/xen/tools/xenstore/ |
A D | xenstored_core.c | 226 ret = conn->write(conn, out->hdr.raw + out->used, in write_messages() 243 ret = conn->write(conn, out->buffer + out->used, in write_messages() 277 talloc_unlink(conn, conn->target); in destroy_conn() 355 conn->pollfd_idx = set_fd(conn->fd, events); in initialize_fds() 499 (conn->target && perms->p[i].id == conn->target->id))) in perm_for_conn() 1426 conn->in->hdr.msg.len, conn); in consider_message() 1428 process_message(conn, conn->in); in consider_message() 1443 conn->in = new_buffer(conn); in handle_input() 1453 bytes = conn->read(conn, in->hdr.raw + in->used, in handle_input() 1479 bytes = conn->read(conn, in->buffer + in->used, in handle_input() [all …]
|
A D | xenstored_domain.c | 256 conn = domain->conn; in domain_cleanup() 303 return conn && conn->domain && in domain_is_unprivileged() 404 struct connection *conn = domain->conn; in domain_conn_reset() local 520 talloc_reference(domain->conn, tdomain->conn); in do_set_target() 521 domain->conn->target = tdomain->conn; in do_set_target() 774 if (!conn) in domain_entry_inc() 860 if (!conn) in domain_entry_dec() 872 } else if (conn->domain && conn->domain->nbentry) { in domain_entry_dec() 910 if (!conn || !conn->domain) in domain_watch_inc() 917 if (!conn || !conn->domain) in domain_watch_dec() [all …]
|
A D | xenstored_domain.h | 48 const char *get_implicit_path(const struct connection *conn); 54 bool domain_can_read(struct connection *conn); 55 bool domain_can_write(struct connection *conn); 57 bool domain_is_unprivileged(struct connection *conn); 63 void domain_entry_inc(struct connection *conn, struct node *); 66 int domain_entry(struct connection *conn); 67 void domain_watch_inc(struct connection *conn); 68 void domain_watch_dec(struct connection *conn); 69 int domain_watch(struct connection *conn); 100 void wrl_apply_debit_direct(struct connection *conn); [all …]
|
A D | xenstored_watch.c | 123 perm = perm_for_conn(conn, perms); in watch_permitted() 129 node = read_node(conn, ctx, name); in watch_permitted() 134 perm = perm_for_conn(conn, &node->perms); in watch_permitted() 167 if (conn && conn->transaction) in fire_watches() 232 watch = talloc(conn, struct watch); in do_watch() 248 domain_watch_inc(conn); in do_watch() 252 send_ack(conn, XS_WATCH); in do_watch() 268 node = canonicalize(conn, in, vec[0]); in do_unwatch() 275 domain_watch_dec(conn); in do_unwatch() 276 send_ack(conn, XS_UNWATCH); in do_unwatch() [all …]
|
A D | xenstored_solaris.c | 80 if (conn->domain) in cred() 83 if (getpeerucred(conn->fd, &ucred) == -1) in cred() 104 return (talloc_strdup(conn, "")); in mangle() 130 char *mangled = mangle(conn, in); in dtrace_io() 131 XENSTORE_MSG(in->hdr.msg.tx_id, conn->id, cred(conn), in dtrace_io() 141 char *mangled = mangle(conn, in); in dtrace_io() 143 cred(conn), mangled); in dtrace_io() 149 char *mangled = mangle(conn, in); in dtrace_io() 150 XENSTORE_WATCH_EVENT(conn->id, cred(conn), mangled); in dtrace_io() 156 char *mangled = mangle(conn, in); in dtrace_io() [all …]
|
A D | xenstored_transaction.c | 204 if (!conn || !conn->transaction || in transaction_prepend() 246 if (conn && !conn->transaction) in access_node() 250 if (!conn || !conn->transaction) { in access_node() 257 trans = conn->transaction; in access_node() 456 if (conn->transaction) in do_transaction_start() 459 if (conn->id && conn->transaction_started > quota_max_transaction) in do_transaction_start() 475 exists = transaction_lookup(conn, conn->next_transaction_id++); in do_transaction_start() 480 talloc_steal(conn, trans); in do_transaction_start() 482 conn->transaction_started++; in do_transaction_start() 517 conn->transaction = NULL; in do_transaction_end() [all …]
