Displaying 20 results from an estimated 23 matches for "xs_transaction_t".
2011 Mar 30
2
[PATCH] xenstore-stat v2
...quot;-w";
+ case XS_PERM_READ:
+ return "r-";
+ case XS_PERM_READ|XS_PERM_WRITE:
+ return "rw";
+ case XS_PERM_NONE:
+ return "--";
+ default:
+ return "uu";
+ }
+}
+
+static void
+do_stat(struct xs_handle *xsh, xs_transaction_t xth, char *path)
+{
+ unsigned int i, nperms;
+ struct xs_permissions *perms;
+
+ perms = xs_get_permissions(xsh, xth, path, &nperms);
+ if (!perms)
+ errx(1, "Unable to get permission on %s\n", path);
+
+ if (!nperms) {
+ free(perms);
+ errx(1, &qu...
2007 Aug 01
8
propossed 3.1 changes
Hi folks
I propose the following changes for 3.1:
- Rename source to xen-3. Upstream stripped one part of the version, so
the next should be 3.2.
- pygrub as extra package.
- Rename i386 to i386-nonpae
- Rename i386-pae to i386. PAE is upstream default now and pae images
works with a 64bit hypervisor.
We should think about supporting libvirt. It provides an AFAIK stable
interface on the
2006 Aug 02
0
[PATCH] xenstore-chmod
...}
@@ -78,10 +80,61 @@ do_rm(char *path, struct xs_handle *xsh,
}
#endif
+#if defined(CLIENT_chmod)
+#define PATH_SEP ''/''
+#define MAX_PATH_LEN 256
+
+static void
+do_chmod(char *path, struct xs_permissions *perms, int nperms, int upto,
+ int recurse, struct xs_handle *xsh, xs_transaction_t xth)
+{
+ int ret;
+
+ if (!path[0])
+ return;
+
+ ret = xs_set_permissions(xsh, xth, path, perms, nperms);
+ if (!ret)
+ err(1, "Error occurred setting permissions on ''%s''", path);
+
+ if (upto) {
+ /* apply same permissions to all parent entries: */
+ ch...
2011 Dec 16
13
[PATCH 0 of 4] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
Patch 1 modifies the guest ro and rw node creation to an open coding style
and cleans up some extraneous node creation.
Patch 2 modifies creation of the hvmloader key in xenstore and adds
2010 Aug 12
0
[PATCH, v2]: xl: Implement per-API-call garbage-collection lifetime
...ction_end(ctx->xsh, t, 0))
if (errno == EAGAIN)
goto retry_transaction;
+
+ libxl_free_all(&gc);
return 0;
}
int libxl_domain_rename(libxl_ctx *ctx, uint32_t domid,
const char *old_name, const char *new_name,
- xs_transaction_t trans) {
+ xs_transaction_t trans)
+{
+ libxl_gc gc = LIBXL_INIT_GC(ctx);
char *dom_path = 0;
const char *name_path;
char *got_old_name;
@@ -190,10 +196,10 @@ int libxl_domain_rename(libxl_ctx *ctx,
xs_transaction_t our_trans = 0;
int rc;
- d...
2010 Sep 02
7
[PATCH] libxl: make libxl communicate with xenstored by socket or xenbus driver
Hi,
George sent a patch on this problem before, but it was not completed.
This patch makes libxl use xenbus to communicate with xenstored if libxl cannot open a socket. There''s a place that does not close fd in the case of failure, which is also fixed in this patch.
-----------------------------------------Patch------------------------------------------------------
diff -r eff592364826
2009 Jan 02
0
Question Regarding xs_read()
...t what the DOMID is. When
I try to use this technique in the xs_read function, it returns NULL. It
works fine if I give the absolute path, but I can''t really do that
dynamically since I don''t know the DOMID ahead of time.
Basically I''m trying this:
struct xs_handle* xs;
xs_transaction_t t;
void* domid;
char temp[] = "domid";
xs = xs_daemon_open();
t = xs_transaction_start(xs);
domid = xs_read(xs, t, temp, NULL);
Could someone explain why this doesn''t work or maybe let me know of an
alternative way to read XenStore in a C application without using absolute
path...
2010 Aug 13
3
[PATCH] xl: make libxl_uuid2string internal to libxenlight
...ifetime
patch.
