Displaying 18 results from an estimated 18 matches for "xs_daemon_open".
2010 Sep 02
7
[PATCH] libxl: make libxl communicate with xenstored by socket or xenbus driver
...f592364826 tools/libxl/libxl.c
--- a/tools/libxl/libxl.c Wed Sep 01 11:23:49 2010 +0100
+++ b/tools/libxl/libxl.c Thu Sep 02 14:51:46 2010 +0100
@@ -1387,10 +1387,8 @@
{
libxl_device_model_starting *starting = for_spawn;
char *kvs[3];
- int rc;
struct xs_handle *xsh;
- xsh = xs_daemon_open();
/* we mustn''t use the parent''s handle in the child */
kvs[0] = "image/device-model-pid";
@@ -1398,9 +1396,10 @@
return;
kvs[2] = NULL;
- rc = xs_writev(xsh, XBT_NULL, starting->dom_path, kvs);
- if (rc)
- return;
+ xsh =...
2008 Apr 14
0
cannot use xen management tools
hi,
> xm list
Error: Unable to connect to xend: Connection refused. Is xend running?
> xend restart
<complete''s with no complaints>
however in /var/log/messages I get
Apr 14 16:18:42 tiger BLKTAPCTRL[6058]: xs_daemon_open failed -- is
xenstore running?
> xenstored
FATAL: Failed to initialize dom0 state: Invalid argument
full talloc report on ''null_context'' (total 96 bytes in 3 blocks)
struct domain contains 96 bytes in 2 blocks (ref 0)
/local/domain/0...
2009 Jan 02
0
Question Regarding xs_read()
...ction, it returns NULL. It
works fine if I give the absolute path, but I can''t really do that
dynamically since I don''t know the DOMID ahead of time.
Basically I''m trying this:
struct xs_handle* xs;
xs_transaction_t t;
void* domid;
char temp[] = "domid";
xs = xs_daemon_open();
t = xs_transaction_start(xs);
domid = xs_read(xs, t, temp, NULL);
Could someone explain why this doesn''t work or maybe let me know of an
alternative way to read XenStore in a C application without using absolute
paths?
Cheers!
_______________________________________________
Xen-deve...
2008 Sep 05
0
[PATCH] Janitorial work on xc_save.c
...0eab1869ef6649878e7f2f5f5af534122aca3a4c
Janitorial work on xc_save.c
Remove an unused variable.
Replace errx by warnx when cleanup code follows.
diff --git a/tools/xcutils/xc_save.c b/tools/xcutils/xc_save.c
--- a/tools/xcutils/xc_save.c
+++ b/tools/xcutils/xc_save.c
@@ -71,7 +71,7 @@
xs = xs_daemon_open();
if (!xs) {
- errx(1, "failed to get xenstore handle");
+ warnx("failed to get xenstore handle");
return -1;
}
sprintf(path, "/local/domain/%d/device/suspend/event-channel", domid);
@@ -88,20 +88,19 @@
si.xce = xc_evtchn_open();
if (si.xc...
2012 Apr 17
2
[PATCH BUILD FIX 0/2] build xc_hvm_inject_msi on Xen < 4.2
Hi all,
this small patch series fixes the build breakage introduced by
f1dbf015dfb0aa7f66f710a1f1bc58b662951de2 with Xen < 4.2.
The problem is that xc_hvm_inject_msi is only defined from Xen 4.2
onwards so we need to provide a compatibility function for older Xen
versions.
Stefano Stabellini (2):
xen,configure: detect Xen 4.2
xen: add a dummy xc_hvm_inject_msi for Xen < 4.2
2005 Oct 03
26
xenstore documentation
hi,
it would be extremely useful for me if someone with knowledge of how
the current tools and drivers use Xenstore would be kind enough to
update the Wiki with current information. I have been spending quite a
lot of time trying to get my domU connected to a block device in dom0
using a home-brewed domain creation tool, and I am still at the
''Timeout connecting to device!''
2018 Oct 09
2
Ill-advised use of xs_open flag 1UL<<2 by Debian
tl;dr
The Debian Xen packages have had a very bad patch which I propose to
simply drop, with minor compatibility implications, unless someone
can explain what it is for and why it is still needed, and/or has a
better plan.
I have been going through delta queue in the Debian Xen package.
I found a commit (patch) describing itself only this way:
2009 Nov 18
6
[PATCH 1/3] libxenlight: Clean up logging arrangements
* Introduce new variants of the logging functions which include
errno values (converted using strerror) in the messages passed to the
application''s logging callback.
* Use the new errno-including logging functions everywhere where
appropriate. In general, xc_... functions return errno values or 0;
xs_... functions return 0 or -1 (or some such) setting errno.
