]> git.ipfire.org Git - thirdparty/libvirt.git/log
thirdparty/libvirt.git
6 years agoxen: drop xen_sxpr.(c|h)
Peter Krempa [Wed, 3 Jul 2019 07:59:06 +0000 (09:59 +0200)] 
xen: drop xen_sxpr.(c|h)

The files are now completely unused. Remove them.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxen: Move xenParseSxprChar to xen_common
Peter Krempa [Wed, 3 Jul 2019 07:44:51 +0000 (09:44 +0200)] 
xen: Move xenParseSxprChar to xen_common

It's the only place where it's used.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxen: Move xenParseSxprVifRate to xen_common
Peter Krempa [Wed, 3 Jul 2019 07:44:51 +0000 (09:44 +0200)] 
xen: Move xenParseSxprVifRate to xen_common

It's the only place where it's used.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxen: Move xenParseSxprSound to xen_common
Peter Krempa [Wed, 3 Jul 2019 07:30:11 +0000 (09:30 +0200)] 
xen: Move xenParseSxprSound to xen_common

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxenconfig: Remove pointless label in xenParseSxprSound
Peter Krempa [Wed, 3 Jul 2019 06:41:38 +0000 (08:41 +0200)] 
xenconfig: Remove pointless label in xenParseSxprSound

The 'error' label just returned -1. Inline it.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxenconfig: Drop unused sexpr parsing infrastructure
Peter Krempa [Wed, 3 Jul 2019 07:22:15 +0000 (09:22 +0200)] 
xenconfig: Drop unused sexpr parsing infrastructure

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agotests: Drop sexpr2xmltest
Peter Krempa [Wed, 3 Jul 2019 06:36:09 +0000 (08:36 +0200)] 
tests: Drop sexpr2xmltest

Now that we no longer support sexpr conversion to the internal config we
can drop the test.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agolibxl: Drop support for parsing sxpr format in libxlConnectDomainXMLFromNative
Peter Krempa [Wed, 3 Jul 2019 06:16:47 +0000 (08:16 +0200)] 
libxl: Drop support for parsing sxpr format in libxlConnectDomainXMLFromNative

We've dropped old xend support over a year ago. At this point we can
also drop support for parsing very old configs.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxen: Move xenFormatSxprChr to xen_common
Peter Krempa [Wed, 3 Jul 2019 07:15:37 +0000 (09:15 +0200)] 
xen: Move xenFormatSxprChr to xen_common

That's the only file using the helper function.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxenconfig: Move guts of xenFormatSxprSound into xenFormatSound
Peter Krempa [Wed, 3 Jul 2019 07:04:01 +0000 (09:04 +0200)] 
xenconfig: Move guts of xenFormatSxprSound into xenFormatSound

Use new coding style to merge the only use of xenFormatSxprSound into
the caller.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoxenconfig: Drop sxpr formatter
Peter Krempa [Wed, 3 Jul 2019 06:50:00 +0000 (08:50 +0200)] 
xenconfig: Drop sxpr formatter

It's no longer used. Remove the dead code.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agotests: Remove xml2sexprtest
Peter Krempa [Wed, 3 Jul 2019 06:25:15 +0000 (08:25 +0200)] 
tests: Remove xml2sexprtest

The test was the only place calling 'xenFormatSxpr'. Drop it as there
are no other users of that code since we've dropped xend support in
commit 1dac5fbbbb06a03.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agosnapshot: Fix virDomainUndefineFlags docs regarding snapshots
Eric Blake [Sat, 6 Jul 2019 03:55:40 +0000 (22:55 -0500)] 
snapshot: Fix virDomainUndefineFlags docs regarding snapshots

The docs talked about an active snapshot when they meant an active
domain; they also claimed the flag was a no-op for hypervisors with no
snapshot metadata even though the flag is currently rejected as
unrecognized for hypervisors with no snapshot support at all.  A later
patch may teach more drivers to ignore the flag as a no-op, but that
shouldn't conflict with the wording chosen here (since a new client
talking to an old server still runs into the same issue, even if a
newer server becomes more tolerant).

Reported-by: Peter Krempa <pkrempa@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
Acked-by: Peter Krempa <pkrempa@redhat.com>
6 years agosnapshot: Rename qemu domain snapshot test files
Eric Blake [Fri, 5 Jul 2019 18:24:40 +0000 (13:24 -0500)] 
snapshot: Rename qemu domain snapshot test files

Make it obvious that the domainsnapshotxml2xml test is only run when
compiling in support for qemu.

Suggested-by: Peter Krempa <pkrempa@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
Acked-by: Peter Krempa <pkrempa@redhat.com>
6 years agolibvirt: remove link to outdated mailing list post
Daniel P. Berrangé [Fri, 5 Jul 2019 13:37:12 +0000 (14:37 +0100)] 
libvirt: remove link to outdated mailing list post

The virConnectGetType() method has an unfortunate signature, returning a
static string that must not be freed by the caller. The remote driver,
however, gets this string dynamically over an RPC call, which raised a
design discussion on the mailing list. Eventually the problem was
resolved by having the remote driver cache the returned string
internally and free it when the connection was closed.

The link to the mailing list is thus talking about a problem that does
not actually exist in the final implementation, and at best serves to
confuse the reader into thinking there might be a memory leak.

