Compare commits
260 Commits
libvirt-0_
...
no-polkit
Author | SHA1 | Date |
---|---|---|
|
74aa4d5b6b | |
|
b7f2ffc0cc | |
|
21316e7a45 | |
|
8adbb7a402 | |
|
3f19d41908 | |
|
34da93e0c9 | |
|
208f506190 | |
|
0ca715cad9 | |
|
0f5d8c1c22 | |
|
a56bcbd063 | |
|
89c3fa751c | |
|
051644ffcb | |
|
2a9c282548 | |
|
2ae80af461 | |
|
7335ede0e1 | |
|
6c92ba3805 | |
|
446f680673 | |
|
3f56aa2870 | |
|
3cec91694f | |
|
cb0cfa566f | |
|
a27acebf66 | |
|
99d3a0ca1a | |
|
9c962ebc4f | |
|
99cbbf6606 | |
|
b73e509648 | |
|
b23ff9c0f7 | |
|
20f9ed9c4c | |
|
04cb28c315 | |
|
a74ea318d1 | |
|
98ed6b4e36 | |
|
2c49d1fd11 | |
|
6e7bca6631 | |
|
2fe145bb02 | |
|
10b7d235e3 | |
|
232e2e7de2 | |
|
fb1e4b061e | |
|
0b1a013081 | |
|
a972457f43 | |
|
67cfa34a05 | |
|
fc2ebb7646 | |
|
e92b461b4f | |
|
b1ac7b5791 | |
|
88424efe85 | |
|
4e2aab98a2 | |
|
f4bc1a2fe2 | |
|
a4bf2768b8 | |
|
47cd44e9da | |
|
731c6b90ff | |
|
47ca46905d | |
|
860ffc5b13 | |
|
611b2ee520 | |
|
edcb926f9d | |
|
caebff8304 | |
|
8fa41135ca | |
|
0debbff964 | |
|
d6cc78be66 | |
|
8d9645735e | |
|
4c65f08330 | |
|
2427f8f078 | |
|
d168e4f934 | |
|
4dd365589f | |
|
50e253df29 | |
|
cb71801a2b | |
|
4a9c74e91d | |
|
281508ec99 | |
|
feb92626e1 | |
|
93cadb0880 | |
|
dd6b57aa60 | |
|
b8cb754e9d | |
|
dbe61507bd | |
|
ce7b23d9d0 | |
|
8ded6ff93e | |
|
1ef96f3488 | |
|
ee3bf37900 | |
|
7452a06938 | |
|
fe8f9ed9c4 | |
|
1b64f74c82 | |
|
c81949046d | |
|
19dcb913e6 | |
|
e4b5ba1a9d | |
|
5f1a422d83 | |
|
c5b0b3ef9d | |
|
c0a04cb876 | |
|
3cc7cdf12f | |
|
6b531d9967 | |
|
4d05ac021c | |
|
d29aa84b17 | |
|
a075adc818 | |
|
4d0e63f99c | |
|
9e11936ec5 | |
|
a4075ec632 | |
|
dadb59c95f | |
|
e73cc6a9d8 | |
|
10cd84e37f | |
|
e63e2040cd | |
|
91063332d7 | |
|
503330ba5d | |
|
0a64085f47 | |
|
1073e2447a | |
|
5b1a906ace | |
|
aff97e0146 | |
|
a4b41a378b | |
|
3ec523d168 | |
|
622cf0d642 | |
|
a540751e83 | |
|
11b596669a | |
|
fefbae879b | |
|
695b281409 | |
|
9f9eae34c1 | |
|
ae37ed3500 | |
|
f7f509999b | |
|
419bcc4b2f | |
|
7b59d4f7eb | |
|
03326e9c04 | |
|
f40b464d1e | |
|
810ca6c207 | |
|
8df3aef6aa | |
|
0223d5a656 | |
|
aad810a204 | |
|
1b8b7567b1 | |
|
442040caac | |
|
65efaafca2 | |
|
e87c8ab0c7 | |
|
be6bda45b4 | |
|
8c9e40d383 | |
|
0f6f9b973a | |
|
3db6039b2b | |
|
4051217c8b | |
|
c5c28baba1 | |
|
43618df1d4 | |
|
a2951dccb5 | |
|
b884323c03 | |
|
adeaf839fd | |
|
40d99010e1 | |
|
11755d8663 | |
|
2daa92daf9 | |
|
db2858c661 | |
|
53adb9aaba | |
|
168df8b606 | |
|
f9085f2538 | |
|
b159bbdc98 | |
|
a5af3cf105 | |
|
27ca069db7 | |
|
000a3274d2 | |
|
19c7799c31 | |
|
198ff818c6 | |
|
e80c83ad06 | |
|
660e0112c6 | |
