]>
Commit | Line | Data |
---|---|---|
024b7d6a | 1 | // SPDX-License-Identifier: GPL-2.0-only |
868eb122 SS |
2 | /* |
3 | * linux/fs/9p/trans_xen | |
4 | * | |
5 | * Xen transport layer. | |
6 | * | |
7 | * Copyright (C) 2017 by Stefano Stabellini <stefano@aporeto.com> | |
868eb122 SS |
8 | */ |
9 | ||
10 | #include <xen/events.h> | |
11 | #include <xen/grant_table.h> | |
12 | #include <xen/xen.h> | |
13 | #include <xen/xenbus.h> | |
14 | #include <xen/interface/io/9pfs.h> | |
15 | ||
16 | #include <linux/module.h> | |
71ebd719 | 17 | #include <linux/spinlock.h> |
868eb122 SS |
18 | #include <net/9p/9p.h> |
19 | #include <net/9p/client.h> | |
20 | #include <net/9p/transport.h> | |
21 | ||
71ebd719 | 22 | #define XEN_9PFS_NUM_RINGS 2 |
36f99675 SS |
23 | #define XEN_9PFS_RING_ORDER 9 |
24 | #define XEN_9PFS_RING_SIZE(ring) XEN_FLEX_RING_SIZE(ring->intf->ring_order) | |
71ebd719 SS |
25 | |
26 | struct xen_9pfs_header { | |
27 | uint32_t size; | |
28 | uint8_t id; | |
29 | uint16_t tag; | |
30 | ||
31 | /* uint8_t sdata[]; */ | |
32 | } __attribute__((packed)); | |
33 | ||
34 | /* One per ring, more than one per 9pfs share */ | |
35 | struct xen_9pfs_dataring { | |
36 | struct xen_9pfs_front_priv *priv; | |
37 | ||
38 | struct xen_9pfs_data_intf *intf; | |
39 | grant_ref_t ref; | |
40 | int evtchn; | |
41 | int irq; | |
42 | /* protect a ring from concurrent accesses */ | |
43 | spinlock_t lock; | |
44 | ||
45 | struct xen_9pfs_data data; | |
46 | wait_queue_head_t wq; | |
47 | struct work_struct work; | |
48 | }; | |
49 | ||
50 | /* One per 9pfs share */ | |
51 | struct xen_9pfs_front_priv { | |
52 | struct list_head list; | |
53 | struct xenbus_device *dev; | |
54 | char *tag; | |
55 | struct p9_client *client; | |
56 | ||
57 | int num_rings; | |
58 | struct xen_9pfs_dataring *rings; | |
59 | }; | |
60 | ||
61 | static LIST_HEAD(xen_9pfs_devs); | |
62 | static DEFINE_RWLOCK(xen_9pfs_lock); | |
63 | ||
f023f18d | 64 | /* We don't currently allow canceling of requests */ |
868eb122 SS |
65 | static int p9_xen_cancel(struct p9_client *client, struct p9_req_t *req) |
66 | { | |
f023f18d | 67 | return 1; |
868eb122 SS |
68 | } |
69 | ||
70 | static int p9_xen_create(struct p9_client *client, const char *addr, char *args) | |
71 | { | |
f023f18d SS |
72 | struct xen_9pfs_front_priv *priv; |
73 | ||
10aa1452 TB |
74 | if (addr == NULL) |
75 | return -EINVAL; | |
76 | ||
f023f18d SS |
77 | read_lock(&xen_9pfs_lock); |
78 | list_for_each_entry(priv, &xen_9pfs_devs, list) { | |
79 | if (!strcmp(priv->tag, addr)) { | |
80 | priv->client = client; | |
81 | read_unlock(&xen_9pfs_lock); | |
82 | return 0; | |
83 | } | |
84 | } | |
85 | read_unlock(&xen_9pfs_lock); | |
86 | return -EINVAL; | |
868eb122 SS |
87 | } |
88 | ||
89 | static void p9_xen_close(struct p9_client *client) | |
90 | { | |
f023f18d SS |
91 | struct xen_9pfs_front_priv *priv; |
92 | ||
93 | read_lock(&xen_9pfs_lock); | |
94 | list_for_each_entry(priv, &xen_9pfs_devs, list) { | |
95 | if (priv->client == client) { | |
96 | priv->client = NULL; | |
97 | read_unlock(&xen_9pfs_lock); | |
98 | return; | |
99 | } | |
100 | } | |
