aboutsummaryrefslogtreecommitdiffstats
path: root/tools/xenstore/xenstored_domain.c
diff options
context:
space:
mode:
authoremellor@leeni.uk.xensource.com <emellor@leeni.uk.xensource.com>2005-12-02 01:34:39 +0000
committeremellor@leeni.uk.xensource.com <emellor@leeni.uk.xensource.com>2005-12-02 01:34:39 +0000
commitd3079e26113a4cd1ebcdd7fd5fad8d65c7081f34 (patch)
tree793405b025300392e4bad8b1b3cbd5c7a79e8e5b /tools/xenstore/xenstored_domain.c
parent3ceb6ce6b7bff36c32f852aafd305cad1008e1d3 (diff)
downloadxen-d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34.tar.gz
xen-d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34.tar.bz2
xen-d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34.zip
Initialise the connection ID when a domain is introduced. This (re)enables
the permission checking in xenstored. Default the store permissions to read/write nobody (apart from the privileged domain). Create a /local node with these permissions, ready for inheriting by children. In Xend, create a /vm node with these permissions too, for the same reason, and set the permissions on /local/domain/<domid> and each device backend path to allow the guest domain to access these paths appropriately. Added xstransact.{set_permissions,SetPermissions,mkdir,Mkdir,complete} as support facilities. This closes bug #290. Signed-off-by: Ewan Mellor <ewan@xensource.com>
Diffstat (limited to 'tools/xenstore/xenstored_domain.c')
-rw-r--r--tools/xenstore/xenstored_domain.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/tools/xenstore/xenstored_domain.c b/tools/xenstore/xenstored_domain.c
index 47683558e4..353ef9b7ac 100644
--- a/tools/xenstore/xenstored_domain.c
+++ b/tools/xenstore/xenstored_domain.c
@@ -287,6 +287,7 @@ static struct domain *new_domain(void *context, unsigned int domid,
domain->conn = new_connection(writechn, readchn);
domain->conn->domain = domain;
+ domain->conn->id = domid;
domain->remote_port = port;
domain->mfn = mfn;