|
45c1cabef6 | |
|
56be2c5e38 | |
|
4aa9c4f1a3 | |
|
7be420ad22 | |
|
40b00623a4 | |
|
ce09ec66c7 | |
|
97d7c80e2e | |
|
b856ae03bf | |
|
803b3b891a | |
|
350081d1a9 | |
|
1b71b68bb9 | |
|
4084288dd5 | |
|
d1cd1b7ceb | |
|
5ed69704b9 | |
|
be6e136cb1 | |
|
d3109abfa4 | |
|
f5ff4a2393 | |
|
8cc50838dc | |
|
2c2e71c0ce | |
|
96b1b18b42 | |
|
f7763bfd17 | |
|
404e58cb18 | |
|
cd3767e3b9 | |
|
f1867a5ecc | |
|
b5548f62cb | |
|
52f3bedee7 | |
|
f87237919c | |
|
e8969fb913 | |
|
74d46bc7dd | |
|
4b6ea94306 | |
|
963754bc8c | |
|
7b5483236c | |
|
438006407c | |
|
76c8282ee2 | |
|
f463598b24 | |
|
f4e752a385 | |
|
c37cb21dea | |
|
e0bfc1f8aa | |
|
544ad4a787 | |
|
8f163760ed | |
|
565427cf89 | |
|
e10da2f6d4 | |
|
aa386576d5 | |
|
c73c129b48 | |
|
afe729ac3c | |
|
b6038bae4f | |
|
e6d9787587 | |
|
44699dc495 | |
|
991d719dde | |
|
96a520b555 | |
|
e31df5e9de | |
|
6763b267b9 | |
|
24e91208a4 | |
|
15dec999e7 | |
|
d6b0635d3d | |
|
336a93264e | |
|
6398d1cff5 | |
|
6926ed26ea | |
|
6253f97a2d | |
|
37ddbd0eac | |
|
95fe7c8df2 | |
|
79ae809020 | |
|
f19e302ba9 | |
|
e9c1d3f4b0 | |
|
0f577d932b | |
|
21a02c2e90 | |
|
4e460d5f09 | |
|
f9de2f6bc6 | |
|
2daa1b7814 | |
|
f99eeb8567 | |
|
7069f75cb8 | |
|
2cac7dac46 | |
|
913c3c6554 | |
|
a5a4c0c89b | |
|
8c8aca2fab | |
|
daf8e124ca | |
|
38c4b724fe | |
|
4d00487275 | |
|
a6831c26c1 | |
|
c363c7ebdb | |
|
18ee6daf8a | |
|
459eb426c3 | |
|
a0d670d2bf | |
|
d7b41212c1 | |
|
2e1539eba4 | |
|
ee9521d87c | |
|
8d8fc08bac | |
|
e79d304c79 | |
|
db03f03fd9 | |
|
957403ebec | |
|
6c32e1aaeb | |
|
362e335c0b | |
|
ed6c49f874 | |
|
47fcec5405 | |
|
d7239a45b6 | |
|
f13fb18c58 | |
|
d29644418d | |
|
ed9e426b26 | |
|
659febf9ff | |
|
fca1fccfad | |
|
f713d63bab | |
|
5a45e466cf | |
|
742b24eb23 | |
|
03369d2383 | |
|
2605d662e0 | |
|
e8394ab5b5 | |
|
8ad156a5c2 | |
|
f2d6fb6239 | |
|
e3a592c38d | |
|
7e99819dda | |
|
a160d7f98d | |
|
36cab842e8 |
19
.cvsignore
19
.cvsignore
|
@ -1,19 +0,0 @@
|
||||||
.build*.log
|
|
||||||
*.rpm
|
|
||||||
i686
|
|
||||||
x86_64
|
|
||||||
libvirt-*.tar.gz
|
|
||||||
libvirt-0.6.0.tar.gz
|
|
||||||
libvirt-0.6.1.tar.gz
|
|
||||||
libvirt-0.6.2.tar.gz
|
|
||||||
libvirt-0.6.3.tar.gz
|
|
||||||
libvirt-0.6.4.tar.gz
|
|
||||||
libvirt-0.6.5.tar.gz
|
|
||||||
libvirt-0.7.0.tar.gz
|
|
||||||
libvirt-0.7.1.tar.gz
|
|
||||||
libvirt-0.7.2.tar.gz
|
|
||||||
libvirt-0.7.3.tar.gz
|
|
||||||
libvirt-0.7.4.tar.gz
|
|
||||||
libvirt-0.7.5.tar.gz
|
|
||||||
libvirt-0.7.6.tar.gz
|
|
||||||
libvirt-0.7.7.tar.gz
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
.build*.log
|
||||||
|
*.rpm
|
||||||
|
i686
|