101 | read_unlock(&xen_9pfs_lock); | |
102 | } | |
103 | ||
104 | static bool p9_xen_write_todo(struct xen_9pfs_dataring *ring, RING_IDX size) | |
105 | { | |
106 | RING_IDX cons, prod; | |
107 | ||
108 | cons = ring->intf->out_cons; | |
109 | prod = ring->intf->out_prod; | |
110 | virt_mb(); | |
111 | ||
36f99675 SS |
112 | return XEN_9PFS_RING_SIZE(ring) - |
113 | xen_9pfs_queued(prod, cons, XEN_9PFS_RING_SIZE(ring)) >= size; | |
868eb122 SS |
114 | } |
115 | ||
116 | static int p9_xen_request(struct p9_client *client, struct p9_req_t *p9_req) | |
117 | { | |
732b33d0 | 118 | struct xen_9pfs_front_priv *priv; |
f023f18d SS |
119 | RING_IDX cons, prod, masked_cons, masked_prod; |
120 | unsigned long flags; | |
523adb6c | 121 | u32 size = p9_req->tc.size; |
f023f18d SS |
122 | struct xen_9pfs_dataring *ring; |
123 | int num; | |
124 | ||
125 | read_lock(&xen_9pfs_lock); | |
126 | list_for_each_entry(priv, &xen_9pfs_devs, list) { | |
127 | if (priv->client == client) | |
128 | break; | |
129 | } | |
130 | read_unlock(&xen_9pfs_lock); | |
732b33d0 | 131 | if (list_entry_is_head(priv, &xen_9pfs_devs, list)) |
f023f18d SS |
132 | return -EINVAL; |
133 | ||
523adb6c | 134 | num = p9_req->tc.tag % priv->num_rings; |
f023f18d SS |
135 | ring = &priv->rings[num]; |
136 | ||
137 | again: | |
9523feac TT |
138 | while (wait_event_killable(ring->wq, |
139 | p9_xen_write_todo(ring, size)) != 0) | |
f023f18d SS |
140 | ; |
141 | ||
142 | spin_lock_irqsave(&ring->lock, flags); | |
143 | cons = ring->intf->out_cons; | |
144 | prod = ring->intf->out_prod; | |
145 | virt_mb(); | |
146 | ||
36f99675 SS |
147 | if (XEN_9PFS_RING_SIZE(ring) - |
148 | xen_9pfs_queued(prod, cons, XEN_9PFS_RING_SIZE(ring)) < size) { | |
f023f18d SS |
149 | spin_unlock_irqrestore(&ring->lock, flags); |
150 | goto again; | |
151 | } | |
152 | ||
36f99675 SS |
153 | masked_prod = xen_9pfs_mask(prod, XEN_9PFS_RING_SIZE(ring)); |
154 | masked_cons = xen_9pfs_mask(cons, XEN_9PFS_RING_SIZE(ring)); | |
f023f18d | 155 | |
523adb6c | 156 | xen_9pfs_write_packet(ring->data.out, p9_req->tc.sdata, size, |
36f99675 SS |
157 | &masked_prod, masked_cons, |
158 | XEN_9PFS_RING_SIZE(ring)); | |
f023f18d SS |
159 | |
160 | p9_req->status = REQ_STATUS_SENT; | |
161 | virt_wmb(); /* write ring before updating pointer */ | |
162 | prod += size; | |
163 | ring->intf->out_prod = prod; | |
164 | spin_unlock_irqrestore(&ring->lock, flags); | |
165 | notify_remote_via_irq(ring->irq); | |
728356de | 166 | p9_req_put(p9_req); |
f023f18d | 167 | |
868eb122 SS |
168 | return 0; |
169 | } | |
170 | ||
71ebd719 SS |
171 | static void p9_xen_response(struct work_struct *work) |
172 | { | |
f66c72be SS |
173 | struct xen_9pfs_front_priv *priv; |
174 | struct xen_9pfs_dataring *ring; | |
175 | RING_IDX cons, prod, masked_cons, masked_prod; | |
176 | struct xen_9pfs_header h; | |
177 | struct p9_req_t *req; | |
178 | int status; | |
179 | ||
180 | ring = container_of(work, struct xen_9pfs_dataring, work); | |
181 | priv = ring->priv; | |
182 | ||
183 | while (1) { | |
184 | cons = ring->intf->in_cons; | |
185 | prod = ring->intf->in_prod; | |
186 | virt_rmb(); | |
187 | ||