Reviewed-by: Ján Tomko <jtomko@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemu: Validate disk against domain def on coldplug
Michal Privoznik [Wed, 26 Jun 2019 13:35:11 +0000 (15:35 +0200)] 
qemu: Validate disk against domain def on coldplug

https://bugzilla.redhat.com/show_bug.cgi?id=1692296#c7

This is a counterpart for ddc72f99027 and implements the same
check for coldplug.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agorpc: ensure thread safe initialization of SASL library
Daniel P. Berrangé [Mon, 8 Jul 2019 10:32:38 +0000 (11:32 +0100)] 
rpc: ensure thread safe initialization of SASL library

Neither the sasl_client_init or sasl_server_init methods are even
remotely threadsafe. They do a bunch of one-time initialization and
merely use a simple integer counter to avoid repeated work, not even
using atomic increment/reads on the counter. This can easily race in a
threaded program. Protect the calls using a virOnce initializer function
which is guaranteed threadsafe at least from libvirt's POV.

If the application using libvirt also uses another library that makes
use of SASL then the race still exists. It is impossible to fix that
fully except in SASL code itself.

Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agom4: Fix check for yajl.pc
Andrea Bolognani [Mon, 8 Jul 2019 07:55:30 +0000 (09:55 +0200)] 
m4: Fix check for yajl.pc

Commit 44b8df4cb4b3 introduced a check for yajl.pc that is
extremely similar to the one we already had in place for
readline.pc - so similar, in fact, that it's still looking
for readline.pc instead of yajl.pc :)

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosnapshot: Refactor test to utilize virDomainMoment more
Eric Blake [Wed, 12 Jun 2019 15:48:15 +0000 (10:48 -0500)] 
snapshot: Refactor test to utilize virDomainMoment more

Similar to commit a487890d for qemu, a little bit of refactoring in
the snapshot delete code will make it easier to reuse functionality
for checkpoints.

Signed-off-by: Eric Blake <eblake@redhat.com>
Acked-by: Peter Krempa <pkrempa@redhat.com>
6 years agodocs: minor updates to to new API doc
Jonathon Jongsma [Fri, 5 Jul 2019 19:28:29 +0000 (14:28 -0500)] 
docs: minor updates to to new API doc

Fix a filename and add a couple missing words.

Signed-off-by: Jonathon Jongsma <jjongsma@redhat.com>
Message-Id: <20190705192829.1223-1-jjongsma@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
6 years agoremote: conditionally declare tty variable for non-Win32 platforms
Daniel P. Berrangé [Thu, 4 Jul 2019 10:24:37 +0000 (11:24 +0100)] 
remote: conditionally declare tty variable for non-Win32 platforms

The 'tty' variable is only used on Win32. Instead of just annotating it
with ATTRIBUTE_UNUSED, make its declaration conditional on WIN32 so that
it is clear why it is not used.

Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoremote: use autofree for many string variables
Daniel P. Berrangé [Thu, 4 Jul 2019 10:22:11 +0000 (11:22 +0100)] 
remote: use autofree for many string variables

Simplify the clean code paths for doRemoteOpen by using VIR_AUTOFREE

Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoremote: stop declaring variables in the middle of a function
Daniel P. Berrangé [Wed, 3 Jul 2019 17:52:32 +0000 (18:52 +0100)] 
remote: stop declaring variables in the middle of a function

The doRemoteOpen method was a little unusual in declaring a bunch of
local variables in the middle of the function. Move them to the top as
it is normal libvirt style.

Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agotests: fix mocking of virFileGetXAttrQuiet on FreeBSD
Daniel P. Berrangé [Fri, 5 Jul 2019 17:14:52 +0000 (18:14 +0100)] 
tests: fix mocking of virFileGetXAttrQuiet on FreeBSD

The qemusecuritytest is failing on FreeBSD 11/12, reporting that files
are not correctly restored. Debugging code printfs show that the
virFileGetXAttrQuiet mock is returning 0, but the virFileGetXAttr
function is seeing -1 as the return value.

Essentially there appears to be some kind of optimization between the
real virFileGetXAttrQuiet and the real virFileGetXAttr, which breaks
when we mock virFileGetXAttrQuiet. Rather than trying to figure out
how to avoid this, it is simpler to just mock virFileGetXAttr too
since it is very short code.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agotest_driver: implement testDomainGetInterfaceParameters
Ilias Stamatis [Tue, 2 Jul 2019 13:49:44 +0000 (15:49 +0200)] 
test_driver: implement testDomainGetInterfaceParameters

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agotest_driver: implement virDomainGetNumaParameters
Ilias Stamatis [Tue, 2 Jul 2019 13:49:43 +0000 (15:49 +0200)] 
test_driver: implement virDomainGetNumaParameters

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agotest_driver: implement virDomainGetMemoryParameters
Ilias Stamatis [Tue, 2 Jul 2019 13:49:42 +0000 (15:49 +0200)] 
test_driver: implement virDomainGetMemoryParameters

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agotest: ensure nerrors variable is initialized
Daniel P. Berrangé [Thu, 4 Jul 2019 13:20:35 +0000 (14:20 +0100)] 
test: ensure nerrors variable is initialized

There is an error path that jumps over the initialization of
nerrors, and the jump target reads the variable contents.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agotest_driver: Implement virDomainSetPerfEvents
Ilias Stamatis [Wed, 3 Jul 2019 11:54:18 +0000 (13:54 +0200)] 
test_driver: Implement virDomainSetPerfEvents

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agotest_driver: sanitize user-provided array in testDomainGetDiskErrors
Ilias Stamatis [Thu, 4 Jul 2019 11:31:34 +0000 (13:31 +0200)] 
test_driver: sanitize user-provided array in testDomainGetDiskErrors

Zero out the user provided memory in order to avoid potentially freeing
uninitialized memory.

