]> git.ipfire.org Git - thirdparty/libvirt.git/commitdiff
Don't try to add non-existant devices to ACL
authorDaniel P. Berrange <berrange@redhat.com>
Wed, 27 Feb 2013 16:57:16 +0000 (16:57 +0000)
committerEric Blake <eblake@redhat.com>
Tue, 21 May 2013 20:02:58 +0000 (14:02 -0600)
The QEMU driver has a list of devices nodes that are whitelisted
for all guests. The kernel has recently started returning an
error if you try to whitelist a device which does not exist.
This causes a warning in libvirt logs and an audit error for
any missing devices. eg

2013-02-27 16:08:26.515+0000: 29625: warning : virDomainAuditCgroup:451 : success=no virt=kvm resrc=cgroup reason=allow vm="vm031714" uuid=9d8f1de0-44f4-a0b1-7d50-e41ee6cd897b cgroup="/sys/fs/cgroup/devices/libvirt/qemu/vm031714/" class=path path=/dev/kqemu rdev=? acl=rw

Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
(cherry picked from commit 7f544a4c8f0353e4ff9ca08aafbb86ff8f60da0a)

src/qemu/qemu_cgroup.c

index 677fc424d06af4043520bb5a21c038c26a3c64b5..e74cd7413aa329220269c4bce357494b73883792 100644 (file)
@@ -263,6 +263,12 @@ int qemuSetupCgroup(struct qemud_driver *driver,
         }
 
         for (i = 0; deviceACL[i] != NULL ; i++) {
+            if (access(deviceACL[i], F_OK) < 0) {
+                VIR_DEBUG("Ignoring non-existant device %s",
+                          deviceACL[i]);
+                continue;
+            }
+
             rc = virCgroupAllowDevicePath(cgroup, deviceACL[i],
                                           VIR_CGROUP_DEVICE_RW);
             virDomainAuditCgroupPath(vm, cgroup, "allow", deviceACL[i], "rw", rc);