On Sun, 7 Jun 2015, Wei Liu wrote:
> On Thu, Jun 04, 2015 at 12:28:15PM +0100, Stefano Stabellini wrote:
> > The device model is going to restrict its xenstore connection to $DOMID
> > level. Let it access /local/domain/0/device-model/$DOMID, as it is
> > required by QEMU to read/write the physmap. It doesn't contain any
> > information the guest is not already fully aware of.
> 
> The "0" in commit message and title need to be changed to
> LIBXL_TOOLSTACK_DOMID as well.

OK


> > 
> > Signed-off-by: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> > 
> > ---
> > Changes in v2:
> > - fix permissions to actually do what intended
> > - use LIBXL_TOOLSTACK_DOMID instead of 0
> > ---
> >  tools/libxl/libxl_dm.c |    7 ++++++-
> >  1 file changed, 6 insertions(+), 1 deletion(-)
> > 
> > diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c
> > index 79a9a22..f4f104f 100644
> > --- a/tools/libxl/libxl_dm.c
> > +++ b/tools/libxl/libxl_dm.c
> > @@ -1461,6 +1461,7 @@ void libxl__spawn_local_dm(libxl__egc *egc, 
> > libxl__dm_spawn_state *dmss)
> >      char **pass_stuff;
> >      const char *dm;
> >      int dm_state_fd = -1;
> > +    struct xs_permissions rwperm[2];
> >  
> >      if (libxl_defbool_val(b_info->device_model_stubdomain)) {
> >          abort();
> > @@ -1503,7 +1504,11 @@ void libxl__spawn_local_dm(libxl__egc *egc, 
> > libxl__dm_spawn_state *dmss)
> >      }
> >  
> >      path = libxl__device_model_xs_path(gc, LIBXL_TOOLSTACK_DOMID, domid, 
> > "");
> > -    xs_mkdir(ctx->xsh, XBT_NULL, path);
> > +    rwperm[0].id = LIBXL_TOOLSTACK_DOMID;
> > +    rwperm[0].perms = XS_PERM_NONE;
> > +    rwperm[1].id = domid;
> > +    rwperm[1].perms = XS_PERM_WRITE;
> > +    libxl__xs_mkdir(gc, XBT_NULL, path, rwperm, 2); 
> >  
> >      if (b_info->type == LIBXL_DOMAIN_TYPE_HVM &&
> >          b_info->device_model_version
> > -- 
> > 1.7.10.4
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to