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agoremote: mention libssh in error message
Pino Toscano [Thu, 4 Jul 2019 10:38:26 +0000 (12:38 +0200)] 
remote: mention libssh in error message

Mention libssh as possible transport in the error message of an
unrecognized transport.

https://bugzilla.redhat.com/show_bug.cgi?id=1727013

Signed-off-by: Pino Toscano <ptoscano@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoRevert "remote: remove unused constant for libvirtd config file"
Peter Krempa [Thu, 4 Jul 2019 07:22:50 +0000 (09:22 +0200)] 
Revert "remote: remove unused constant for libvirtd config file"

The constant is not unused and breaks the build of the remote driver.

This reverts commit 86fbce56f27e06b34d63879c9f634a58a1e0a04a.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
6 years agoremote: remove unused constant for libvirtd config file
Daniel P. Berrangé [Wed, 3 Jul 2019 17:27:29 +0000 (18:27 +0100)] 
remote: remove unused constant for libvirtd config file

The LIBVIRTD_CONFIGURATION_FILE constant was introduced in

  commit b7c42619e69acd8416be88b8aa3b4161bc813f8a
  Author: Richard W.M. Jones <rjones@redhat.com>
  Date:   Mon Jun 11 11:43:41 2007 +0000

    Mon Jun 11 12:41:00 BST 2007 Richard W.M. Jones <rjones@redhat.com>

and then never used !

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agomingw: distribute schemas/networkport.rng
Cole Robinson [Wed, 3 Jul 2019 16:16:20 +0000 (12:16 -0400)] 
mingw: distribute schemas/networkport.rng

Signed-off-by: Cole Robinson <crobinso@redhat.com>
6 years agoremote: remove obsolete params from sysconf file
Daniel P. Berrangé [Wed, 3 Jul 2019 13:12:10 +0000 (14:12 +0100)] 
remote: remove obsolete params from sysconf file

The LIBVIRTD_CONFIG and LIBVIRTD_NOFILES_LIMIT parameters were only
honoured when using the sysvinit scripts. This was removed already in

    commit 912fe2df9d8628b2f3d54485f1cb919cb124d07a
    Author: Andrea Bolognani <abologna@redhat.com>
    Date:   Fri Mar 15 16:47:27 2019 +0100

      Drop support for "Red Hat" init scripts

so the parameters can safely be dropped.

Reviewed-by: Jiri Denemark <jdenemar@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoremote: remove obsolete rule for generating sysvinit script
Daniel P. Berrangé [Wed, 3 Jul 2019 13:04:37 +0000 (14:04 +0100)] 
remote: remove obsolete rule for generating sysvinit script

The sysvinit script was previously removed in

  commit 912fe2df9d8628b2f3d54485f1cb919cb124d07a
  Author: Andrea Bolognani <abologna@redhat.com>
  Date:   Fri Mar 15 16:47:27 2019 +0100

    Drop support for "Red Hat" init scripts

A make rule was accidentally left behind.

Reviewed-by: Andrea Bolognani <abologna@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agotests: Use the new DO_TEST_CAPS_*() macros
Andrea Bolognani [Tue, 2 Jul 2019 14:36:55 +0000 (16:36 +0200)] 
tests: Use the new DO_TEST_CAPS_*() macros

There are probably more situations where they could be taken
advantage of, but these are very obvious scenarios because we
either manage to get rid of a bunch of explicit capabilities,
or we make a bunch of related test cases all use the macros
by switching the only odd one out.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agotests: Add more DO_TEST_CAPS_*() macros
Andrea Bolognani [Tue, 2 Jul 2019 15:37:20 +0000 (17:37 +0200)] 
tests: Add more DO_TEST_CAPS_*() macros

Right now we have macros such as DO_TEST_CAPS_LATEST_PARSE_ERROR()
and DO_TEST_CAPS_ARCH_VER(), but there is no concise way to say
"using this version of QEMU on this architecture will result in a
failure".

This commit adds

  DO_TEST_CAPS_ARCH_LATEST_FAILURE()
  DO_TEST_CAPS_ARCH_VER_FAILURE()
  DO_TEST_CAPS_ARCH_LATEST_PARSE_ERROR()
  DO_TEST_CAPS_ARCH_VER_PARSE_ERROR()

and reworks

  DO_TEST_CAPS_LATEST_FAILURE()
  DO_TEST_CAPS_LATEST_PARSE_ERROR()

to use the corresponding DO_CAPS_TEST_ARCH_*() macros instead of
using DO_TEST_CAPS_ARCH_LATEST_FULL() directly.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agotests: Add DO_TEST_CAPS_ARCH_VER_FULL()
Andrea Bolognani [Tue, 2 Jul 2019 15:35:33 +0000 (17:35 +0200)] 
tests: Add DO_TEST_CAPS_ARCH_VER_FULL()

It mirrors the existing DO_TEST_CAPS_ARCH_LATEST_FULL(), and is
now used to implement DO_TEST_CAPS_ARCH_VER().