* When
2011 Jul 21
51
Linux Stubdom Problem
2011/7/19 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
> CC''ing Tim and xen-devel
>
> On Mon, 18 Jul 2011, Jiageng Yu wrote:
>> 2011/7/16 Stefano Stabellini <stefano.stabellini@eu.citrix.com>:
>> > On Fri, 15 Jul 2011, Jiageng Yu wrote:
>> >> 2011/7/15 Jiageng Yu <yujiageng734@gmail.com>:
>> >> > 2011/7/15
2005 Aug 04
0
[PATCH 6/11] Xenstore watch rework
..." \n") == strlen(line))
+ return;
+ if (strstarts(line, "#"))
+ return;
+
+ handle = strtoul(line, &endp, 10);
+ if (endp != line)
+ memmove(line, endp+1, strlen(endp));
+ else
+ handle = default_handle;
+
+ if (!handles[handle]) {
+ if (readonly)
+ handles[handle] = xs_daemon_open_readonly();
+ else
+ handles[handle] = xs_daemon_open();
+ if (!handles[handle])
+ barf_perror("Opening connection to daemon");
+ }
+ command = arg(line, 0);
+
+ if (timeout)
+ alarm(1);
+
+ if (streq(command, "dir"))
+ do_dir(handle, arg(line, 1));
+ else if (streq(comm...
2024 Feb 05
7
Bug#1063270: xen: NMU diff for 64-bit time_t transition
...:00.000000000 +0000
@@ -1,39 +0,0 @@
-libxenstore.so.4 libxenstore4 #MINVER#
- VERS_4.0 at VERS_4.0 4.16.0
- xs_check_watch at VERS_4.0 4.16.0
- xs_close at VERS_4.0 4.16.0
- xs_control_command at VERS_4.0 4.16.0
- xs_daemon_close at VERS_4.0 4.16.0
- xs_daemon_destroy_postfork at VERS_4.0 4.16.0
- xs_daemon_open at VERS_4.0 4.16.0
- xs_daemon_open_readonly at VERS_4.0 4.16.0
- xs_daemon_rundir at VERS_4.0 4.16.0
- xs_daemon_socket at VERS_4.0 4.16.0
- xs_daemon_socket_ro at VERS_4.0 4.16.0
- xs_debug_command at VERS_4.0 4.16.0
- xs_directory at VERS_4.0 4.16.0
- xs_domain_open at VERS_4.0 4.16.0
- xs_filen...
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
The first patch modifies creation of the hvmloader key in xenstore and adds
creation of a new read/write hvmloader/generation-id-addr key.
The second patch changes hvmloader to use the new key (as
2011 Dec 14
9
[PATCH 0 of 2] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID
buffer address in xenstore across save/restore and migrate, and also
code to increment the value in all cases except for migration.
The vast majority of the code is in second patch. The first patch
merely changes the xenstore key name used by hvmloader to store the
buffer address.
2010 Aug 12
59
[PATCH 00/15] RFC xen device model support
Hi all,
this is the long awaited patch series to add xen device model support in
qemu; the main author is Anthony Perard.
Developing this series we tried to come up with the cleanest possible
solution from the qemu point of view, limiting the amount of changes to
common code as much as possible. The end result still requires a couple
of hooks in piix_pci but overall the impact should be very
2007 Oct 24
16
PATCH 0/10: Merge PV framebuffer & console into QEMU
The following series of 10 patches is a merge of the xenfb and xenconsoled
functionality into the qemu-dm code. The general approach taken is to have
qemu-dm provide two machine types - one for xen paravirt, the other for
fullyvirt. For compatability the later is the default. The goals overall
are to kill LibVNCServer, remove alot of code duplication and/or parallel
impls of the same concepts, and
2013 Jul 15
8
[PATCH 0 of 7 v5] Introduce the tapback daemon (most of blkback in user-space)
This patch series introduces the tapback daemon, the user space daemon that
acts as a device''s back-end, essentially most of blkback in user space. The
daemon is responsible for coordinating the front-end and tapdisk. It creates
tapdisk process as needed, instructs them to connect to/disconnect from the
shared ring, and manages the state of the back-end.
The shared ring between the
2011 Nov 29
18
[PATCH 0 of 6] Add support for a VM generation ID virtual device (v2)
The following is a revised patch series to add support for a
VM generation ID virtual device for HVM guests.
The basic requirements of this device are as follows:
- It must be exposed somewhere in ACPI namespace with a _CID of
"VM_Gen_Counter".
- It must also include a _DDN of "VM_Gen_Counter".
- It must contain a _HID object but no particular value is
required.
- It must
2010 Aug 12
0
[PATCH, v2]: xl: Implement per-API-call garbage-collection lifetime
...void *userdata),
void *check_callback_userdata)
{
+ libxl_gc gc = LIBXL_INIT_GC(ctx);
char *path;
char *p;
unsigned int len;
@@ -397,7 +406,7 @@ int libxl_wait_for_device_model(libxl_ct
char **l = NULL;
xsh = xs_daemon_open();
- path = libxl_sprintf(ctx, "/local/domain/0/device-model/%d/state", domid);
+ path = libxl_sprintf(&gc, "/local/domain/0/device-model/%d/state", domid);
xs_watch(xsh, path, path);
tv.tv_sec = LIBXL_DEVICE_MODEL_START_TIMEOUT;
tv.tv_usec = 0;
@@ -419,...