||||||
|
x86_64
|
||||||
|
libvirt-*.tar.xz
|
|
@ -1,233 +0,0 @@
|
||||||
From 3a441522017aa9c1b8b54d2ce4569d0f0d96fa72 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Cole Robinson <crobinso@redhat.com>
|
|
||||||
Date: Fri, 12 Mar 2010 12:36:56 -0500
|
|
||||||
Subject: [PATCH] qemu: Add some debugging at domain startup
|
|
||||||
|
|
||||||
---
|
|
||||||
src/qemu/qemu_driver.c | 24 +++++++++++++++++++++++-
|
|
||||||
1 files changed, 23 insertions(+), 1 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
|
|
||||||
index f8ab545..040d645 100644
|
|
||||||
--- a/src/qemu/qemu_driver.c
|
|
||||||
+++ b/src/qemu/qemu_driver.c
|
|
||||||
@@ -2695,6 +2695,8 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
|
|
||||||
FD_ZERO(&keepfd);
|
|
||||||
|
|
||||||
+ DEBUG0("Beginning VM startup process");
|
|
||||||
+
|
|
||||||
if (virDomainObjIsActive(vm)) {
|
|
||||||
qemuReportError(VIR_ERR_OPERATION_INVALID,
|
|
||||||
"%s", _("VM is already active"));
|
|
||||||
@@ -2703,22 +2705,27 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
|
|
||||||
/* If you are using a SecurityDriver with dynamic labelling,
|
|
||||||
then generate a security label for isolation */
|
|
||||||
+ DEBUG0("Generating domain security label (if required)");
|
|
||||||
if (driver->securityDriver &&
|
|
||||||
driver->securityDriver->domainGenSecurityLabel &&
|
|
||||||
driver->securityDriver->domainGenSecurityLabel(vm) < 0)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
+ DEBUG0("Generating setting domain security labels (if required)");
|
|
||||||
if (driver->securityDriver &&
|
|
||||||
driver->securityDriver->domainSetSecurityAllLabel &&
|
|
||||||
driver->securityDriver->domainSetSecurityAllLabel(vm) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
- /* Ensure no historical cgroup for this VM is lieing around bogus settings */
|
|
||||||
+ /* Ensure no historical cgroup for this VM is lying around bogus
|
|
||||||
+ * settings */
|
|
||||||
+ DEBUG0("Ensuring no historical cgroup is lying around");
|
|
||||||
qemuRemoveCgroup(driver, vm, 1);
|
|
||||||
|
|
||||||
if ((vm->def->ngraphics == 1) &&
|
|
||||||
vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
|
|
||||||
vm->def->graphics[0]->data.vnc.autoport) {
|
|
||||||
+ DEBUG0("Determining VNC port");
|
|
||||||
int port = qemudNextFreeVNCPort(driver);
|
|
||||||
if (port < 0) {
|
|
||||||
qemuReportError(VIR_ERR_INTERNAL_ERROR,
|
|
||||||
@@ -2735,6 +2742,7 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
goto cleanup;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ DEBUG0("Creating domain log file");