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agotests: Reorder DO_TEST_CAPS_*() macros
Andrea Bolognani [Tue, 2 Jul 2019 15:33:31 +0000 (17:33 +0200)] 
tests: Reorder DO_TEST_CAPS_*() macros

Make sure the order is consistent between xml2argv and xml2xml,
and make room for more macros that are going to be introduced
shortly.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agotest_driver: Implement virDomainGetPerfEvents
Ilias Stamatis [Fri, 28 Jun 2019 16:15:01 +0000 (18:15 +0200)] 
test_driver: Implement virDomainGetPerfEvents

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agotest_driver: Call virCheckFlags in testDomainReboot
Ilias Stamatis [Thu, 20 Jun 2019 09:48:57 +0000 (11:48 +0200)] 
test_driver: Call virCheckFlags in testDomainReboot

Currently the flags argument is completely ignored, but it should be
checked for any unsupported flags that might have been passed.

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agotest_driver: Implement virDomainGetFSInfo
Ilias Stamatis [Tue, 25 Jun 2019 21:58:07 +0000 (23:58 +0200)] 
test_driver: Implement virDomainGetFSInfo

Always return / and /boot as the mount points imitating the default
Fedora installation. Use the first disk found, otherwise if no disk
device of type VIR_DOMAIN_DISK_DEVICE_DISK is present, return 0 mount
points.

Reviewed-by: Erik Skultety <eskultet@redhat.com>
Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
6 years agotest_driver: Add a disk device in the default config
Ilias Stamatis [Tue, 25 Jun 2019 21:58:06 +0000 (23:58 +0200)] 
test_driver: Add a disk device in the default config

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agovirDomainGetPerfEvents: Note that typed params flags are also supported
Ilias Stamatis [Fri, 28 Jun 2019 16:38:17 +0000 (18:38 +0200)] 
virDomainGetPerfEvents: Note that typed params flags are also supported

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agoqemu: Remove a redundant function call from qemuDomainGetPerfEvents
Ilias Stamatis [Mon, 1 Jul 2019 14:15:00 +0000 (16:15 +0200)] 
qemu: Remove a redundant function call from qemuDomainGetPerfEvents

Calling virDomainObjUpdateModificationImpact directly inside the
function body is redundant, since the same function call is embedded
into virDomainObjGetOneDef.

Signed-off-by: Ilias Stamatis <stamatis.iliass@gmail.com>
Reviewed-by: Erik Skultety <eskultet@redhat.com>
6 years agoqemu: De-duplicate some path definitions
Michal Privoznik [Tue, 25 Jun 2019 11:21:39 +0000 (13:21 +0200)] 
qemu: De-duplicate some path definitions

There are some paths (e.g. /dev/vfio/vfio or /dev/mapper/control)
which are defined in qemu_domain.c and then in qemu_cgroup.c
again. This is suboptimal. Let's move paths into qemu_domain.h and
drop duplicate definitions.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Andrea Bolognani <abologna@redhat.com>
6 years agotest_driver: Don't report VIR_DOMAIN_DISK_ERROR_NONE
Michal Privoznik [Tue, 14 May 2019 15:09:19 +0000 (17:09 +0200)] 
test_driver: Don't report VIR_DOMAIN_DISK_ERROR_NONE

In my review of 89320788ac4 I've simplified assigning disk errors
too much as the code I've changed it to will set
VIR_DOMAIN_DISK_ERROR_NONE. This is in contradiction with our
documentation which specifies that disks with no errors are not
reported.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Andrea Bolognani <abologna@redhat.com>
6 years agotest_driver: Don't access @vm after it was set to NULL
Michal Privoznik [Tue, 14 May 2019 15:05:45 +0000 (17:05 +0200)] 
test_driver: Don't access @vm after it was set to NULL

If something goes wrong in testDomainGetDiskErrors() then we try
to free any strings that were previously allocated in return
array. Problem is, in my review of original patch (89320788ac4)
I've mistakenly did some changes which result in possible NULL
dereference (@vm is set to NULL as the first thing under cleanup
label).

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Andrea Bolognani <abologna@redhat.com>
6 years agodocs: Provide documentation for SEV launch security
Erik Skultety [Thu, 20 Jun 2019 08:14:59 +0000 (10:14 +0200)] 
docs: Provide documentation for SEV launch security

Signed-off-by: Erik Skultety <eskultet@redhat.com>
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
6 years agoRevert "qemu: Temporary disable owner remembering"
Michal Privoznik [Tue, 15 Jan 2019 08:50:58 +0000 (09:50 +0100)] 
Revert "qemu: Temporary disable owner remembering"

This reverts commit fc3990c7e64be1da1631952d3ec384ebef50e125.

Now that all the reported bugs are fixed let's turn the feature
back on.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemu: Move image security metadata on snapshot activity
Michal Privoznik [Mon, 25 Mar 2019 16:02:44 +0000 (17:02 +0100)] 
qemu: Move image security metadata on snapshot activity

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemu_security: Implement qemuSecurityMoveImageMetadata
Michal Privoznik [Thu, 21 Mar 2019 15:36:38 +0000 (16:36 +0100)] 
qemu_security: Implement qemuSecurityMoveImageMetadata

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity_selinux: Implement virSecurityManagerMoveImageMetadata
Michal Privoznik [Thu, 21 Mar 2019 15:21:27 +0000 (16:21 +0100)] 
security_selinux: Implement virSecurityManagerMoveImageMetadata