36f99675 | 188 | if (xen_9pfs_queued(prod, cons, XEN_9PFS_RING_SIZE(ring)) < |
f66c72be SS |
189 | sizeof(h)) { |
190 | notify_remote_via_irq(ring->irq); | |
191 | return; | |
192 | } | |
193 | ||
36f99675 SS |
194 | masked_prod = xen_9pfs_mask(prod, XEN_9PFS_RING_SIZE(ring)); |
195 | masked_cons = xen_9pfs_mask(cons, XEN_9PFS_RING_SIZE(ring)); | |
f66c72be SS |
196 | |
197 | /* First, read just the header */ | |
198 | xen_9pfs_read_packet(&h, ring->data.in, sizeof(h), | |
199 | masked_prod, &masked_cons, | |
36f99675 | 200 | XEN_9PFS_RING_SIZE(ring)); |
f66c72be SS |
201 | |
202 | req = p9_tag_lookup(priv->client, h.tag); | |
203 | if (!req || req->status != REQ_STATUS_SENT) { | |
204 | dev_warn(&priv->dev->dev, "Wrong req tag=%x\n", h.tag); | |
205 | cons += h.size; | |
206 | virt_mb(); | |
207 | ring->intf->in_cons = cons; | |
208 | continue; | |
209 | } | |
210 | ||
523adb6c DM |
211 | memcpy(&req->rc, &h, sizeof(h)); |
212 | req->rc.offset = 0; | |
f66c72be | 213 | |
36f99675 | 214 | masked_cons = xen_9pfs_mask(cons, XEN_9PFS_RING_SIZE(ring)); |
f66c72be | 215 | /* Then, read the whole packet (including the header) */ |
523adb6c | 216 | xen_9pfs_read_packet(req->rc.sdata, ring->data.in, h.size, |
f66c72be | 217 | masked_prod, &masked_cons, |
36f99675 | 218 | XEN_9PFS_RING_SIZE(ring)); |
f66c72be SS |
219 | |
220 | virt_mb(); | |
221 | cons += h.size; | |
222 | ring->intf->in_cons = cons; | |
223 | ||
224 | status = (req->status != REQ_STATUS_ERROR) ? | |
225 | REQ_STATUS_RCVD : REQ_STATUS_ERROR; | |
226 | ||
227 | p9_client_cb(priv->client, req, status); | |
228 | } | |
71ebd719 SS |
229 | } |
230 | ||
231 | static irqreturn_t xen_9pfs_front_event_handler(int irq, void *r) | |
232 | { | |
233 | struct xen_9pfs_dataring *ring = r; | |
234 | ||
235 | if (!ring || !ring->priv->client) { | |
236 | /* ignore spurious interrupt */ | |
237 | return IRQ_HANDLED; | |
238 | } | |
239 | ||
240 | wake_up_interruptible(&ring->wq); | |
241 | schedule_work(&ring->work); | |
242 | ||
243 | return IRQ_HANDLED; | |
244 | } | |
245 | ||
868eb122 SS |
246 | static struct p9_trans_module p9_xen_trans = { |
247 | .name = "xen", | |
36f99675 | 248 | .maxsize = 1 << (XEN_9PFS_RING_ORDER + XEN_PAGE_SHIFT - 2), |
868eb122 SS |
249 | .def = 1, |
250 | .create = p9_xen_create, | |
251 | .close = p9_xen_close, | |
252 | .request = p9_xen_request, | |
253 | .cancel = p9_xen_cancel, | |
254 | .owner = THIS_MODULE, | |
255 | }; | |
256 | ||
257 | static const struct xenbus_device_id xen_9pfs_front_ids[] = { | |
258 | { "9pfs" }, | |
259 | { "" } | |
260 | }; | |
261 | ||
71ebd719 SS |
262 | static void xen_9pfs_front_free(struct xen_9pfs_front_priv *priv) |
263 | { | |
264 | int i, j; | |
265 | ||
266 | write_lock(&xen_9pfs_lock); | |
267 | list_del(&priv->list); | |
268 | write_unlock(&xen_9pfs_lock); | |
269 | ||
270 | for (i = 0; i < priv->num_rings; i++) { | |
271 | if (!priv->rings[i].intf) | |
272 | break; | |
273 | if (priv->rings[i].irq > 0) | |
274 | unbind_from_irqhandler(priv->rings[i].irq, priv->dev); | |
275 | if (priv->rings[i].data.in) { | |
36f99675 SS |
276 | for (j = 0; |
277 | j < (1 << priv->rings[i].intf->ring_order); | |