|
|
||||||
if ((logfile = qemudLogFD(driver, vm->def->name)) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
@@ -2751,14 +2759,17 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
goto cleanup;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ DEBUG0("Determing emulator version");
|
|
||||||
if (qemudExtractVersionInfo(emulator,
|
|
||||||
NULL,
|
|
||||||
&qemuCmdFlags) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
+ DEBUG0("Setting up domain cgroup (if required)");
|
|
||||||
if (qemuSetupCgroup(driver, vm) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
+ DEBUG0("Preparing host devices");
|
|
||||||
if (qemuPrepareHostDevices(driver, vm->def) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
@@ -2767,6 +2778,7 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
goto cleanup;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ DEBUG0("Preparing monitor state");
|
|
||||||
if (qemuPrepareMonitorChr(driver, priv->monConfig, vm->def->name) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
@@ -2798,6 +2810,7 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
* use in hotplug
|
|
||||||
*/
|
|
||||||
if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
|
|
||||||
+ DEBUG0("Assigning domain PCI addresses");
|
|
||||||
/* Populate cache with current addresses */
|
|
||||||
if (priv->pciaddrs) {
|
|
||||||
qemuDomainPCIAddressSetFree(priv->pciaddrs);
|
|
||||||
@@ -2816,6 +2829,7 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
priv->persistentAddrs = 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ DEBUG0("Building emulator command line");
|
|
||||||
vm->def->id = driver->nextvmid++;
|
|
||||||
if (qemudBuildCommandLine(conn, driver, vm->def, priv->monConfig,
|
|
||||||
priv->monJSON, qemuCmdFlags, &argv, &progenv,
|
|
||||||
@@ -2899,25 +2913,31 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
if (ret == -1) /* The VM failed to start */
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
+ DEBUG0("Waiting for monitor to show up");
|
|
||||||
if (qemudWaitForMonitor(driver, vm, pos) < 0)
|
|
||||||
goto abort;
|
|
||||||
|
|
||||||
+ DEBUG0("Detecting VCPU PIDs");
|
|
||||||
if (qemuDetectVcpuPIDs(driver, vm) < 0)
|
|
||||||
goto abort;
|
|
||||||
|
|
||||||
+ DEBUG0("Setting CPU affinity");
|
|
||||||
if (qemudInitCpuAffinity(vm) < 0)
|
|
||||||
goto abort;
|
|
||||||
|
|
||||||
+ DEBUG0("Setting any required VM passwords");
|
|
||||||
if (qemuInitPasswords(conn, driver, vm, qemuCmdFlags) < 0)
|
|
||||||
goto abort;
|
|
||||||
|
|
||||||
/* If we have -device, then addresses are assigned explicitly.