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity_dac: Implement virSecurityManagerMoveImageMetadata
Michal Privoznik [Thu, 21 Mar 2019 14:45:29 +0000 (15:45 +0100)] 
security_dac: Implement virSecurityManagerMoveImageMetadata

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity_util: Introduce virSecurityMoveRememberedLabel
Michal Privoznik [Thu, 21 Mar 2019 14:44:52 +0000 (15:44 +0100)] 
security_util: Introduce virSecurityMoveRememberedLabel

A simple helper function that would be used from DAC and SELinux
drivers.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity: Introduce virSecurityManagerMoveImageMetadata
Michal Privoznik [Thu, 21 Mar 2019 10:44:21 +0000 (11:44 +0100)] 
security: Introduce virSecurityManagerMoveImageMetadata

The purpose of this API is to allow caller move XATTRs (or remove
them) from one file to another. This will be needed when moving
top level of disk chain (either by introducing new HEAD or
removing it).

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity: Don't remember owner for shared resources
Michal Privoznik [Fri, 15 Feb 2019 10:37:03 +0000 (11:37 +0100)] 
security: Don't remember owner for shared resources

This effectively reverts d7420430ce6 and adds new code.

Here is the problem: Imagine a file X that is to be shared
between two domains as a disk. Let the first domain (vm1) have
seclabel remembering turned on and the other (vm2) has it turned
off. Assume that both domains will run under the same user, but
the original owner of X is different (i.e. trying to access X
without relabelling leads to EPERM).

Let's start vm1 first. This will cause X to be relabelled and to
gain new attributes:

  trusted.libvirt.security.ref_dac="1"
  trusted.libvirt.security.dac="$originalOwner"

When vm2 is started, X will again be relabelled, but since the
new label is the same as X already has (because of vm1) nothing
changes and vm1 and vm2 can access X just fine. Note that no
XATTR is changed (especially the refcounter keeps its value of 1)
because the vm2 domain has the feature turned off.

Now, vm1 is shut off and vm2 continues running. In seclabel
restore process we would get to X and since its refcounter is 1
we would restore the $originalOwner on it. But this is unsafe to
do because vm2 is still using X (remember the assumption that
$originalOwner and vm2's seclabel are distinct?).

The problem is that refcounter stored in XATTRs doesn't reflect
the actual times a resource is in use. Since I don't see any easy
way around it let's just not store original owner on shared
resources. Shared resource in world of domain disks is:

  - whole backing chain but the top layer,
  - read only disk (we don't require CDROM to be explicitly
    marked as shareable),
  - disk marked as shareable.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
6 years agoqemusecuritymock: Allow some paths to be not restored
Michal Privoznik [Thu, 18 Apr 2019 09:05:18 +0000 (11:05 +0200)] 
qemusecuritymock: Allow some paths to be not restored

Some paths will not be restored. Because we can't possibly know
if they are still in use or not. Reflect this in the test so that
we can test more domains. Also see next commit for more detailed
explanation.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity_selinux: Allow caller to suppress owner remembering
Michal Privoznik [Fri, 15 Feb 2019 14:36:06 +0000 (15:36 +0100)] 
security_selinux: Allow caller to suppress owner remembering

Just like previous commit allowed to enable or disable owner
remembering for each individual path, do the same for SELinux
driver. This is going to be needed in the next commit.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity_dac: Allow caller to suppress owner remembering
Michal Privoznik [Fri, 15 Feb 2019 10:20:19 +0000 (11:20 +0100)] 
security_dac: Allow caller to suppress owner remembering

One caller in particular (virSecurityDACSetImageLabelInternal)
will want to have the feature turned on only in some cases.
Introduce @remember member to _virSecurityDACChownItem to track
whether caller wants to do owner remembering or not.
The actual remembering is then enabled if both caller wanted it
and the feature is turned on in the config file.

Technically, we could skip over paths that don't have remember
enabled when creating a list of paths to lock. We won't touch
their XATTRs after all. Well, I rather play it safe and keep them
on the locking list for now.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity: Document @restore member of transaction list
Michal Privoznik [Fri, 15 Feb 2019 10:23:29 +0000 (11:23 +0100)] 
security: Document @restore member of transaction list

Both DAC and SELinux drivers support transactions. Each item on
the transaction list consists of various variables and @restore
is one of them. Document it so that as the list of variables grow
it's easier to spot which variable does what.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agosecurity: Don't skip label restore on file systems lacking XATTRs
Michal Privoznik [Tue, 15 Jan 2019 10:15:19 +0000 (11:15 +0100)] 
security: Don't skip label restore on file systems lacking XATTRs

The way that virSecurityDACRecallLabel is currently written is
that if XATTRs are not supported for given path to the caller
this is not different than if the path is still in use. The value
of 1 is returned which makes secdrivers skip label restore.
This is clearly a bug as we are not restoring labels on say NFS
even though previously we were.

Strictly speaking, changes to virSecurityDACRememberLabel are not
needed, but they are done anyway so that getter and setter behave
in the same fashion.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agovirFileRemoveXAttr: Report error on failure
Michal Privoznik [Fri, 22 Mar 2019 14:41:06 +0000 (15:41 +0100)] 
virFileRemoveXAttr: Report error on failure

It's better to have the function report errors, because none of
the callers does.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agovirFileSetXAttr: Report error on failure
Michal Privoznik [Fri, 22 Mar 2019 14:34:59 +0000 (15:34 +0100)] 
virFileSetXAttr: Report error on failure

It's better to have the function report errors, because none of
the callers does.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agovirfile: Make virFileGetXAttr report errors
Michal Privoznik [Fri, 22 Mar 2019 14:08:36 +0000 (15:08 +0100)] 
virfile: Make virFileGetXAttr report errors

The way that security drivers use XATTR is kind of verbose. If
error reporting was left for caller then the caller would end up
even more verbose.

