/xen/tools/ocaml/xenstored/ |
A D | perms.ml | 49 owner: Xenctrl.domid; RecordField 54 let create owner other acl = 55 { owner = owner; other = other; acl = acl } 59 let get_owner perm = perm.owner 62 * If [domid] was the owner then it is changed to Dom0. 67 let owner = if perm.owner = domid then 0 else perm.owner in 68 { perm with acl; owner } 93 let l = ((permvec.owner, permvec.other) :: permvec.acl) in 139 (* check if owner of the current connection and of the current node are the same *)
|
A D | store.ml | 86 Logging.info "store|node" "Permission denied: Domain %d not owner" (get_owner node); 406 let owner = Node.get_owner node in 412 Quota.check store.quota owner (String.length value); 416 then Quota.add_entry store.quota owner 420 let owner = Node.get_owner node in 422 if not (existing || (Perms.Connection.is_dom0 perm)) then Quota.check store.quota owner 0; 424 Quota.add_entry store.quota owner
|
/xen/xen/include/asm-arm/ |
A D | smccc.h | 276 #define ARM_SMCCC_CALL_VAL(type, calling_convention, owner, func_num) \ argument 279 (((owner) & ARM_SMCCC_OWNER_MASK) << ARM_SMCCC_OWNER_SHIFT) | \ 295 #define ARM_SMCCC_CALL_COUNT_FID(owner) \ argument 298 ARM_SMCCC_OWNER_##owner, \ 301 #define ARM_SMCCC_CALL_UID_FID(owner) \ argument 304 ARM_SMCCC_OWNER_##owner, \ 307 #define ARM_SMCCC_REVISION_FID(owner) \ argument 310 ARM_SMCCC_OWNER_##owner, \
|
/xen/xen/include/xen/ |
A D | rwlock.h | 281 #define PERCPU_RW_LOCK_UNLOCKED(owner) { RW_LOCK_UNLOCKED, 0, owner } argument 288 #define PERCPU_RW_LOCK_UNLOCKED(owner) { RW_LOCK_UNLOCKED, 0 } argument 292 #define DEFINE_PERCPU_RWLOCK_RESOURCE(l, owner) \ argument 293 percpu_rwlock_t l = PERCPU_RW_LOCK_UNLOCKED(&get_per_cpu_var(owner)) 294 #define percpu_rwlock_resource_init(l, owner) \ argument 295 (*(l) = (percpu_rwlock_t)PERCPU_RW_LOCK_UNLOCKED(&get_per_cpu_var(owner)))
|
/xen/docs/man/ |
A D | xenstore-chmod.1.pod | 38 The first permission entry is the domain owning the key (the owner) 40 subsequent entries. The key owner always has full access (read,
|
A D | xenstore-ls.1.pod | 48 The first permission entry is the domain owning the key (the owner) 50 subsequent entries. The key owner always has full access (read,
|
A D | xen-vtpmmgr.7.pod | 99 Set the owner and SRK authdata for the TPM. If not specified, the
|
/xen/ |
A D | install.sh | 30 (cd $tmp; tar -cf - *) | tar --no-same-owner -C "$dst" -xf -
|
/xen/xen/arch/x86/pv/ |
A D | ro-page-fault.c | 321 const struct domain *owner = page_get_owner_and_reference(page); in mmio_ro_do_page_fault() local 323 if ( owner ) in mmio_ro_do_page_fault() 325 if ( owner != dom_io ) in mmio_ro_do_page_fault()
|
/xen/tools/ocaml/libs/xs/ |
A D | xs.mli | 23 - owner domid. 24 - other perm: applied to domain that is not owner or in ACL.
