diff options
author | emellor@leeni.uk.xensource.com <emellor@leeni.uk.xensource.com> | 2005-12-02 01:34:39 +0000 |
---|---|---|
committer | emellor@leeni.uk.xensource.com <emellor@leeni.uk.xensource.com> | 2005-12-02 01:34:39 +0000 |
commit | d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34 (patch) | |
tree | 793405b025300392e4bad8b1b3cbd5c7a79e8e5b /tools/xenstore/xenstored_domain.c | |
parent | 3ceb6ce6b7bff36c32f852aafd305cad1008e1d3 (diff) | |
download | xen-d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34.tar.gz xen-d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34.tar.bz2 xen-d3079e26113a4cd1ebcdd7fd5fad8d65c7081f34.zip |
Initialise the connection ID when a domain is introduced. This (re)enables
the permission checking in xenstored.
Default the store permissions to read/write nobody (apart from the privileged
domain). Create a /local node with these permissions, ready for inheriting by
children. In Xend, create a /vm node with these permissions too, for the same
reason, and set the permissions on /local/domain/<domid> and each device
backend path to allow the guest domain to access these paths appropriately.
Added xstransact.{set_permissions,SetPermissions,mkdir,Mkdir,complete} as
support facilities.
This closes bug #290.
Signed-off-by: Ewan Mellor <ewan@xensource.com>
Diffstat (limited to 'tools/xenstore/xenstored_domain.c')
-rw-r--r-- | tools/xenstore/xenstored_domain.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/tools/xenstore/xenstored_domain.c b/tools/xenstore/xenstored_domain.c index 47683558e4..353ef9b7ac 100644 --- a/tools/xenstore/xenstored_domain.c +++ b/tools/xenstore/xenstored_domain.c @@ -287,6 +287,7 @@ static struct domain *new_domain(void *context, unsigned int domid, domain->conn = new_connection(writechn, readchn); domain->conn->domain = domain; + domain->conn->id = domid; domain->remote_port = port; domain->mfn = mfn; |