There are two places where we do not want to report error if
virFileGetXAttr fails. Therefore virFileGetXAttrQuiet is
introduced as an alternative that doesn't report errors.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agovirSecuritySELinuxRestoreAllLabel: Print @migrated in the debug message too
Michal Privoznik [Mon, 4 Feb 2019 15:39:52 +0000 (16:39 +0100)] 
virSecuritySELinuxRestoreAllLabel: Print @migrated in the debug message too

Just like it's DAC counterpart is doing,
virSecuritySELinuxRestoreAllLabel() could print @migrated in the
debug message.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agotools: Slightly rework libvirt_recover_xattrs.sh
Michal Privoznik [Tue, 15 Jan 2019 08:19:08 +0000 (09:19 +0100)] 
tools: Slightly rework libvirt_recover_xattrs.sh

Firstly, there's no reason to enumerate all XATTRs since they
differ only in the prefix and we can construct them in a loop.

Secondly, and more importantly, the script was still looking for
just one prefix "trusted.libvirt.security" even on FreeBSD.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Cole Robinson <crobinso@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritytest: Fix capabilities loading
Michal Privoznik [Mon, 15 Apr 2019 14:38:28 +0000 (16:38 +0200)] 
qemusecuritytest: Fix capabilities loading

Having to enumerate all capabilities that we want domain to have
is too verbose and prevents us from adding more tests. Have the
domain always have the latest x86_64 capabilities. This means
that we have to drop two arm tests, but on the other hand, I'm
introducing 50 new cases. I've listed 50 biggest .args files and
added those:

  libvirt.git $ ls -Sr $(find tests/qemuxml2argvdata/ \
  -type f -iname "*.x86_64-latest.args") | tail -n 50

Except for two:
1) disk-backing-chains-noindex - this XML has some disks with
backing chain. And since set is done on the whole backing chain
and restore only on the top layer this would lead to instant test
failure. Don't worry, secdrivers will be fixed shortly too and
the test case will be added.

2) hostdev-mdev-display-spice-egl-headless - for this XML
secdriver tries to find IOMMU group that mdev lives in. Since we
are not mocking sysfs access this test case would fail.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritytest: Use AUTOFREE/AUTOUNREF
Michal Privoznik [Mon, 15 Apr 2019 13:34:54 +0000 (15:34 +0200)] 
qemusecuritytest: Use AUTOFREE/AUTOUNREF

This simplifies the code a bit and removes the need for cleanup
label in one case. In the other case the label is kept because
it's going to be used later.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritytest: Drop unused variable
Michal Privoznik [Thu, 18 Apr 2019 19:01:29 +0000 (21:01 +0200)] 
qemusecuritytest: Drop unused variable

The @securityManager variable in testDomain() is unused. Drop it.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritymock: Introduce and use freePaths()
Michal Privoznik [Mon, 15 Apr 2019 14:15:10 +0000 (16:15 +0200)] 
qemusecuritymock: Introduce and use freePaths()

Problem with current approach is that if
qemuSecuritySetAllLabel() fails, then the @chown_paths and
@xattr_paths hash tables are not freed and preserve values
already stored there into the next test case.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritymock: Actually set error on failure
Michal Privoznik [Mon, 15 Apr 2019 11:56:11 +0000 (13:56 +0200)] 
qemusecuritymock: Actually set error on failure

I don't really know what happened when I was writing the original
code, but even if error was to be set the corresponding boolean
was set to false meaning no error.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritymock: Fix bit arithmetic
Michal Privoznik [Mon, 15 Apr 2019 15:17:40 +0000 (17:17 +0200)] 
qemusecuritymock: Fix bit arithmetic

One of the functions of this mock is that it spoofs chown() and
stat() calls. But it is doing so in a clever way: it stores the
new owner on chown() and reports it on subsequent stat(). This is
done by using a 32bit unsigned integer where one half is used to
store uid the other is for gid. Later, when stat() is called the
integer is fetched and split into halves again. Well, my bit
operation skills are poor and the code I've written does not do
that properly.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemusecuritymock: Mock virProcessRunInFork
Michal Privoznik [Mon, 15 Apr 2019 11:45:38 +0000 (13:45 +0200)] 
qemusecuritymock: Mock virProcessRunInFork

This test is beautiful. It checks if we haven't messed up
refcounting on security labels (well, XATTRs where the original
owner is stored). It does this by setting up tracking of XATTR
setting/removing into a hash table, then calling
qemuSecuritySetAllLabel() followed by immediate
qemuSecurityRestoreAllLabel() at which point, the hash table must
be empty. The test so beautifully written that no matter
what you do it won't fail. The reason is that all seclabel work
is done in a child process. Therefore, the hash table in the
parent is never changed and thus always empty.

There are two reasons for forking (only one of them makes sense
here though):

1) namespaces - when chown()-ing a file we have to fork() and
make the child enter desired namespace,
2) locking - because of exclusive access to XATTRs we lock the
files we chown() and this is done in a fork (see 207860927ad for
more info).

