1 /******************************************************************************
4 * This is the kernel equivalent of the "xs" library. We don't need everything
5 * and we use xenbus_comms for communication.
7 * Copyright (C) 2005 Rusty Russell, IBM Corporation
9 * This program is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU General Public License version 2
11 * as published by the Free Software Foundation; or, when distributed
12 * separately from the Linux kernel or incorporated into other
13 * software packages, subject to the following license:
15 * Permission is hereby granted, free of charge, to any person obtaining a copy
16 * of this source file (the "Software"), to deal in the Software without
17 * restriction, including without limitation the rights to use, copy, modify,
18 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
19 * and to permit persons to whom the Software is furnished to do so, subject to
20 * the following conditions:
22 * The above copyright notice and this permission notice shall be included in
23 * all copies or substantial portions of the Software.
25 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
26 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
27 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
28 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
29 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
30 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
34 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
36 #include <linux/unistd.h>
37 #include <linux/errno.h>
38 #include <linux/types.h>
39 #include <linux/uio.h>
40 #include <linux/kernel.h>
41 #include <linux/string.h>
42 #include <linux/err.h>
43 #include <linux/slab.h>
44 #include <linux/fcntl.h>
45 #include <linux/kthread.h>
46 #include <linux/rwsem.h>
47 #include <linux/mutex.h>
48 #include <asm/xen/hypervisor.h>
49 #include <xen/xenbus.h>
51 #include "xenbus_comms.h"
52 #include "xenbus_probe.h"
54 struct xs_stored_msg
{
55 struct list_head list
;
57 struct xsd_sockmsg hdr
;
65 /* Queued watch events. */
67 struct xenbus_watch
*handle
;
69 unsigned int vec_size
;
75 /* A list of replies. Currently only one will ever be outstanding. */
76 struct list_head reply_list
;
77 spinlock_t reply_lock
;
78 wait_queue_head_t reply_waitq
;
81 * Mutex ordering: transaction_mutex -> watch_mutex -> request_mutex.
82 * response_mutex is never taken simultaneously with the other three.
84 * transaction_mutex must be held before incrementing
85 * transaction_count. The mutex is held when a suspend is in
86 * progress to prevent new transactions starting.
88 * When decrementing transaction_count to zero the wait queue
89 * should be woken up, the suspend code waits for count to
93 /* One request at a time. */
94 struct mutex request_mutex
;
96 /* Protect xenbus reader thread against save/restore. */
97 struct mutex response_mutex
;
99 /* Protect transactions against save/restore. */
100 struct mutex transaction_mutex
;
101 atomic_t transaction_count
;
102 wait_queue_head_t transaction_wq
;
104 /* Protect watch (de)register against save/restore. */
105 struct rw_semaphore watch_mutex
;
108 static struct xs_handle xs_state
;
110 /* List of registered watches, and a lock to protect it. */
111 static LIST_HEAD(watches
);
112 static DEFINE_SPINLOCK(watches_lock
);
114 /* List of pending watch callback events, and a lock to protect it. */
115 static LIST_HEAD(watch_events
);
116 static DEFINE_SPINLOCK(watch_events_lock
);
119 * Details of the xenwatch callback kernel thread. The thread waits on the
120 * watch_events_waitq for work to do (queued on watch_events list). When it
121 * wakes up it acquires the xenwatch_mutex before reading the list and
124 static pid_t xenwatch_pid
;
125 static DEFINE_MUTEX(xenwatch_mutex
);
126 static DECLARE_WAIT_QUEUE_HEAD(watch_events_waitq
);
128 static int get_error(const char *errorstring
)
132 for (i
= 0; strcmp(errorstring
, xsd_errors
[i
].errstring
) != 0; i
++) {
133 if (i
== ARRAY_SIZE(xsd_errors
) - 1) {
134 pr_warn("xen store gave: unknown error %s\n",
139 return xsd_errors
[i
].errnum
;
142 static bool xenbus_ok(void)
144 switch (xen_store_domain_type
) {
146 switch (system_state
) {
147 case SYSTEM_POWER_OFF
:
157 /* FIXME: Could check that the remote domain is alive,
158 * but it is normally initial domain. */
165 static void *read_reply(enum xsd_sockmsg_type
*type
, unsigned int *len
)
167 struct xs_stored_msg
*msg
;
170 spin_lock(&xs_state
.reply_lock
);
172 while (list_empty(&xs_state
.reply_list
)) {
173 spin_unlock(&xs_state
.reply_lock
);
175 /* XXX FIXME: Avoid synchronous wait for response here. */
176 wait_event_timeout(xs_state
.reply_waitq
,
177 !list_empty(&xs_state
.reply_list
),
178 msecs_to_jiffies(500));
181 * If we are in the process of being shut-down there is
182 * no point of trying to contact XenBus - it is either
183 * killed (xenstored application) or the other domain
184 * has been killed or is unreachable.
