1. 05 2月, 2018 2 次提交
  2. 02 2月, 2018 2 次提交
    • M
      qemuDomainRemoveMemoryDevice: unlink() memory backing file · 4d83a672
      Michal Privoznik 提交于
      https://bugzilla.redhat.com/show_bug.cgi?id=1461214
      
      Since fec8f9c4 we try to use predictable file names for
      'memory-backend-file' objects. But that made us provide full path
      to qemu when hot plugging the object while previously we provided
      merely a directory. But this makes qemu behave differently. If
      qemu sees a path terminated with a directory it calls mkstemp()
      and unlinks the file immediately. But if it sees full path it
      just calls open(path, O_CREAT ..); and never unlinks the file.
      Therefore it's up to libvirt to unlink the file and not leave it
      behind.
      Signed-off-by: NMichal Privoznik <mprivozn@redhat.com>
      4d83a672
    • P
      qemu: migration: Refresh device information after transferring state · 93db7eea
      Peter Krempa 提交于
      In my first approach in 4b480d10 I overlooked the comment in
      qemuMigrationRunIncoming stating that during actual migration the
      qemuMigrationRunIncoming does not wait until the migration is complete
      but rather offloads that to the Finish phase of migration.
      
      This means that during actual migration qemuProcessRefreshState was
      called prior to qemu actually transferring the full state and thus the
      queries did not get the correct information. The approach worked only
      for restore, where we wait for the migration to finish during qemu
      startup.
      
      Fix the issue by calling qemuProcessRefreshState both from
      qemuProcessStart if there's no incomming migration and from
      qemuMigrationFinish so that the code actually works as expected.
      93db7eea
  3. 31 1月, 2018 2 次提交
  4. 30 1月, 2018 1 次提交
  5. 26 1月, 2018 1 次提交
  6. 12 1月, 2018 1 次提交
  7. 10 1月, 2018 1 次提交
    • C
      security: full path option for DomainSetPathLabel · a5486e57
      Christian Ehrhardt 提交于
      virSecurityManagerDomainSetPathLabel is used to make a path known
      to the security modules, but today is used interchangably for
       - paths to files/dirs to be accessed directly
       - paths to a dir, but the access will actually be to files therein
      
      Depending on the security module it is important to know which of
      these types it will be.
      
      The argument allowSubtree augments the call to the implementations of
      DomainSetPathLabel that can - per security module - decide if extra
      actions shall be taken.
      
      For now dac/selinux handle this as before, but apparmor will make
      use of it to add a wildcard to the path that was passed.
      Signed-off-by: NChristian Ehrhardt <christian.ehrhardt@canonical.com>
      Signed-off-by: NMichal Privoznik <mprivozn@redhat.com>
      a5486e57
  8. 08 12月, 2017 1 次提交
  9. 06 12月, 2017 1 次提交
  10. 01 12月, 2017 1 次提交
  11. 24 11月, 2017 1 次提交
  12. 23 11月, 2017 2 次提交
  13. 13 11月, 2017 1 次提交
  14. 08 11月, 2017 3 次提交
  15. 03 11月, 2017 1 次提交
  16. 20 10月, 2017 2 次提交
  17. 19 10月, 2017 3 次提交
  18. 17 10月, 2017 3 次提交
  19. 16 10月, 2017 1 次提交
  20. 06 10月, 2017 2 次提交
  21. 05 10月, 2017 6 次提交
  22. 28 9月, 2017 1 次提交
    • J
      qemu: Introduce qemuDomainPrepareDiskSource · 5c09486c
      John Ferlan 提交于
      Introduce a function to setup any TLS needs for a disk source.
      
      If there's a configuration or other error setting up the disk source
      for TLS, then cause the domain startup to fail.
      
      For VxHS, follow the chardevTLS model where if the src->haveTLS hasn't
      been configured, then take the system/global cfg->haveTLS setting for
      the storage source *and* mark that we've done so via the tlsFromConfig
      setting in storage source.
      
      Next, if we are using TLS, then generate an alias into a virStorageSource
      'tlsAlias' field that will be used to create the TLS object and added to
      the disk object in order to link the two together for QEMU.
      Signed-off-by: NJohn Ferlan <jferlan@redhat.com>
      5c09486c
  23. 27 9月, 2017 1 次提交
    • P
      qemu: domain: Extract common clearing of VM private data · 3685e2dd
      Peter Krempa 提交于
      VM private data is cleared when the VM is turned off and also when the
      VM object is being freed. Some of the clearing code was duplicated.
      Extract it to a separate function.
      
      This also removes the now unnecessary function
      qemuDomainClearPrivatePaths.
      3685e2dd