|
A D | xenstored_control.c | 35 static int do_control_check(void *ctx, struct connection *conn, in do_control_check() argument 43 send_ack(conn, XS_CONTROL); in do_control_check() 47 static int do_control_log(void *ctx, struct connection *conn, in do_control_log() argument 60 send_ack(conn, XS_CONTROL); in do_control_log() 73 send_ack(conn, XS_CONTROL); in do_control_memreport() 88 send_ack(conn, XS_CONTROL); in do_control_logfile() 127 send_ack(conn, XS_CONTROL); in do_control_memreport() 140 send_ack(conn, XS_CONTROL); in do_control_print() 191 send_reply(conn, XS_CONTROL, resp, len); in do_control_help() 201 if (conn->id != 0) in do_control() [all …]
|
A D | xenstored_transaction.h | 32 int do_transaction_start(struct connection *conn, struct buffered_data *node); 33 int do_transaction_end(struct connection *conn, struct buffered_data *in); 35 struct transaction *transaction_lookup(struct connection *conn, uint32_t id); 42 int access_node(struct connection *conn, struct node *node, 46 int transaction_prepend(struct connection *conn, const char *name, 49 void conn_delete_all_transactions(struct connection *conn);
|
A D | xenstored_core.h | 149 void send_reply(struct connection *conn, enum xsd_sockmsg_type type, 153 void send_ack(struct connection *conn, enum xsd_sockmsg_type type); 156 char *canonicalize(struct connection *conn, const void *ctx, const char *node); 159 enum xs_perm_type perm_for_conn(struct connection *conn, 163 int write_node_raw(struct connection *conn, TDB_DATA *key, struct node *node, 167 struct node *read_node(struct connection *conn, const void *ctx, 172 void corrupt(struct connection *conn, const char *fmt, ...); 173 enum xs_perm_type perm_for_conn(struct connection *conn, 186 void dtrace_io(const struct connection *conn, const struct buffered_data *data, int out);
|
A D | xenstored_watch.h | 24 int do_watch(struct connection *conn, struct buffered_data *in); 25 int do_unwatch(struct connection *conn, struct buffered_data *in); 28 void fire_watches(struct connection *conn, const void *tmp, const char *name, 31 void conn_delete_all_watches(struct connection *conn);
|
A D | xenstored_control.h | 19 int do_control(struct connection *conn, struct buffered_data *in);
|
/xen/docs/designs/ |
A D | xenstore-migration.md | 150 | conn-id | conn-type | flags | 152 | conn-spec 164 | `conn-id` | A non-zero number used to identify this | 168 | `conn-type` | 0x0000: shared ring | 175 | `conn-spec` | See below | 197 The format of `conn-spec` is dependent upon `conn-type`. 254 | conn-id | 267 | `conn-id` | The connection that issued the `WATCH` | 294 | conn-id | 303 | `conn-id` | The connection that issued the | [all …]
|
/xen/stubdom/ |
A D | lwip.patch-cvs | 101 + tcp_arg(conn->pcb.tcp, NULL); 103 - tcp_arg(conn->pcb.tcp, NULL); 106 tcp_recv(conn->pcb.tcp, NULL); 111 + tcp_err(conn->pcb.tcp, NULL); 114 err = tcp_close(conn->pcb.tcp); 117 conn->state = NETCONN_NONE; 119 - tcp_err(conn->pcb.tcp, NULL); 123 - tcp_arg(conn->pcb.tcp, NULL); 124 conn->pcb.tcp = NULL; 125 conn->err = ERR_OK; [all …]
|