/qemu/qga/ |
H A D | service-win32.c | 2 * QEMU Guest Agent helpers for win32 service management 15 #include "qga/service-win32.h" 103 SC_HANDLE service; in ga_install_service() local 110 printf_win_error("No full path to service's executable"); in ga_install_service() 132 g_debug("service's cmdline: %s", cmdline->str); in ga_install_service() 136 printf_win_error("No handle to service control manager"); in ga_install_service() 140 service = CreateService(manager, QGA_SERVICE_NAME, QGA_SERVICE_DISPLAY_NAME, in ga_install_service() 143 if (service == NULL) { in ga_install_service() 144 printf_win_error("Failed to install service"); in ga_install_service() 148 ChangeServiceConfig2(service, SERVICE_CONFIG_DESCRIPTION, &desc); in ga_install_service() [all …]
|
H A D | main.c | 37 #include "qga/service-win32.h" 84 const char *service; member 106 GAService service; member 291 " -s, --service service commands: install, uninstall, vss-install, vss-uninstall\n" in usage() 788 /* Start QEMU-ga's service */ in handle_serial_device_events() 797 /* Stop QEMU-ga's service */ in handle_serial_device_events() 813 GAService *service = &ga_state->service; in service_ctrl_handler() local 820 service->status.dwCurrentState = SERVICE_STOP_PENDING; in service_ctrl_handler() 821 SetServiceStatus(service->status_handle, &service->status); in service_ctrl_handler() 835 GAService *service = &ga_state->service; in service_main() local [all …]
|
/qemu/hw/uefi/ |
H A D | meson.build | 5 uefi_vars_ss.add(files('var-service-core.c', 6 'var-service-json.c', 7 'var-service-vars.c', 8 'var-service-auth.c', 9 'var-service-guid.c', 10 'var-service-utils.c', 11 'var-service-policy.c', 12 'var-service-sysbus.c')) 14 if_true: files('var-service-pkcs7.c'), 15 if_false: files('var-service-pkcs7-stub.c')) [all …]
|
H A D | var-service-core.c | 11 #include "hw/uefi/var-service.h" 12 #include "hw/uefi/var-service-api.h" 13 #include "hw/uefi/var-service-edk2.h" 122 trace_uefi_event("exit-boot-service"); in uefi_vars_cmd_mm()
|
H A D | var-service-sysbus.c | 13 #include "hw/uefi/var-service.h" 14 #include "hw/uefi/var-service-api.h"
|
/qemu/authz/ |
H A D | pamacct.c | 39 trace_qauthz_pam_check(authz, identity, pauthz->service); in qauthz_pam_is_allowed() 40 ret = pam_start(pauthz->service, in qauthz_pam_is_allowed() 64 const char *service, in qauthz_pam_prop_set_service() argument 69 g_free(pauthz->service); in qauthz_pam_prop_set_service() 70 pauthz->service = g_strdup(service); in qauthz_pam_prop_set_service() 80 return g_strdup(pauthz->service); in qauthz_pam_prop_get_service() 89 if (!pauthz->service) { in qauthz_pam_complete() 90 error_setg(errp, "The 'service' property must be set"); in qauthz_pam_complete() 101 g_free(pauthz->service); in qauthz_pam_finalize() 114 object_class_property_add_str(oc, "service", in qauthz_pam_class_init() [all …]
|
H A D | trace-events | 18 …m_check(void *authz, const char *identity, const char *service) "AuthZ PAM %p identity=%s service=…
|
/qemu/qapi/ |
H A D | cryptodev.json | 28 # The supported service types of a crypto device. 30 # @cipher: Symmetric Key Cipher service 32 # @hash: Hash service 34 # @mac: Message Authentication Codes service 36 # @aead: Authenticated Encryption with Associated Data service 38 # @akcipher: Asymmetric Key Cipher service 83 # @service: supported service types of a crypto device 91 'service': ['QCryptodevBackendServiceType'],
|
H A D | authz.json | 97 # @service: PAM service name to use for authorization 102 'data': { 'service': 'str' } } 110 # network service that authorization object is associated with.