278 | j++) { | |
71ebd719 SS |
279 | grant_ref_t ref; |
280 | ||
281 | ref = priv->rings[i].intf->ref[j]; | |
49f8b459 | 282 | gnttab_end_foreign_access(ref, NULL); |
71ebd719 | 283 | } |
5cadd4bb JG |
284 | free_pages_exact(priv->rings[i].data.in, |
285 | 1UL << (priv->rings[i].intf->ring_order + | |
286 | XEN_PAGE_SHIFT)); | |
71ebd719 | 287 | } |
49f8b459 | 288 | gnttab_end_foreign_access(priv->rings[i].ref, NULL); |
71ebd719 SS |
289 | free_page((unsigned long)priv->rings[i].intf); |
290 | } | |
291 | kfree(priv->rings); | |
292 | kfree(priv->tag); | |
293 | kfree(priv); | |
294 | } | |
295 | ||
868eb122 SS |
296 | static int xen_9pfs_front_remove(struct xenbus_device *dev) |
297 | { | |
71ebd719 SS |
298 | struct xen_9pfs_front_priv *priv = dev_get_drvdata(&dev->dev); |
299 | ||
300 | dev_set_drvdata(&dev->dev, NULL); | |
301 | xen_9pfs_front_free(priv); | |
868eb122 SS |
302 | return 0; |
303 | } | |
304 | ||
71ebd719 | 305 | static int xen_9pfs_front_alloc_dataring(struct xenbus_device *dev, |
36f99675 SS |
306 | struct xen_9pfs_dataring *ring, |
307 | unsigned int order) | |
71ebd719 SS |
308 | { |
309 | int i = 0; | |
310 | int ret = -ENOMEM; | |
311 | void *bytes = NULL; | |
312 | ||
313 | init_waitqueue_head(&ring->wq); | |
314 | spin_lock_init(&ring->lock); | |
315 | INIT_WORK(&ring->work, p9_xen_response); | |
316 | ||
317 | ring->intf = (struct xen_9pfs_data_intf *)get_zeroed_page(GFP_KERNEL); | |
318 | if (!ring->intf) | |
319 | return ret; | |
320 | ret = gnttab_grant_foreign_access(dev->otherend_id, | |
321 | virt_to_gfn(ring->intf), 0); | |
322 | if (ret < 0) | |
323 | goto out; | |
324 | ring->ref = ret; | |
5cadd4bb JG |
325 | bytes = alloc_pages_exact(1UL << (order + XEN_PAGE_SHIFT), |
326 | GFP_KERNEL | __GFP_ZERO); | |
71ebd719 SS |
327 | if (!bytes) { |
328 | ret = -ENOMEM; | |
329 | goto out; | |
330 | } | |
36f99675 | 331 | for (; i < (1 << order); i++) { |
71ebd719 SS |
332 | ret = gnttab_grant_foreign_access( |
333 | dev->otherend_id, virt_to_gfn(bytes) + i, 0); | |
334 | if (ret < 0) | |
335 | goto out; | |
336 | ring->intf->ref[i] = ret; | |
337 | } | |
36f99675 | 338 | ring->intf->ring_order = order; |
71ebd719 | 339 | ring->data.in = bytes; |
36f99675 | 340 | ring->data.out = bytes + XEN_FLEX_RING_SIZE(order); |
71ebd719 SS |
341 | |
342 | ret = xenbus_alloc_evtchn(dev, &ring->evtchn); | |
343 | if (ret) | |
344 | goto out; | |
345 | ring->irq = bind_evtchn_to_irqhandler(ring->evtchn, | |
346 | xen_9pfs_front_event_handler, | |
347 | 0, "xen_9pfs-frontend", ring); | |
348 | if (ring->irq >= 0) | |
349 | return 0; | |
350 | ||
351 | xenbus_free_evtchn(dev, ring->evtchn); | |
352 | ret = ring->irq; | |
353 | out: | |
354 | if (bytes) { | |
355 | for (i--; i >= 0; i--) | |
49f8b459 | 356 | gnttab_end_foreign_access(ring->intf->ref[i], NULL); |
5cadd4bb | 357 | free_pages_exact(bytes, 1UL << (order + XEN_PAGE_SHIFT)); |
71ebd719 | 358 | } |
49f8b459 | 359 | gnttab_end_foreign_access(ring->ref, NULL); |
71ebd719 SS |
360 | free_page((unsigned long)ring->intf); |
361 | return ret; | |
362 | } | |
363 | ||
868eb122 SS |
364 | static int xen_9pfs_front_probe(struct xenbus_device *dev, |