186 return ERR_PTR(-EIO
);
188 spin_lock(&xs_state
.reply_lock
);
191 msg
= list_entry(xs_state
.reply_list
.next
,
192 struct xs_stored_msg
, list
);
193 list_del(&msg
->list
);
195 spin_unlock(&xs_state
.reply_lock
);
197 *type
= msg
->hdr
.type
;
200 body
= msg
->u
.reply
.body
;
207 static void transaction_start(void)
209 mutex_lock(&xs_state
.transaction_mutex
);
210 atomic_inc(&xs_state
.transaction_count
);
211 mutex_unlock(&xs_state
.transaction_mutex
);
214 static void transaction_end(void)
216 if (atomic_dec_and_test(&xs_state
.transaction_count
))
217 wake_up(&xs_state
.transaction_wq
);
220 static void transaction_suspend(void)
222 mutex_lock(&xs_state
.transaction_mutex
);
223 wait_event(xs_state
.transaction_wq
,
224 atomic_read(&xs_state
.transaction_count
) == 0);
227 static void transaction_resume(void)
229 mutex_unlock(&xs_state
.transaction_mutex
);
232 void *xenbus_dev_request_and_reply(struct xsd_sockmsg
*msg
)
235 struct xsd_sockmsg req_msg
= *msg
;
238 if (req_msg
.type
== XS_TRANSACTION_START
)
241 mutex_lock(&xs_state
.request_mutex
);
243 err
= xb_write(msg
, sizeof(*msg
) + msg
->len
);
245 msg
->type
= XS_ERROR
;
248 ret
= read_reply(&msg
->type
, &msg
->len
);
250 mutex_unlock(&xs_state
.request_mutex
);
255 if ((msg
->type
== XS_TRANSACTION_END
) ||
256 ((req_msg
.type
== XS_TRANSACTION_START
) &&
257 (msg
->type
== XS_ERROR
)))
262 EXPORT_SYMBOL(xenbus_dev_request_and_reply
);
264 /* Send message to xs, get kmalloc'ed reply. ERR_PTR() on error. */
265 static void *xs_talkv(struct xenbus_transaction t
,
266 enum xsd_sockmsg_type type
,
267 const struct kvec
*iovec
,
268 unsigned int num_vecs
,
271 struct xsd_sockmsg msg
;
280 for (i
= 0; i
< num_vecs
; i
++)
281 msg
.len
+= iovec
[i
].iov_len
;
283 mutex_lock(&xs_state
.request_mutex
);
285 err
= xb_write(&msg
, sizeof(msg
));
287 mutex_unlock(&xs_state
.request_mutex
);
291 for (i
= 0; i
< num_vecs
; i
++) {
292 err
= xb_write(iovec
[i
].iov_base
, iovec
[i
].iov_len
);
294 mutex_unlock(&xs_state
.request_mutex
);
299 ret
= read_reply(&msg
.type
, len
);
301 mutex_unlock(&xs_state
.request_mutex
);
306 if (msg
.type
== XS_ERROR
) {
307 err
= get_error(ret
);
309 return ERR_PTR(-err
);
312 if (msg
.type
!= type
) {
313 pr_warn_ratelimited("unexpected type [%d], expected [%d]\n",
316 return ERR_PTR(-EINVAL
);
321 /* Simplified version of xs_talkv: single message. */
322 static void *xs_single(struct xenbus_transaction t
,
323 enum xsd_sockmsg_type type
,
329 iovec
.iov_base
= (void *)string
;
330 iovec
.iov_len
= strlen(string
) + 1;
331 return xs_talkv(t
, type
, &iovec
, 1, len
);
334 /* Many commands only need an ack, don't care what it says. */
335 static int xs_error(char *reply
)
338 return PTR_ERR(reply
);
343 static unsigned int count_strings(const char *strings
, unsigned int len
)
348 for (p
= strings
, num
= 0; p
< strings
+ len
; p
+= strlen(p
) + 1)
354 /* Return the path to dir with /name appended. Buffer must be kfree()'ed. */