|
H A D | ui.json | 474 # @service: The service name of the vnc port. This may depend on the 475 # host system's service database so symbolic names should not be 486 'service': 'str', 540 # @service: The service name of the server's port. This may depends 541 # on the host system's service database so symbolic names should 572 '*service': 'str', '*auth': 'str', '*clients': ['VncClientInfo']}, 669 # "service":"50402", 675 # "service":"50401", 733 # "service": "5901", "host": "0.0.0.0" }, 734 # "client": { "family": "ipv4", "service": "58425", [all …]
|
/qemu/include/hw/uefi/ |
H A D | var-service.h | 12 #include "hw/uefi/var-service-edk2.h" 99 /* vars-service-guid.c */ 119 /* vars-service-utils.c */ 134 /* vars-service-core.c */ 140 /* vars-service-json.c */ 145 /* vars-service-vars.c */ 159 /* vars-service-auth.c */ 167 /* vars-service-pkcs7.c */ 172 /* vars-service-siglist.c */ 181 /* vars-service-policy.c */
|
/qemu/backends/ |
H A D | cryptodev-hmp-cmds.c | 31 /* build a string like 'service=[akcipher|mac|hash|cipher]' */ in hmp_info_cryptodev() 32 for (sl = info->service; sl; sl = sl->next) { in hmp_info_cryptodev() 33 const char *service = QCryptodevBackendServiceType_str(sl->value); in hmp_info_cryptodev() local 36 services = g_strdup(service); in hmp_info_cryptodev() 38 tmp_services = g_strjoin("|", services, service, NULL); in hmp_info_cryptodev() 43 monitor_printf(mon, "%s: service=[%s]\n", info->id, services); in hmp_info_cryptodev()
|
/qemu/pc-bios/vof/ |
H A D | ci.c | 4 uint32_t service; member 20 if (strcmp("call-method", (void *)(unsigned long)pargs->service)) { in prom_handle() 51 static int call_ci(const char *service, int nargs, int nret, ...) in call_ci() argument 57 args.service = ADDR(service); in call_ci()
|
/qemu/scripts/ci/setup/ |
H A D | gitlab-runner.yml | 21 - name: Create a group for the gitlab-runner service 25 - name: Create a user for the gitlab-runner service 100 # The secondary runner will still run under the single gitlab-runner service 108 - name: Install the gitlab-runner service using its own functionality 113 - name: Enable the gitlab-runner service 114 service:
|
/qemu/include/authz/ |
H A D | pamacct.h | 51 * "service": "qemu-vnc-tls" 72 * -object authz-pam,id=authz0,service=qemu-vnc-tls 78 char *service; member 85 const char *service,
|
/qemu/include/hw/watchdog/ |
H A D | wdt_imx2.h | 26 IMX2_WDT_WSR = 0x0002, /* Service Register */ 47 /* Service Register definitions */ 48 #define IMX2_WDT_SEQ1 0x5555 /* service sequence 1 */ 49 #define IMX2_WDT_SEQ2 0xAAAA /* service sequence 2 */
|
/qemu/tests/qemu-iotests/ |
H A D | 231.out | 3 unable to get monitor info from DNS SRV with service name: ceph-mon 5 unable to get monitor info from DNS SRV with service name: ceph-mon 8 unable to get monitor info from DNS SRV with service name: ceph-mon
|
/qemu/scsi/ |
H A D | trace-events | 4 pr_manager_execute(int fd, int cmd, int sa) "fd=%d cmd=0x%02x service action=0x%02x" 5 pr_manager_run(int fd, int cmd, int sa) "fd=%d cmd=0x%02x service action=0x%02x"
|
/qemu/qga/vss-win32/ |
H A D | install.cpp | 570 /* Stop QGA VSS provider service using Winsvc API */ 577 SC_HANDLE service = NULL; in StopService() local 580 errmsg(E_FAIL, "Failed to open service manager"); in StopService() 584 service = OpenService(manager, QGA_PROVIDER_NAME, SC_MANAGER_ALL_ACCESS); in StopService() 586 if (!service) { in StopService() 587 errmsg(E_FAIL, "Failed to open service"); in StopService() 591 if (!(ControlService(service, SERVICE_CONTROL_STOP, NULL))) { in StopService() 592 errmsg(E_FAIL, "Failed to stop service"); in StopService() 597 CloseServiceHandle(service); in StopService()
|
/qemu/hw/ppc/ |
H A D | vof.c | 855 const char *service, in vof_client_handle() argument 863 cmpservice(service, nargs, nrets, (s), (a), (r)) in vof_client_handle() 923 trace_vof_error_unknown_service(service, nargs, nrets); in vof_client_handle() 934 uint32_t service; member 946 char service[64]; in vof_client_call() local 957 if (VOF_MEM_READ(be32_to_cpu(args_be.service), service, sizeof(service)) != in vof_client_call() 961 if (strnlen(service, sizeof(service)) == sizeof(service)) { in vof_client_call() 962 /* Too long service name */ in vof_client_call() 974 ret = vof_client_handle(ms, fdt, vof, service, args, nargs, rets, nret); in vof_client_call()
|
/qemu/ |
H A D | qemu.sasl | 15 # To use GSSAPI requires that a QEMU service principal is 32 # This file needs to be populated with the service principal that
|
/qemu/docs/system/ |
H A D | authz.rst | 192 "service": "qemu-vnc-tls" 222 -object authz-pam,id=authz0,service=qemu-vnc-tls 233 needs to be associated with a network service. The authorization driver object 236 The property to set in the network service will vary depending on the type of
|
/qemu/docs/specs/ |
H A D | fsi.rst | 2 IBM's Flexible Service Interface (FSI) 13 FSI allows a service processor access to the internal buses of a host POWER 32 3. The FSI master: A controller in the platform service processor (e.g. BMC)
|
/qemu/tests/functional/ |
H A D | test_arm_quanta_gsj.py | 50 'systemd.mask=systemd-random-seed.service ' 51 'systemd.mask=dropbearkey.service '
|
/qemu/scripts/ |
H A D | qemu-binfmt-conf.sh | 198 instead generate file for systemd-binfmt.service 221 With systemd, binfmt files are loaded by systemd-binfmt.service 270 if ! systemctl -q is-enabled systemd-binfmt.service ; then 271 echo "WARNING: systemd-binfmt.service is missing or disabled" 1>&2 297 echo "Setting $qemu as binfmt interpreter for $cpu for systemd-binfmt.service"
|