365 | const struct xenbus_device_id *id) | |
366 | { | |
71ebd719 SS |
367 | int ret, i; |
368 | struct xenbus_transaction xbt; | |
369 | struct xen_9pfs_front_priv *priv = NULL; | |
370 | char *versions; | |
31d47266 | 371 | unsigned int max_rings, max_ring_order, len = 0; |
71ebd719 SS |
372 | |
373 | versions = xenbus_read(XBT_NIL, dev->otherend, "versions", &len); | |
2f9ad0ac DM |
374 | if (IS_ERR(versions)) |
375 | return PTR_ERR(versions); | |
71ebd719 SS |
376 | if (strcmp(versions, "1")) { |
377 | kfree(versions); | |
378 | return -EINVAL; | |
379 | } | |
380 | kfree(versions); | |
381 | max_rings = xenbus_read_unsigned(dev->otherend, "max-rings", 0); | |
382 | if (max_rings < XEN_9PFS_NUM_RINGS) | |
383 | return -EINVAL; | |
384 | max_ring_order = xenbus_read_unsigned(dev->otherend, | |
385 | "max-ring-page-order", 0); | |
36f99675 SS |
386 | if (max_ring_order > XEN_9PFS_RING_ORDER) |
387 | max_ring_order = XEN_9PFS_RING_ORDER; | |
388 | if (p9_xen_trans.maxsize > XEN_FLEX_RING_SIZE(max_ring_order)) | |
389 | p9_xen_trans.maxsize = XEN_FLEX_RING_SIZE(max_ring_order) / 2; | |
71ebd719 SS |
390 | |
391 | priv = kzalloc(sizeof(*priv), GFP_KERNEL); | |
392 | if (!priv) | |
393 | return -ENOMEM; | |
394 | ||
395 | priv->dev = dev; | |
396 | priv->num_rings = XEN_9PFS_NUM_RINGS; | |
397 | priv->rings = kcalloc(priv->num_rings, sizeof(*priv->rings), | |
398 | GFP_KERNEL); | |
399 | if (!priv->rings) { | |
400 | kfree(priv); | |
401 | return -ENOMEM; | |
402 | } | |
403 | ||
404 | for (i = 0; i < priv->num_rings; i++) { | |
405 | priv->rings[i].priv = priv; | |
36f99675 SS |
406 | ret = xen_9pfs_front_alloc_dataring(dev, &priv->rings[i], |
407 | max_ring_order); | |
71ebd719 SS |
408 | if (ret < 0) |
409 | goto error; | |
410 | } | |
411 | ||
412 | again: | |
413 | ret = xenbus_transaction_start(&xbt); | |
414 | if (ret) { | |
415 | xenbus_dev_fatal(dev, ret, "starting transaction"); | |
416 | goto error; | |
417 | } | |
418 | ret = xenbus_printf(xbt, dev->nodename, "version", "%u", 1); | |
419 | if (ret) | |
420 | goto error_xenbus; | |
421 | ret = xenbus_printf(xbt, dev->nodename, "num-rings", "%u", | |
422 | priv->num_rings); | |
423 | if (ret) | |
424 | goto error_xenbus; | |
425 | for (i = 0; i < priv->num_rings; i++) { | |
426 | char str[16]; | |
427 | ||
428 | BUILD_BUG_ON(XEN_9PFS_NUM_RINGS > 9); | |
316a1bef | 429 | sprintf(str, "ring-ref%d", i); |
71ebd719 SS |
430 | ret = xenbus_printf(xbt, dev->nodename, str, "%d", |
431 | priv->rings[i].ref); | |
432 | if (ret) | |
433 | goto error_xenbus; | |
434 | ||
316a1bef | 435 | sprintf(str, "event-channel-%d", i); |
71ebd719 SS |
436 | ret = xenbus_printf(xbt, dev->nodename, str, "%u", |
437 | priv->rings[i].evtchn); | |
438 | if (ret) | |
439 | goto error_xenbus; | |
440 | } | |
441 | priv->tag = xenbus_read(xbt, dev->nodename, "tag", NULL); | |
14e3995e WY |
442 | if (IS_ERR(priv->tag)) { |
443 | ret = PTR_ERR(priv->tag); | |
71ebd719 SS |
444 | goto error_xenbus; |
445 | } | |
446 | ret = xenbus_transaction_end(xbt, 0); | |
447 | if (ret) { | |
448 | if (ret == -EAGAIN) | |
449 | goto again; | |
