1. 13 12月, 2019 1 次提交
  2. 09 12月, 2019 4 次提交
  3. 28 11月, 2019 1 次提交
  4. 25 11月, 2019 1 次提交
  5. 21 11月, 2019 5 次提交
  6. 19 11月, 2019 1 次提交
  7. 15 11月, 2019 4 次提交
    • M
      tests: Mock access to /dev/kvm · 9e4445eb
      Michal Privoznik 提交于
      Some of our tests try to validate domain XMLs they are working
      with (not intentionally, simply because they call top level
      domain XML parse function). Anyway, this implies that we build
      domain capabilities also - see
      virQEMUDriverGetDomainCapabilities(). And since some domain XMLs
      are type of 'kvm' the control gets through
      virQEMUCapsFillDomainCaps() and virHostCPUGetKVMMaxVCPUs() to
      opening /dev/kvm which may be missing on the machine we're
      running 'make check'.
      
      Previously, we did not see this issue, because it was masked. If
      building domain capabilities failed for whatever reason, we
      ignored the failure. Only v5.9.0-207-gc69e6ede uncovered the
      problem (it changed reval from 0 to -1 if
      virQEMUDriverGetDomainCapabilities() fails). Since the referenced
      commit is correct, we need to mock access to /dev/kvm in our
      tests.
      Signed-off-by: NMichal Privoznik <mprivozn@redhat.com>
      9e4445eb
    • J
      Use g_mkdtemp instead of mkdtemp · ef886986
      Ján Tomko 提交于
      Prefer the GLib version to the one from gnulib.
      Signed-off-by: NJán Tomko <jtomko@redhat.com>
      Reviewed-by: NPeter Krempa <pkrempa@redhat.com>
      ef886986
    • J
      qemu: add 'ramfb' attribute for mediated devices · 4b95738c
      Jonathon Jongsma 提交于
      The 'ramfb' attribute provides a framebuffer to the guest that can be
      used as a boot display for the vgpu
      
      For example, the following configuration can be used to provide a vgpu
      with a boot display:
      
          <hostdev mode='subsystem' type='mdev' model='vfio-pci' display='on' ramfb='on'>
              <source>
                  <address uuid='$UUID'/>
              </source>
          </hostdev>
      Reviewed-by: NCole Robinson <crobinso@redhat.com>
      Signed-off-by: NJonathon Jongsma <jjongsma@redhat.com>
      4b95738c
    • J
      qemu: Set capabilities properly for tests · b9647356
      Jonathon Jongsma 提交于
      Several tests were not specifying the necessary qemu capabilities for
      what they were testing. Due to the way that the video devices are
      currently validated, this is not causing any problems. But a change to
      video device validation in a following patch would have exposed this
      issue and resulted in multiple test failures about the domain
      configuration not supporting particular video models.
      Reviewed-by: NCole Robinson <crobinso@redhat.com>
      Signed-off-by: NJonathon Jongsma <jjongsma@redhat.com>
      b9647356
  8. 13 11月, 2019 1 次提交
  9. 12 11月, 2019 1 次提交
  10. 07 11月, 2019 1 次提交
  11. 21 10月, 2019 3 次提交
  12. 18 10月, 2019 1 次提交
    • J
      conf: Add 'x' and 'y' resolution into video XML definition · 72862797
      Julio Faracco 提交于
      This commit adds resolution element with parameters 'x' and 'y' into video
      XML domain group definition. Both, properties were added into an element
      called 'resolution' and it was added inside 'model' element. They are set
      as optional. This element does not follow QEMU properties 'xres' and
      'yres' format. Both HTML documentation and schema were changed too. This
      commit includes a simple test case to cover resolution for QEMU video
      models. The new XML format for resolution looks like:
      
          <model ...>
            <resolution x='800' y='600'/>
          </model>
      Reviewed-by: NCole Robinson <crobinso@redhat.com>
      Signed-off-by: NJulio Faracco <jcfaracco@gmail.com>
      72862797
  13. 15 10月, 2019 2 次提交
  14. 10 10月, 2019 2 次提交
  15. 07 10月, 2019 1 次提交
  16. 02 10月, 2019 1 次提交
  17. 30 9月, 2019 1 次提交
    • D
      qemu: ensure vhostuser FD is initialized to -1 · 227925a2
      Daniel P. Berrangé 提交于
      The video private data was not initializing the vhostuser FD
      causing us to attempt to close FD 0 many times over.
      
      Fixes
      
        commit ca60ecfa
        Author: Marc-André Lureau <marcandre.lureau@redhat.com>
        Date:   Mon Sep 23 14:44:36 2019 +0400
      
            qemu: add qemuDomainVideoPrivate
      
      Since the test suite does not invoke qemuExtDevicesStart(), no
      vhost_user_fd will be present when generating test XML. To deal
      with this we can must a fake FD number. While the current XML
      is using FD == 0, we pick a very interesting number that's unlikely
      to be a real FD, so that we're more likely to see any mistakes
      closing the invalid FD.
      Reviewed-by: NMichal Privoznik <mprivozn@redhat.com>
      Signed-off-by: NDaniel P. Berrangé <berrange@redhat.com>
      227925a2
  18. 25 9月, 2019 3 次提交
  19. 19 9月, 2019 1 次提交
  20. 13 9月, 2019 1 次提交
  21. 10 9月, 2019 1 次提交
    • L
      qemu: support unmanaged target tap dev for <interface type='ethernet'> · 7cd0911e
      Laine Stump 提交于
      If managed='no', then the tap device must already exist, and setting
      of MAC address and online status (IFF_UP) is skipped.
      
      NB: we still set IFF_VNET_HDR and IFF_MULTI_QUEUE as appropriate,
      because those bits must be properly set in the TUNSETIFF we use to set
      the tap device name of the handle we've opened - if IFF_VNET_HDR has
      not been set and we set it the request will be honored even when
      running libvirtd unprivileged; if IFF_MULTI_QUEUE is requested to be
      different than how it was created, that will result in an error from
      the kernel. This means that you don't need to pay attention to
      IFF_VNET_HDR when creating the tap devices, but you *do* need to set
      IFF_MULTI_QUEUE if you're going to use multiple queues for your tap
      device.
      
      NB2: /dev/vhost-net normally has permissions 600, so it can't be
      opened by an unprivileged process. This would normally cause a warning
      message when using a virtio net device from an unprivileged
      libvirtd. I've found that setting the permissions for /dev/vhost-net
      permits unprivileged libvirtd to use vhost-net for virtio devices, but
      have no idea what sort of security implications that has. I haven't
      changed libvrit's code to avoid *attempting* to open /dev/vhost-net -
      if you are concerned about the security of opening up permissions of
      /dev/vhost-net (probably a good idea at least until we ask someone who
      knows about the code) then add <driver name='qemu'/> to the interface
      definition and you'll avoid the warning message.
      
      Note that virNetDevTapCreate() is the correct function to call in the
      case of an existing device, because the same ioctl() that creates a
      new tap device will also open an existing tap device.
      
      Resolves: https://bugzilla.redhat.com/1723367 (partially)
      Signed-off-by: NLaine Stump <laine@redhat.com>
      Reviewed-by: NDaniel P. Berrangé <berrange@redhat.com>
      7cd0911e
  22. 09 9月, 2019 1 次提交
  23. 06 9月, 2019 1 次提交
  24. 28 8月, 2019 1 次提交