|
A D | xsraw.ml | 59 let owner, other, acl = perms in 64 String.concat "\000" (List.map string_of_perm ((owner,other) :: acl))
|
/xen/xen/arch/arm/ |
A D | mm.c | 1523 struct domain *owner; in page_get_owner_and_reference() local 1536 owner = page_get_owner(page); in page_get_owner_and_reference() 1537 ASSERT(owner); in page_get_owner_and_reference() 1539 return owner; in page_get_owner_and_reference() 1561 struct domain *owner = page_get_owner_and_reference(page); in get_page() local 1563 if ( likely(owner == domain) ) in get_page() 1566 if ( owner != NULL ) in get_page()
|
/xen/xen/arch/x86/mm/shadow/ |
A D | private.h | 480 struct domain *owner; in sh_mfn_is_a_page_table() local 486 owner = page_get_owner(page); in sh_mfn_is_a_page_table() 487 if ( owner && shadow_mode_refcounts(owner) in sh_mfn_is_a_page_table()
|
A D | multi.c | 827 struct domain *owner; in shadow_get_page_from_l1e() local 842 (owner = page_get_owner(mfn_to_page(mfn))) && in shadow_get_page_from_l1e() 843 (d != owner) ) in shadow_get_page_from_l1e() 845 res = xsm_priv_mapping(XSM_TARGET, d, owner); in shadow_get_page_from_l1e() 847 res = get_page_from_l1e(sl1e, d, owner); in shadow_get_page_from_l1e() 850 d->domain_id, mfn_x(mfn), owner->domain_id, in shadow_get_page_from_l1e()
|
A D | common.c | 1250 struct domain *owner = page_get_owner(pg); in shadow_free_p2m_page() local 1253 if ( owner || (pg->count_info & PGC_count_mask) ) in shadow_free_p2m_page() 1258 owner ? owner->domain_id : DOMID_INVALID, in shadow_free_p2m_page()
|
/xen/xen/arch/x86/ |
A D | mm.c | 2541 struct domain *owner; in page_get_owner_and_reference() local 2555 owner = page_get_owner(page); in page_get_owner_and_reference() 2556 ASSERT(owner); in page_get_owner_and_reference() 2558 return owner; in page_get_owner_and_reference() 2566 if ( likely(owner == domain) ) in get_page() 2575 if ( owner ) in get_page() 2613 if ( likely(owner != NULL) ) in validate_page() 2692 if ( likely(owner != NULL) && unlikely(paging_mode_enabled(owner)) ) in devalidate_page() 2697 ASSERT(shadow_mode_enabled(owner)); in devalidate_page() 4287 const struct domain *owner; in steal_page() local [all …]
|
A D | domain.c | 718 struct domain *owner; in arch_domain_soft_reset() local 748 owner = page_get_owner_and_reference(page); in arch_domain_soft_reset() 749 ASSERT( owner == d ); in arch_domain_soft_reset()
|
/xen/xen/common/ |
A D | grant_table.c | 984 struct domain *ld, *rd, *owner = NULL; in map_grant_ref() local 1120 owner = page_get_owner(pg); in map_grant_ref() 1122 if ( owner ) in map_grant_ref() 1125 if ( !pg || (owner == dom_io) ) in map_grant_ref() 1160 else if ( owner == rd || (dom_cow && owner == dom_cow) ) in map_grant_ref() 1164 if ( (owner == dom_cow) || in map_grant_ref() 1186 if ( (owner == dom_cow) || in map_grant_ref() 3413 struct domain *d, *owner; in cache_flush() local 3444 if ( !owner || !owner->grant_table ) in cache_flush() 3450 if ( d != owner ) in cache_flush() [all …]
|
A D | page_alloc.c | 1576 struct domain *owner; in offline_page() local 1612 if ( (pg->count_info & PGC_broken) && (owner = page_get_owner(pg)) ) in offline_page() 1615 domain_crash(owner); in offline_page() 1636 if ( (owner = page_get_owner_and_reference(pg)) ) in offline_page() 1647 (owner->domain_id << PG_OFFLINE_OWNER_SHIFT); in offline_page()
|
/xen/xen/arch/x86/mm/hap/ |
A D | hap.c | 298 struct domain *owner = page_get_owner(pg); in hap_free_p2m_page() local 305 if ( owner || (pg->count_info & PGC_count_mask) ) in hap_free_p2m_page() 310 owner ? owner->domain_id : DOMID_INVALID, in hap_free_p2m_page()
|
/xen/stubdom/grub.patches/ |
A D | 61btrfs.diff | 236 + __le64 owner; /* objectid of the root referincing this chunk */ 266 + __le64 owner; 437 + * owner of the block and the number of references 450 +/* dev extents record free space on individual devices. The owner 452 + * the extent. The chunk tree uuid field is a way to double check the owner 839 +BTRFS_SETGET_FUNCS(chunk_owner, struct btrfs_chunk, owner, 64); 856 +BTRFS_SETGET_STACK_FUNCS(stack_chunk_owner, struct btrfs_chunk, owner, 64); 1193 +BTRFS_SETGET_HEADER_FUNCS(header_owner, struct btrfs_header, owner, 64);
|
/xen/docs/misc/ |
A D | grant-tables.txt | 77 map->domid : owner of the mapped frame
|
/xen/tools/libxl/ |
A D | libxl.c | 42 ctx->nogc_gc.owner = ctx; in libxl_ctx_alloc()
|
A D | libxl_internal.h | 662 libxl_ctx *owner; member 832 (gc).owner = (ctx); \ 838 return gc->owner; in libxl__gc_owner()
|
A D | libxl_disk.c | 244 libxl_ctx *ctx = gc->owner; in device_disk_add()
|