450 | xenbus_dev_fatal(dev, ret, "completing transaction"); | |
451 | goto error; | |
452 | } | |
453 | ||
454 | write_lock(&xen_9pfs_lock); | |
455 | list_add_tail(&priv->list, &xen_9pfs_devs); | |
456 | write_unlock(&xen_9pfs_lock); | |
457 | dev_set_drvdata(&dev->dev, priv); | |
458 | xenbus_switch_state(dev, XenbusStateInitialised); | |
459 | ||
868eb122 | 460 | return 0; |
71ebd719 SS |
461 | |
462 | error_xenbus: | |
463 | xenbus_transaction_end(xbt, 1); | |
464 | xenbus_dev_fatal(dev, ret, "writing xenstore"); | |
465 | error: | |
466 | dev_set_drvdata(&dev->dev, NULL); | |
467 | xen_9pfs_front_free(priv); | |
468 | return ret; | |
868eb122 SS |
469 | } |
470 | ||
471 | static int xen_9pfs_front_resume(struct xenbus_device *dev) | |
472 | { | |
680a2846 | 473 | dev_warn(&dev->dev, "suspend/resume unsupported\n"); |
868eb122 SS |
474 | return 0; |
475 | } | |
476 | ||
477 | static void xen_9pfs_front_changed(struct xenbus_device *dev, | |
478 | enum xenbus_state backend_state) | |
479 | { | |
71ebd719 SS |
480 | switch (backend_state) { |
481 | case XenbusStateReconfiguring: | |
482 | case XenbusStateReconfigured: | |
483 | case XenbusStateInitialising: | |
484 | case XenbusStateInitialised: | |
485 | case XenbusStateUnknown: | |
486 | break; | |
487 | ||
488 | case XenbusStateInitWait: | |
489 | break; | |
490 | ||
491 | case XenbusStateConnected: | |
492 | xenbus_switch_state(dev, XenbusStateConnected); | |
493 | break; | |
494 | ||
495 | case XenbusStateClosed: | |
496 | if (dev->state == XenbusStateClosed) | |
497 | break; | |
df561f66 | 498 | fallthrough; /* Missed the backend's CLOSING state */ |
71ebd719 SS |
499 | case XenbusStateClosing: |
500 | xenbus_frontend_closed(dev); | |
501 | break; | |
502 | } | |
868eb122 SS |
503 | } |
504 | ||
505 | static struct xenbus_driver xen_9pfs_front_driver = { | |
506 | .ids = xen_9pfs_front_ids, | |
507 | .probe = xen_9pfs_front_probe, | |
508 | .remove = xen_9pfs_front_remove, | |
509 | .resume = xen_9pfs_front_resume, | |
510 | .otherend_changed = xen_9pfs_front_changed, | |
511 | }; | |
512 | ||
aaf0475a | 513 | static int p9_trans_xen_init(void) |
868eb122 | 514 | { |
80a316ff Y |
515 | int rc; |
516 | ||
868eb122 SS |
517 | if (!xen_domain()) |
518 | return -ENODEV; | |
519 | ||
520 | pr_info("Initialising Xen transport for 9pfs\n"); | |
521 | ||
522 | v9fs_register_trans(&p9_xen_trans); | |
80a316ff Y |
523 | rc = xenbus_register_frontend(&xen_9pfs_front_driver); |
524 | if (rc) | |
525 | v9fs_unregister_trans(&p9_xen_trans); | |
526 | ||
527 | return rc; | |
868eb122 SS |
528 | } |
529 | module_init(p9_trans_xen_init); | |
4cd82a5b | 530 | MODULE_ALIAS_9P("xen"); |
868eb122 | 531 | |
aaf0475a | 532 | static void p9_trans_xen_exit(void) |
868eb122 SS |
533 | { |
534 | v9fs_unregister_trans(&p9_xen_trans); | |
535 | return xenbus_unregister_driver(&xen_9pfs_front_driver); | |
536 | } | |
537 | module_exit(p9_trans_xen_exit); | |
d542296a | 538 | |
99aa673e | 539 | MODULE_ALIAS("xen:9pfs"); |
d542296a SH |
540 | MODULE_AUTHOR("Stefano Stabellini <stefano@aporeto.com>"); |
541 | MODULE_DESCRIPTION("Xen Transport for 9P"); | |
542 | MODULE_LICENSE("GPL"); |