355 static char *join(const char *dir
, const char *name
)
359 if (strlen(name
) == 0)
360 buffer
= kasprintf(GFP_NOIO
| __GFP_HIGH
, "%s", dir
);
362 buffer
= kasprintf(GFP_NOIO
| __GFP_HIGH
, "%s/%s", dir
, name
);
363 return (!buffer
) ? ERR_PTR(-ENOMEM
) : buffer
;
366 static char **split(char *strings
, unsigned int len
, unsigned int *num
)
370 /* Count the strings. */
371 *num
= count_strings(strings
, len
);
373 /* Transfer to one big alloc for easy freeing. */
374 ret
= kmalloc(*num
* sizeof(char *) + len
, GFP_NOIO
| __GFP_HIGH
);
377 return ERR_PTR(-ENOMEM
);
379 memcpy(&ret
[*num
], strings
, len
);
382 strings
= (char *)&ret
[*num
];
383 for (p
= strings
, *num
= 0; p
< strings
+ len
; p
+= strlen(p
) + 1)
389 char **xenbus_directory(struct xenbus_transaction t
,
390 const char *dir
, const char *node
, unsigned int *num
)
392 char *strings
, *path
;
395 path
= join(dir
, node
);
397 return (char **)path
;
399 strings
= xs_single(t
, XS_DIRECTORY
, path
, &len
);
402 return (char **)strings
;
404 return split(strings
, len
, num
);
406 EXPORT_SYMBOL_GPL(xenbus_directory
);
408 /* Check if a path exists. Return 1 if it does. */
409 int xenbus_exists(struct xenbus_transaction t
,
410 const char *dir
, const char *node
)
415 d
= xenbus_directory(t
, dir
, node
, &dir_n
);
421 EXPORT_SYMBOL_GPL(xenbus_exists
);
423 /* Get the value of a single file.
424 * Returns a kmalloced value: call free() on it after use.
425 * len indicates length in bytes.
427 void *xenbus_read(struct xenbus_transaction t
,
428 const char *dir
, const char *node
, unsigned int *len
)
433 path
= join(dir
, node
);
437 ret
= xs_single(t
, XS_READ
, path
, len
);
441 EXPORT_SYMBOL_GPL(xenbus_read
);
443 /* Write the value of a single file.
444 * Returns -err on failure.
446 int xenbus_write(struct xenbus_transaction t
,
447 const char *dir
, const char *node
, const char *string
)
450 struct kvec iovec
[2];
453 path
= join(dir
, node
);
455 return PTR_ERR(path
);
457 iovec
[0].iov_base
= (void *)path
;
458 iovec
[0].iov_len
= strlen(path
) + 1;
459 iovec
[1].iov_base
= (void *)string
;
460 iovec
[1].iov_len
= strlen(string
);
462 ret
= xs_error(xs_talkv(t
, XS_WRITE
, iovec
, ARRAY_SIZE(iovec
), NULL
));
466 EXPORT_SYMBOL_GPL(xenbus_write
);
468 /* Create a new directory. */
469 int xenbus_mkdir(struct xenbus_transaction t
,
470 const char *dir
, const char *node
)
475 path
= join(dir
, node
);
477 return PTR_ERR(path
);
479 ret
= xs_error(xs_single(t
, XS_MKDIR
, path
, NULL
));
483 EXPORT_SYMBOL_GPL(xenbus_mkdir
);
485 /* Destroy a file or directory (directories must be empty). */
486 int xenbus_rm(struct xenbus_transaction t
, const char *dir
, const char *node
)
491 path
= join(dir
, node
);
493 return PTR_ERR(path
);
495 ret
= xs_error(xs_single(t
, XS_RM
, path
, NULL
));
499 EXPORT_SYMBOL_GPL(xenbus_rm
);
501 /* Start a transaction: changes by others will not be seen during this
502 * transaction, and changes will not be visible to others until end.