While we want to fork in real world, we don't want that in a test
suite. Override virProcessRunInFork() then.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agomaint: Post-release version bump to 5.6.0
Michal Privoznik [Wed, 3 Jul 2019 06:30:52 +0000 (08:30 +0200)] 
maint: Post-release version bump to 5.6.0

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
6 years agoRelease of libvirt-5.5.0 v5.5.0
Daniel Veillard [Tue, 2 Jul 2019 20:11:22 +0000 (22:11 +0200)] 
Release of libvirt-5.5.0

* docs/news.xml: updated for the release

Signed-off-by: Daniel Veillard <veillard@redhat.com>
6 years agoRefresh translations from Zanata
Daniel P. Berrangé [Mon, 1 Jul 2019 17:58:21 +0000 (18:58 +0100)] 
Refresh translations from Zanata

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agorpc: Fix build error for virNetServerNew ATTRIBUTE_NONNULL values
John Ferlan [Sun, 30 Jun 2019 13:56:53 +0000 (09:56 -0400)] 
rpc: Fix build error for virNetServerNew ATTRIBUTE_NONNULL values

Commit 5a148ce84 altered the virNetServerNew to remove a parameter
but neglected to update the ATTRIBUTE_NONNULL's which causes a build
failure for when checking is enabled such as when lv_cv_static_analysis
is enabled.

Signed-off-by: John Ferlan <jferlan@redhat.com>
6 years agotools: Fix permissions for virt-pki-validate.in
Andrea Bolognani [Mon, 1 Jul 2019 15:08:28 +0000 (17:08 +0200)] 
tools: Fix permissions for virt-pki-validate.in

While the script ultimately needs to be executable, the
source file really shouldn't be.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
6 years agodocs: fix acl permission docs
Ján Tomko [Thu, 27 Jun 2019 15:39:50 +0000 (17:39 +0200)] 
docs: fix acl permission docs

We have been grouping network-port and nwfilter-binding permissions
under virNetworkPtr and virNWFilterPtr respectively.

Add the two missing classes that were matched because they contain
a substring of others.

Signed-off-by: Ján Tomko <jtomko@redhat.com>
Reviewed-by: Andrea Bolognani <abologna@redhat.com>
6 years agotest_driver: Fix permissions for test_driver.c
Andrea Bolognani [Mon, 1 Jul 2019 14:55:26 +0000 (16:55 +0200)] 
test_driver: Fix permissions for test_driver.c

Introduced in commit 4a6ee53581b3.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
6 years agodocs: Document virDomainQemuAttach() removal
Andrea Bolognani [Mon, 1 Jul 2019 13:30:38 +0000 (15:30 +0200)] 
docs: Document virDomainQemuAttach() removal

It has been dropped in 215d9393bb60615f957f4, but not all of
the documentation was updated accordingly.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Acked-by: Peter Krempa <pkrempa@redhat.com>
6 years agonews: Update for 5.5.0 release v5.5.0-rc2
Andrea Bolognani [Fri, 28 Jun 2019 15:27:53 +0000 (17:27 +0200)] 
news: Update for 5.5.0 release

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Acked-by: Michal Privoznik <mprivozn@redhat.com>
6 years agoutil: vircgroupv2: stop enabling missing controllers with systemd
Pavel Hrdina [Thu, 27 Jun 2019 12:54:54 +0000 (14:54 +0200)] 
util: vircgroupv2: stop enabling missing controllers with systemd

Because of a systemd delegation policy [1] we should not write to any
cgroups files owned by systemd which in case of cgroups v2 includes
'cgroups.subtree_control'.

systemd will enable controllers automatically for us to have them
available for VM cgroups.

[1] <https://github.com/systemd/systemd/blob/master/docs/CGROUP_DELEGATION.md>

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoRevert "util: vircgroup: pass parent cgroup into virCgroupDetectControllersCB"
Pavel Hrdina [Thu, 27 Jun 2019 13:50:22 +0000 (15:50 +0200)] 
Revert "util: vircgroup: pass parent cgroup into virCgroupDetectControllersCB"

This reverts commit 7bca1c9bdc85247446129f856e27c80a32819e17.

As it turns out it's not a good idea on systemd hosts.  The root
cgroup can have all controllers enabled but they don't have to be
enabled for sub-cgroups.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoRevert "error: Add VIR_ERR_DEPRECATED error code"
Daniel P. Berrangé [Wed, 26 Jun 2019 15:46:50 +0000 (16:46 +0100)] 
Revert "error: Add VIR_ERR_DEPRECATED error code"

This reverts commit 226094fbc483128c8888f4171c353aed738b8346.

A deprecation is a warning to something that use of a feature is
being discouraged. By definition it is not an error condition to
continue to use a deprecated feature.

A VIR_ERR_DEPRECATED constant thus makes no conceptual sense. For
features which are entirely absent we already document that the
VIR_ERR_NO_SUPPORT code will be used. There is no need to distinguish
between a feature which never existed and a feature which previously
existed and was since removed.