Signed-off-by: Gianni Tedesco <gianni.tedesco@citrix.com>
diff -r dc335ebde3b5 tools/libxl/libxl.c
--- a/tools/libxl/libxl.c Thu Aug 12 18:03:23 2010 +0100
+++ b/tools/libxl/libxl.c Fri Aug 13 15:32:31 2010 +0100
@@ -90,7 +90,7 @@ int libxl_domain_make(libxl_ctx *ctx, li
xs_transaction_t t;
xen_domain_handle_t handle;
- uuid_string = libxl_uuid2string(ctx, info->uuid);
+ uuid_string = libxl_uuid2string(&gc, info->uuid);
if (!uuid_string) {
libxl_free_all(&gc);
return ERROR_NOMEM;
@@ -453,7 +453,7 @@ int libxl_domain_preserve(libxl_c...
2012 Jul 04
2
[PATCH] libxl: rename stubdomain when renaming domain
...m>
diff -r 12011fcfd5cc -r 167f013324e8 tools/libxl/libxl.c
--- a/tools/libxl/libxl.c Thu Jun 28 13:25:02 2012 +0100
+++ b/tools/libxl/libxl.c Wed Jul 04 11:27:05 2012 +0100
@@ -276,6 +276,8 @@ int libxl__domain_rename(libxl__gc *gc,
char *got_old_name;
unsigned int got_old_len;
xs_transaction_t our_trans = 0;
+ uint32_t stub_dm_domid;
+ const char *stub_dm_old_name = NULL, *stub_dm_new_name = NULL;
int rc;
dom_path = libxl__xs_get_dompath(gc, domid);
@@ -284,6 +286,12 @@ int libxl__domain_rename(libxl__gc *gc,
name_path= libxl__sprintf(gc, "%s/name", dom_...
2013 Apr 25
17
[PATCH V3] libxl: write IO ABI for disk frontends
...@@
#include "libxl_internal.h"
+#include <xen/io/protocols.h>
+
#define PAGE_TO_MEMKB(pages) ((pages) * 4)
#define BACKEND_STRING_SIZE 5
@@ -2037,6 +2039,14 @@ static void device_disk_add(libxl__egc *egc, uint32_t domid,
int rc;
libxl_ctx *ctx = gc->owner;
xs_transaction_t t = XBT_NULL;
+ const char *protocol = NULL;
+ char p[XEN_IO_PROTO_ABI_MAX_LEN+1];
+
+ libxl_domain_type type = libxl__domain_type(gc, domid);
+ if (type == LIBXL_DOMAIN_TYPE_INVALID) {
+ rc = ERROR_FAIL;
+ goto out;
+ }
for (;;) {
rc = libxl__xs_transac...
2013 Jul 15
8
[PATCH 0 of 7 v5] Introduce the tapback daemon (most of blkback in user-space)
This patch series introduces the tapback daemon, the user space daemon that
acts as a device''s back-end, essentially most of blkback in user space. The
daemon is responsible for coordinating the front-end and tapdisk. It creates
tapdisk process as needed, instructs them to connect to/disconnect from the
shared ring, and manages the state of the back-end.
The shared ring between the
2012 Dec 14
1
[PATCH V5] libxenstore: filter watch events in libxenstore when we unwatch
...ubpath (/foo/bar) with the
+ * same path until a successful
+ * xs_unwatch for the first watch
+ * has returned.
+ */
+#define XS_UNWATCH_FILTER 1UL<<2
+
struct xs_handle;
typedef uint32_t xs_transaction_t;
diff --git a/tools/xenstore/xs.c b/tools/xenstore/xs.c
index b951015..86ef6c7 100644
--- a/tools/xenstore/xs.c
+++ b/tools/xenstore/xs.c
@@ -67,6 +67,8 @@ struct xs_handle {
/* Clients can select() on this pipe to wait for a watch to fire. */
int watch_pipe[2];
+ /* Filtering watch event i...
2012 Dec 14
1
[PATCH V4] libxenstore: filter watch events in libxenstore when we unwatch
...ubpath (/foo/bar) with the
+ * same path until a successful
+ * xs_unwatch for the first watch
+ * has returned.