504 int xenbus_transaction_start(struct xenbus_transaction
*t
)
510 id_str
= xs_single(XBT_NIL
, XS_TRANSACTION_START
, "", NULL
);
511 if (IS_ERR(id_str
)) {
513 return PTR_ERR(id_str
);
516 t
->id
= simple_strtoul(id_str
, NULL
, 0);
520 EXPORT_SYMBOL_GPL(xenbus_transaction_start
);
522 /* End a transaction.
523 * If abandon is true, transaction is discarded instead of committed.
525 int xenbus_transaction_end(struct xenbus_transaction t
, int abort
)
531 strcpy(abortstr
, "F");
533 strcpy(abortstr
, "T");
535 err
= xs_error(xs_single(t
, XS_TRANSACTION_END
, abortstr
, NULL
));
541 EXPORT_SYMBOL_GPL(xenbus_transaction_end
);
543 /* Single read and scanf: returns -errno or num scanned. */
544 int xenbus_scanf(struct xenbus_transaction t
,
545 const char *dir
, const char *node
, const char *fmt
, ...)
551 val
= xenbus_read(t
, dir
, node
, NULL
);
556 ret
= vsscanf(val
, fmt
, ap
);
559 /* Distinctive errno. */
564 EXPORT_SYMBOL_GPL(xenbus_scanf
);
566 /* Single printf and write: returns -errno or 0. */
567 int xenbus_printf(struct xenbus_transaction t
,
568 const char *dir
, const char *node
, const char *fmt
, ...)
575 buf
= kvasprintf(GFP_NOIO
| __GFP_HIGH
, fmt
, ap
);
581 ret
= xenbus_write(t
, dir
, node
, buf
);
587 EXPORT_SYMBOL_GPL(xenbus_printf
);
589 /* Takes tuples of names, scanf-style args, and void **, NULL terminated. */
590 int xenbus_gather(struct xenbus_transaction t
, const char *dir
, ...)
597 while (ret
== 0 && (name
= va_arg(ap
, char *)) != NULL
) {
598 const char *fmt
= va_arg(ap
, char *);
599 void *result
= va_arg(ap
, void *);
602 p
= xenbus_read(t
, dir
, name
, NULL
);
608 if (sscanf(p
, fmt
, result
) == 0)
612 *(char **)result
= p
;
617 EXPORT_SYMBOL_GPL(xenbus_gather
);
619 static int xs_watch(const char *path
, const char *token
)
623 iov
[0].iov_base
= (void *)path
;
624 iov
[0].iov_len
= strlen(path
) + 1;
625 iov
[1].iov_base
= (void *)token
;
626 iov
[1].iov_len
= strlen(token
) + 1;
628 return xs_error(xs_talkv(XBT_NIL
, XS_WATCH
, iov
,
629 ARRAY_SIZE(iov
), NULL
));
632 static int xs_unwatch(const char *path
, const char *token
)
636 iov
[0].iov_base
= (char *)path
;
637 iov
[0].iov_len
= strlen(path
) + 1;
638 iov
[1].iov_base
= (char *)token
;
639 iov
[1].iov_len
= strlen(token
) + 1;
641 return xs_error(xs_talkv(XBT_NIL
, XS_UNWATCH
, iov
,
642 ARRAY_SIZE(iov
), NULL
));
645 static struct xenbus_watch
*find_watch(const char *token
)
647 struct xenbus_watch
*i
, *cmp
;
649 cmp
= (void *)simple_strtoul(token
, NULL
, 16);
651 list_for_each_entry(i
, &watches
, list
)
658 * Certain older XenBus toolstack cannot handle reading values that are
659 * not populated. Some Xen 3.4 installation are incapable of doing this
660 * so if we are running on anything older than 4 do not attempt to read
661 * control/platform-feature-xs_reset_watches.