|
|
||||||
* If not, then we have to detect dynamic ones here */
|
|
||||||
if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
|
|
||||||
+ DEBUG0("Determining domain device PCI addresses");
|
|
||||||
if (qemuInitPCIAddresses(driver, vm) < 0)
|
|
||||||
goto abort;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ DEBUG0("Setting initial memory amount");
|
|
||||||
qemuDomainObjEnterMonitorWithDriver(driver, vm);
|
|
||||||
if (qemuMonitorSetBalloon(priv->mon, vm->def->memory) < 0) {
|
|
||||||
qemuDomainObjExitMonitorWithDriver(driver, vm);
|
|
||||||
@@ -2925,6 +2945,7 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
}
|
|
||||||
|
|
||||||
if (migrateFrom == NULL) {
|
|
||||||
+ DEBUG0("Starting domain CPUs");
|
|
||||||
/* Allow the CPUS to start executing */
|
|
||||||
if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
|
|
||||||
if (virGetLastError() == NULL)
|
|
||||||
@@ -2937,6 +2958,7 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
qemuDomainObjExitMonitorWithDriver(driver, vm);
|
|
||||||
|
|
||||||
|
|
||||||
+ DEBUG0("Writing domain status to disk");
|
|
||||||
if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
|
|
||||||
goto abort;
|
|
||||||
|
|
||||||
--
|
|
||||||
1.6.6.1
|
|
||||||
|
|
||||||
From 6d5c8a8f51db8ce97ab35ab6022dd5c94ab016b4 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Cole Robinson <crobinso@redhat.com>
|
|
||||||
Date: Fri, 12 Mar 2010 12:37:52 -0500
|
|
||||||
Subject: [PATCH] qemu: Fix USB by product with security enabled
|
|
||||||
|
|
||||||
We need to call PrepareHostdevs to determine the USB device path before
|
|
||||||
any security calls. PrepareHostUSBDevices was also incorrectly skipping
|
|
||||||
all USB devices.
|
|
||||||
---
|
|
||||||
src/qemu/qemu_driver.c | 11 ++++++-----
|
|
||||||
1 files changed, 6 insertions(+), 5 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
|
|
||||||
index 040d645..b17d26d 100644
|
|
||||||
--- a/src/qemu/qemu_driver.c
|
|
||||||
+++ b/src/qemu/qemu_driver.c
|
|
||||||
@@ -2360,7 +2360,7 @@ qemuPrepareHostUSBDevices(struct qemud_driver *driver ATTRIBUTE_UNUSED,
|
|
||||||
|
|
||||||
if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
|
|
||||||
continue;
|
|
||||||
- if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
|
|
||||||
+ if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
|
|
||||||
continue;
|
|
||||||
|
|
||||||
/* Resolve a vendor/product to bus/device */
|
|
||||||
@@ -2703,6 +2703,11 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ /* Must be run before security labelling */
|
|
||||||
+ DEBUG0("Preparing host devices");
|
|
||||||
+ if (qemuPrepareHostDevices(driver, vm->def) < 0)
|
|
||||||
+ goto cleanup;
|
|
||||||
+
|
|
||||||
/* If you are using a SecurityDriver with dynamic labelling,
|
|
||||||
then generate a security label for isolation */
|
|
||||||
DEBUG0("Generating domain security label (if required)");
|
|
||||||
@@ -2769,10 +2774,6 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|
||||||
if (qemuSetupCgroup(driver, vm) < 0)
|
|
||||||
goto cleanup;
|
|
||||||
|
|
||||||
- DEBUG0("Preparing host devices");
|
|
||||||
- if (qemuPrepareHostDevices(driver, vm->def) < 0)
|
|
||||||
- goto cleanup;
|
|
||||||
-
|
|
||||||
if (VIR_ALLOC(priv->monConfig) < 0) {
|
|
||||||
virReportOOMError();
|
|
||||||
goto cleanup;
|
|
||||||
--
|
|
||||||
1.6.6.1
|
|
||||||
|
|
||||||
From 65e97240e6e4606820dd1c42ac172319e0af4d8d Mon Sep 17 00:00:00 2001
|
|
||||||
From: Cole Robinson <crobinso@redhat.com>
|
|
||||||
Date: Mon, 22 Mar 2010 10:45:36 -0400
|
|
||||||
Subject: [PATCH] security: selinux: Fix crash when releasing non-existent label
|
|
||||||
|
|
||||||
This can be triggered by the qemuStartVMDaemon cleanup path if a
|
|
||||||
VM references a non-existent USB device (by product) in the XML.