+ */
+#define XS_UNWATCH_FILTER 1UL<<2
+
struct xs_handle;
typedef uint32_t xs_transaction_t;
diff --git a/tools/xenstore/xs.c b/tools/xenstore/xs.c
index b951015..5368769 100644
--- a/tools/xenstore/xs.c
+++ b/tools/xenstore/xs.c
@@ -67,6 +67,8 @@ struct xs_handle {
/* Clients can select() on this pipe to wait for a watch to fire. */
int watch_pipe[2];
+ /* Filtering watch event i...
2007 Dec 08
6
Re: [Xen-changelog] [xen-unstable] tools: Rationalise library soname versions.
On Fri, Dec 07, 2007 at 04:30:09PM -0800, Xen patchbot-unstable wrote:
> tools: Rationalise library soname versions.
>
> * Arrange for the sonames of libxenstore, libxc, libfsimage and
> libblktap to be set from a single place in Config.mk.
Grumble... I don''t like this at all. You just bumped libfsimage for no
reason. Can we please fix libfsimage back to the correct
2012 Dec 13
4
[PATCH V3] libxenstore: filter watch events in libxenstore when we unwatch
...ETONLY 1UL<<1
+/*
+ * Avoid race condition with unwatch - Not enabled by default
+ *
+ * If you want to enable it please be sure to watch a path (/foo) and
+ * a sub-path (/foo/bar) with the same token.
+ */
+#define XS_UNWATCH_SAFE 1UL<<2
struct xs_handle;
typedef uint32_t xs_transaction_t;
diff --git a/tools/xenstore/xs.c b/tools/xenstore/xs.c
index b951015..591fe79 100644
--- a/tools/xenstore/xs.c
+++ b/tools/xenstore/xs.c
@@ -67,6 +67,8 @@ struct xs_handle {
/* Clients can select() on this pipe to wait for a watch to fire. */
int watch_pipe[2];
+ /* Filtering watch event in...
2013 Nov 25
22
[PATCH 0/4] Coverity fixes for tools/libxl
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
--
1.7.10.4
2009 Nov 18
6
[PATCH 1/3] libxenlight: Clean up logging arrangements
...ine, const char *func, char *fmt, va_list al);
+void xl_log(struct libxl_ctx *ctx, int errnoval, int loglevel, const char *file, int line, const char *func, char *fmt, ...);
struct libxl_domain_build_state_ {
uint32_t store_port;
@@ -97,7 +102,7 @@ int libxl_xs_writev(struct libxl_ctx *ctx, xs_transaction_t t,
char *dir, char **kvs);
int libxl_xs_write(struct libxl_ctx *ctx, xs_transaction_t t,
char *path, char *fmt, ...);
-char *libxl_xs_get_dompath(struct libxl_ctx *ctx, uint32_t domid);
+char *libxl_xs_get_dompath(struct libxl_ctx *ctx, uint32_t domid); //...
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
The first patch modifies creation of the hvmloader key in xenstore and adds
creation of a new read/write hvmloader/generation-id-addr key.
The second patch changes hvmloader to use the new key (as
2013 Apr 18
9
[PATCH v5 1/2] libxl: Introduce functions to add and remove USB devices to an HVM guest
...mented type)");
+ goto out;
+ }
+
+ rc = 0;
+out:
+ return rc;
+}
+
+static int usb_add_xenstore(libxl__gc *gc, uint32_t domid,
+ libxl__device_usb *usbdev)
+{
+ libxl_ctx *ctx = libxl__gc_owner(gc);
+ flexarray_t *dev;
+ char *dev_path;
+ xs_transaction_t t = 0;
+ struct xs_permissions noperm[1];
+ int rc = 0;
+
+ noperm[0].id = 0;
+ noperm[0].perms = XS_PERM_NONE;
+
+ dev = flexarray_make(gc, 16, 1);
+
+ flexarray_append_pair(dev, "protocol",
+ GCSPRINTF("%s",
+...
2012 Apr 20
26
xl doesn't honour the parameter cpu_weight from my config file while xm does honour it
Hi,
I''ve installed xen-unstable 4.2 from actual git (last commit was
4dc7dbef5400f0608321d579aebb57f933e8f707).
When I start a domU with xm all is fine include the cpu_weight I
configured in my domU config.
When I start the domU with xl then all my domU have the default
cpu_weight of 256 instead of the configured one.
Was the name of cpu_weight being changed for xl command ?
My domU