663 static bool xen_strict_xenbus_quirk(void)
666 uint32_t eax
, ebx
, ecx
, edx
, base
;
668 base
= xen_cpuid_base();
669 cpuid(base
+ 1, &eax
, &ebx
, &ecx
, &edx
);
677 static void xs_reset_watches(void)
679 int err
, supported
= 0;
681 if (!xen_hvm_domain() || xen_initial_domain())
684 if (xen_strict_xenbus_quirk())
687 err
= xenbus_scanf(XBT_NIL
, "control",
688 "platform-feature-xs_reset_watches", "%d", &supported
);
689 if (err
!= 1 || !supported
)
692 err
= xs_error(xs_single(XBT_NIL
, XS_RESET_WATCHES
, "", NULL
));
693 if (err
&& err
!= -EEXIST
)
694 pr_warn("xs_reset_watches failed: %d\n", err
);
697 /* Register callback to watch this node. */
698 int register_xenbus_watch(struct xenbus_watch
*watch
)
700 /* Pointer in ascii is the token. */
701 char token
[sizeof(watch
) * 2 + 1];
704 sprintf(token
, "%lX", (long)watch
);
706 down_read(&xs_state
.watch_mutex
);
708 spin_lock(&watches_lock
);
709 BUG_ON(find_watch(token
));
710 list_add(&watch
->list
, &watches
);
711 spin_unlock(&watches_lock
);
713 err
= xs_watch(watch
->node
, token
);
716 spin_lock(&watches_lock
);
717 list_del(&watch
->list
);
718 spin_unlock(&watches_lock
);
721 up_read(&xs_state
.watch_mutex
);
725 EXPORT_SYMBOL_GPL(register_xenbus_watch
);
727 void unregister_xenbus_watch(struct xenbus_watch
*watch
)
729 struct xs_stored_msg
*msg
, *tmp
;
730 char token
[sizeof(watch
) * 2 + 1];
733 sprintf(token
, "%lX", (long)watch
);
735 down_read(&xs_state
.watch_mutex
);
737 spin_lock(&watches_lock
);
738 BUG_ON(!find_watch(token
));
739 list_del(&watch
->list
);
740 spin_unlock(&watches_lock
);
742 err
= xs_unwatch(watch
->node
, token
);
744 pr_warn("Failed to release watch %s: %i\n", watch
->node
, err
);
746 up_read(&xs_state
.watch_mutex
);
748 /* Make sure there are no callbacks running currently (unless
750 if (current
->pid
!= xenwatch_pid
)
751 mutex_lock(&xenwatch_mutex
);
753 /* Cancel pending watch events. */
754 spin_lock(&watch_events_lock
);
755 list_for_each_entry_safe(msg
, tmp
, &watch_events
, list
) {
756 if (msg
->u
.watch
.handle
!= watch
)
758 list_del(&msg
->list
);
759 kfree(msg
->u
.watch
.vec
);
762 spin_unlock(&watch_events_lock
);
764 if (current
->pid
!= xenwatch_pid
)
765 mutex_unlock(&xenwatch_mutex
);
767 EXPORT_SYMBOL_GPL(unregister_xenbus_watch
);
769 void xs_suspend(void)
771 transaction_suspend();
772 down_write(&xs_state
.watch_mutex
);
773 mutex_lock(&xs_state
.request_mutex
);
774 mutex_lock(&xs_state
.response_mutex
);
779 struct xenbus_watch
*watch
;
780 char token
[sizeof(watch
) * 2 + 1];
784 mutex_unlock(&xs_state
.response_mutex
);
785 mutex_unlock(&xs_state
.request_mutex
);
786 transaction_resume();
788 /* No need for watches_lock: the watch_mutex is sufficient. */
789 list_for_each_entry(watch
, &watches
, list
) {
790 sprintf(token
, "%lX", (long)watch
);
791 xs_watch(watch
->node
, token
);
794 up_write(&xs_state
.watch_mutex
);
797 void xs_suspend_cancel(void)
799 mutex_unlock(&xs_state
.response_mutex
);
800 mutex_unlock(&xs_state
.request_mutex
);
801 up_write(&xs_state
.watch_mutex
);
802 mutex_unlock(&xs_state
.transaction_mutex
);
805 static int xenwatch_thread(void *unused
)
807 struct list_head
*ent
;
808 struct xs_stored_msg
*msg
;
811 wait_event_interruptible(watch_events_waitq
,
812 !list_empty(&watch_events
));
814 if (kthread_should_stop())
817 mutex_lock(&xenwatch_mutex
);
819 spin_lock(&watch_events_lock
);
820 ent
= watch_events
.next
;
821 if (ent
!= &watch_events
)
823 spin_unlock(&watch_events_lock
);
825 if (ent
!= &watch_events
) {
826 msg
= list_entry(ent
, struct xs_stored_msg
, list
);
827 msg
->u
.watch
.handle
->callback(
829 (const char **)msg
->u
.watch
.vec
,
830 msg
->u
.watch
.vec_size
);
831 kfree(msg
->u
.watch
.vec
);
835 mutex_unlock(&xenwatch_mutex
);
841 static int process_msg(void)
843 struct xs_stored_msg
*msg
;
848 * We must disallow save/restore while reading a xenstore message.
