Displaying 7 results from an estimated 7 matches for "xs_set_permissions".
2010 Aug 13
0
[PATCH 1 of 4] libxl_device_generic_add: handle NULL fents or bents
...ctx->xsh);
/* FIXME: read frontend_path and check state before removing stuff */
- xs_rm(ctx->xsh, t, frontend_path);
- xs_rm(ctx->xsh, t, backend_path);
+ if (fents) {
+ xs_rm(ctx->xsh, t, frontend_path);
+ xs_mkdir(ctx->xsh, t, frontend_path);
+ xs_set_permissions(ctx->xsh, t, frontend_path, frontend_perms, ARRAY_SIZE(frontend_perms));
+ xs_write(ctx->xsh, t, libxl_sprintf(&gc, "%s/backend", frontend_path), backend_path, strlen(backend_path));
+ libxl_xs_writev(&gc, t, frontend_path, fents);
+ }
- xs_mkdir(ctx-&g...
2011 Dec 16
13
[PATCH 0 of 4] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
Patch 1 modifies the guest ro and rw node creation to an open coding style
and cleans up some extraneous node creation.
Patch 2 modifies creation of the hvmloader key in xenstore and adds
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
The first patch modifies creation of the hvmloader key in xenstore and adds
creation of a new read/write hvmloader/generation-id-addr key.
The second patch changes hvmloader to use the new key (as
2006 Aug 02
0
[PATCH] xenstore-chmod
...defined(CLIENT_chmod)
+#define PATH_SEP ''/''
+#define MAX_PATH_LEN 256
+
+static void
+do_chmod(char *path, struct xs_permissions *perms, int nperms, int upto,
+ int recurse, struct xs_handle *xsh, xs_transaction_t xth)
+{
+ int ret;
+
+ if (!path[0])
+ return;
+
+ ret = xs_set_permissions(xsh, xth, path, perms, nperms);
+ if (!ret)
+ err(1, "Error occurred setting permissions on ''%s''", path);
+
+ if (upto) {
+ /* apply same permissions to all parent entries: */
+ char *path_sep_ptr = strrchr(path, PATH_SEP);
+ if (!path_sep_ptr)
+ errx(1, "...
2010 Aug 12
0
[PATCH, v2]: xl: Implement per-API-call garbage-collection lifetime
...(&gc, "/vm/%s", uuid_string);
if (!vm_path) {
XL_LOG(ctx, XL_LOG_ERROR, "cannot allocate create paths");
+ libxl_free_all(&gc);
return ERROR_FAIL;
}
@@ -147,42 +148,47 @@ retry_transaction:
xs_mkdir(ctx->xsh, t, vm_path);
xs_set_permissions(ctx->xsh, t, vm_path, roperm, ARRAY_SIZE(roperm));
- xs_write(ctx->xsh, t, libxl_sprintf(ctx, "%s/vm", dom_path), vm_path, strlen(vm_path));
+ xs_write(ctx->xsh, t, libxl_sprintf(&gc, "%s/vm", dom_path), vm_path, strlen(vm_path));
rc = libxl_domain_rena...
2024 Feb 05
7
Bug#1063270: xen: NMU diff for 64-bit time_t transition
...xs_mkdir at VERS_4.0 4.16.0
- xs_open at VERS_4.0 4.16.0
- xs_path_is_subpath at VERS_4.0 4.16.0
- xs_read at VERS_4.0 4.16.0
- xs_read_watch at VERS_4.0 4.16.0
- xs_release_domain at VERS_4.0 4.16.0
- xs_restrict at VERS_4.0 4.16.0
- xs_resume_domain at VERS_4.0 4.16.0
- xs_rm at VERS_4.0 4.16.0
- xs_set_permissions at VERS_4.0 4.16.0
- xs_set_target at VERS_4.0 4.16.0
- xs_strings_to_perms at VERS_4.0 4.16.0
- xs_suspend_evtchn_port at VERS_4.0 4.16.0
- xs_transaction_end at VERS_4.0 4.16.0
- xs_transaction_start at VERS_4.0 4.16.0
- xs_unwatch at VERS_4.0 4.16.0
- xs_watch at VERS_4.0 4.16.0
- xs_write at VE...
2013 Jul 15
8
[PATCH 0 of 7 v5] Introduce the tapback daemon (most of blkback in user-space)
This patch series introduces the tapback daemon, the user space daemon that
acts as a device''s back-end, essentially most of blkback in user space. The
daemon is responsible for coordinating the front-end and tapdisk. It creates
tapdisk process as needed, instructs them to connect to/disconnect from the
shared ring, and manages the state of the back-end.
The shared ring between the