Reviewed-by: Ján Tomko <jtomko@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoRevert "news: Mention VIR_ERR_DEPRECATED in improvements"
Daniel P. Berrangé [Thu, 27 Jun 2019 08:54:42 +0000 (09:54 +0100)] 
Revert "news: Mention VIR_ERR_DEPRECATED in improvements"

This reverts commit 3026f6d9d986ad63c4b4a1c57589e6d05b71bd70.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agodocs: update QEMU driver docs to replace deprecated with deleted
Daniel P. Berrangé [Thu, 27 Jun 2019 08:53:27 +0000 (09:53 +0100)] 
docs: update QEMU driver docs to replace deprecated with deleted

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemu: delete methods which are no longer supported
Daniel P. Berrangé [Wed, 26 Jun 2019 15:45:03 +0000 (16:45 +0100)] 
qemu: delete methods which are no longer supported

The public API entry points will report VIR_ERR_NO_SUPPORT to the
caller when a driver does not provide an implementation of a particular
method.

When deleting methods, leaving the driver API entry point explicitly
set to NULL with an version range comment, allows the hvsupport.html
page to document when the AP was removed.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoqemu: blockjob: Don't leak 'cfg' from qemuBlockJobEventProcessLegacy
Peter Krempa [Wed, 26 Jun 2019 12:52:08 +0000 (14:52 +0200)] 
qemu: blockjob: Don't leak 'cfg' from qemuBlockJobEventProcessLegacy

Since c257352797a a reference of 'cfg' would be leaked if the function
does not need to process anything. Fix it by using VIR_AUTOUNREF.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoqemu: distinguish pr disk before qemuHotplugRemoveManagedPR v5.5.0-rc1
Jie Wang [Tue, 18 Jun 2019 13:28:26 +0000 (21:28 +0800)] 
qemu: distinguish pr disk before qemuHotplugRemoveManagedPR

when a disk without PR perform attach or detach operation,
need not call qemuHotplugRemoveManagedPR, otherwise, it will
print err log about PR, let us fix it.

Signed-off-by: Jie Wang <wangjie88@huawei.com>
Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
6 years agonetwork: avoid including sys/sysctl.h on Linux
Daniel P. Berrangé [Wed, 26 Jun 2019 13:34:20 +0000 (14:34 +0100)] 
network: avoid including sys/sysctl.h on Linux

The sys/sysctl.h header is only needed on BSD platforms to get
the sysctlbyname() function declaration. On Linux we talk to
procfs instead to change sysctls.

Unfortunately a legacy sys/sysctl.h header does exist on Linux
and including it has recently started triggering a deprecation
warning from glibc.

Protect its inclusion with a HAVE_SYSCTLBYNAME check instead
so that it only gets used on platforms where we need that
function declaration.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
6 years agoutil: vircgroupv2: mark only requested controllers as available
Pavel Hrdina [Sat, 22 Jun 2019 11:46:22 +0000 (13:46 +0200)] 
util: vircgroupv2: mark only requested controllers as available

When detecting available controllers on host we can be limited by list
of controllers from qemu.conf file.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Peter Krempa <pkrempa@redhat.com>
6 years agoutil: vircgroupv2: don't error out if enabling controller fails
Pavel Hrdina [Thu, 20 Jun 2019 11:10:20 +0000 (13:10 +0200)] 
util: vircgroupv2: don't error out if enabling controller fails

Currently CPU controller cannot be enabled if there is any real-time
task running and is assigned to non-root cgroup which is the case on
several distributions with graphical environment.

Instead of erroring out treat it as the controller is not available.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Peter Krempa <pkrempa@redhat.com>
6 years agoutil: vircgroupv2: separate return values of virCgroupV2EnableController
Pavel Hrdina [Fri, 21 Jun 2019 12:47:47 +0000 (14:47 +0200)] 
util: vircgroupv2: separate return values of virCgroupV2EnableController

In order to skip controllers that we are not able to activate we need
to return different return value so the caller can decide what to do.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Peter Krempa <pkrempa@redhat.com>
6 years agoutil: vircgroupv2: enable CPU controller only if it's available
Pavel Hrdina [Thu, 20 Jun 2019 11:09:08 +0000 (13:09 +0200)] 
util: vircgroupv2: enable CPU controller only if it's available

It might happen that we are not able to enable CPU controller so we
can enable it for thread sub-cgroups only if it's available in parent
cgroup.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoutil: vircgroupv2: use any controller to create thread directory
Pavel Hrdina [Thu, 20 Jun 2019 11:07:07 +0000 (13:07 +0200)] 
util: vircgroupv2: use any controller to create thread directory

The assumption that CPU controller would be always enabled is wrong, we
should use any available controller to create a new sub-cgroup.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
6 years agoutil: vircgroup: improve controller detection
Pavel Hrdina [Thu, 20 Jun 2019 11:02:57 +0000 (13:02 +0200)] 
util: vircgroup: improve controller detection

This affects only cgroups v2 where enabled controllers are not based on
available mount points but on the list provided in cgroup.controllers
file.  However, moving it will fill in placement as well, so it needs
to be freed together with mount point if we don't need that controller.

Before this patch we were assuming that all controllers available in
root cgroup where available in all other sub-cgroups which was wrong.

In order to fix it we need to move the cgroup controllers detection
after cgroup placement was prepared in order to build correct path for
cgroup.controllers file.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Peter Krempa <pkrempa@redhat.com>
6 years agoutil: vircgroup: pass parent cgroup into virCgroupDetectControllersCB
Pavel Hrdina [Thu, 20 Jun 2019 10:59:29 +0000 (12:59 +0200)] 
util: vircgroup: pass parent cgroup into virCgroupDetectControllersCB

In cgroups v2 we don't have to detect available controllers every single
time if we are creating a new cgroup based on parent cgroup.

Signed-off-by: Pavel Hrdina <phrdina@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>