849 * A partial read across s/r leaves us out of sync with xenstored.
852 err
= xb_wait_for_data_to_read();
855 mutex_lock(&xs_state
.response_mutex
);
856 if (xb_data_to_read())
858 /* We raced with save/restore: pending data 'disappeared'. */
859 mutex_unlock(&xs_state
.response_mutex
);
863 msg
= kmalloc(sizeof(*msg
), GFP_NOIO
| __GFP_HIGH
);
869 err
= xb_read(&msg
->hdr
, sizeof(msg
->hdr
));
875 if (msg
->hdr
.len
> XENSTORE_PAYLOAD_MAX
) {
881 body
= kmalloc(msg
->hdr
.len
+ 1, GFP_NOIO
| __GFP_HIGH
);
888 err
= xb_read(body
, msg
->hdr
.len
);
894 body
[msg
->hdr
.len
] = '\0';
896 if (msg
->hdr
.type
== XS_WATCH_EVENT
) {
897 msg
->u
.watch
.vec
= split(body
, msg
->hdr
.len
,
898 &msg
->u
.watch
.vec_size
);
899 if (IS_ERR(msg
->u
.watch
.vec
)) {
900 err
= PTR_ERR(msg
->u
.watch
.vec
);
905 spin_lock(&watches_lock
);
906 msg
->u
.watch
.handle
= find_watch(
907 msg
->u
.watch
.vec
[XS_WATCH_TOKEN
]);
908 if (msg
->u
.watch
.handle
!= NULL
) {
909 spin_lock(&watch_events_lock
);
910 list_add_tail(&msg
->list
, &watch_events
);
911 wake_up(&watch_events_waitq
);
912 spin_unlock(&watch_events_lock
);
914 kfree(msg
->u
.watch
.vec
);
917 spin_unlock(&watches_lock
);
919 msg
->u
.reply
.body
= body
;
920 spin_lock(&xs_state
.reply_lock
);
921 list_add_tail(&msg
->list
, &xs_state
.reply_list
);
922 spin_unlock(&xs_state
.reply_lock
);
923 wake_up(&xs_state
.reply_waitq
);
927 mutex_unlock(&xs_state
.response_mutex
);
931 static int xenbus_thread(void *unused
)
938 pr_warn("error %d while reading message\n", err
);
939 if (kthread_should_stop())
949 struct task_struct
*task
;
951 INIT_LIST_HEAD(&xs_state
.reply_list
);
952 spin_lock_init(&xs_state
.reply_lock
);
953 init_waitqueue_head(&xs_state
.reply_waitq
);
955 mutex_init(&xs_state
.request_mutex
);
956 mutex_init(&xs_state
.response_mutex
);
957 mutex_init(&xs_state
.transaction_mutex
);
958 init_rwsem(&xs_state
.watch_mutex
);
959 atomic_set(&xs_state
.transaction_count
, 0);
960 init_waitqueue_head(&xs_state
.transaction_wq
);
962 /* Initialize the shared memory rings to talk to xenstored */
963 err
= xb_init_comms();
967 task
= kthread_run(xenwatch_thread
, NULL
, "xenwatch");
969 return PTR_ERR(task
);
970 xenwatch_pid
= task
->pid
;
972 task
= kthread_run(xenbus_thread
, NULL
, "xenbus");
974 return PTR_ERR(task
);
976 /* shutdown watches for kexec boot */