|
|
|
else {
|
|
|
|
continue;
|
|
|
|
};
|
2024-02-23 03:25:06 +00:00
|
|
|
backend_paths.push(backend_path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for backend in &backend_paths {
|
|
|
|
let state_path = format!("{}/state", backend);
|
2024-03-30 03:49:13 +00:00
|
|
|
let mut watch = self.store.create_watch(&state_path).await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
let online_path = format!("{}/online", backend);
|
2024-03-07 04:14:25 -08:00
|
|
|
let tx = self.store.transaction().await?;
|
2024-02-23 04:37:53 +00:00
|
|
|
let state = tx.read_string(&state_path).await?.unwrap_or(String::new());
|
2024-02-23 03:25:06 +00:00
|
|
|
if state.is_empty() {
|
|
|
|
break;
|
|
|
|
}
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(&online_path, "0").await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
if !state.is_empty() && u32::from_str(&state).unwrap_or(0) != 6 {
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.write_string(&state_path, "5").await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
}
|
2024-03-30 03:49:13 +00:00
|
|
|
self.store.bind_watch(&watch).await?;
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.commit().await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
|
|
|
|
let mut count: u32 = 0;
|
|
|
|
loop {
|
2024-03-30 03:49:13 +00:00
|
|
|
if count >= 3 {
|
|
|
|
debug!("unable to safely destroy backend: {}", backend);
|
2024-02-23 03:25:06 +00:00
|
|
|
break;
|
|
|
|
}
|
2024-03-30 03:49:13 +00:00
|
|
|
let _ = timeout(Duration::from_secs(1), watch.receiver.recv()).await;
|
|
|
|
let state = self
|
|
|
|
.store
|
|
|
|
.read_string(&state_path)
|
|
|
|
.await?
|
|
|
|
.unwrap_or_else(|| "6".to_string());
|
2024-02-23 03:25:06 +00:00
|
|
|
let state = i64::from_str(&state).unwrap_or(-1);
|
|
|
|
if state == 6 {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
count += 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-03-07 04:14:25 -08:00
|
|
|
let tx = self.store.transaction().await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
let mut backend_removals: Vec<String> = Vec::new();
|
|
|
|
backend_removals.extend_from_slice(backend_paths.as_slice());
|
|
|
|
if let Some(backend) = console_backend_path {
|
|
|
|
backend_removals.push(backend);
|
|
|
|
}
|
|
|
|
for path in &backend_removals {
|
|
|
|
let path = PathBuf::from(path);
|
|
|
|
let parent = path.parent().ok_or(Error::PathParentNotFound)?;
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.rm(parent.to_str().ok_or(Error::PathStringConversion)?)
|
|
|
|
.await?;
|
|
|
|
}
|
|
|
|
if let Some(vm_path) = vm_path {
|
|
|
|
tx.rm(&vm_path).await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
}
|
2024-02-23 04:37:53 +00:00
|
|
|
tx.rm(&dom_path).await?;
|
|
|
|
tx.commit().await?;
|
2024-02-23 03:25:06 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2024-01-09 15:40:17 -08:00
|
|
|
}
|