|
|
||||||
|
|
||||||
Signed-off-by: Cole Robinson <crobinso@redhat.com>
|
|
||||||
---
|
|
||||||
src/security/security_selinux.c | 3 ++-
|
|
||||||
1 files changed, 2 insertions(+), 1 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/security/security_selinux.c b/src/security/security_selinux.c
|
|
||||||
index 975b315..6680e2d 100644
|
|
||||||
--- a/src/security/security_selinux.c
|
|
||||||
+++ b/src/security/security_selinux.c
|
|
||||||
@@ -632,7 +632,8 @@ SELinuxReleaseSecurityLabel(virDomainObjPtr vm)
|
|
||||||
{
|
|
||||||
const virSecurityLabelDefPtr secdef = &vm->def->seclabel;
|
|
||||||
|
|
||||||
- if (secdef->type == VIR_DOMAIN_SECLABEL_STATIC)
|
|
||||||
+ if (secdef->type == VIR_DOMAIN_SECLABEL_STATIC ||
|
|
||||||
+ secdef->label == NULL)
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
context_t con = context_new(secdef->label);
|
|
||||||
--
|
|
||||||
1.6.6.1
|
|
||||||
|
|
|
@ -1,87 +0,0 @@
|
||||||
From 3f1aa08af6580c215d973bc6bf57f505dbf8b926 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Cole Robinson <crobinso@redhat.com>
|
|
||||||
Date: Fri, 12 Mar 2010 13:38:39 -0500
|
|
||||||
Subject: [PATCH] security: Set permissions for kernel/initrd
|
|
||||||
|
|
||||||
Fixes URL installs when running virt-install as root on Fedora.
|
|
||||||
---
|
|
||||||
src/qemu/qemu_security_dac.c | 21 +++++++++++++++++++++
|
|
||||||
src/security/security_selinux.c | 16 ++++++++++++++++
|
|
||||||
2 files changed, 37 insertions(+), 0 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/qemu/qemu_security_dac.c b/src/qemu/qemu_security_dac.c
|
|
||||||
index 6911f48..1883fbe 100644
|
|
||||||
--- a/src/qemu/qemu_security_dac.c
|
|
||||||
+++ b/src/qemu/qemu_security_dac.c
|
|
||||||
@@ -332,6 +332,15 @@ qemuSecurityDACRestoreSecurityAllLabel(virDomainObjPtr vm)
|
|
||||||
vm->def->disks[i]) < 0)
|
|
||||||
rc = -1;
|
|
||||||
}
|
|
||||||
+
|
|
||||||
+ if (vm->def->os.kernel &&
|
|
||||||
+ qemuSecurityDACRestoreSecurityFileLabel(vm->def->os.kernel) < 0)
|
|
||||||
+ rc = -1;
|
|
||||||
+
|
|
||||||
+ if (vm->def->os.initrd &&
|
|
||||||
+ qemuSecurityDACRestoreSecurityFileLabel(vm->def->os.initrd) < 0)
|
|
||||||
+ rc = -1;
|
|
||||||
+
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
@@ -356,6 +365,18 @@ qemuSecurityDACSetSecurityAllLabel(virDomainObjPtr vm)
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ if (vm->def->os.kernel &&
|
|
||||||
+ qemuSecurityDACSetOwnership(vm->def->os.kernel,
|
|
||||||
+ driver->user,
|
|
||||||
+ driver->group) < 0)
|
|
||||||
+ return -1;
|
|
||||||
+
|
|
||||||
+ if (vm->def->os.initrd &&
|
|
||||||
+ qemuSecurityDACSetOwnership(vm->def->os.initrd,
|
|
||||||
+ driver->user,
|
|
||||||
+ driver->group) < 0)
|
|
||||||
+ return -1;
|
|
||||||
+
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
diff --git a/src/security/security_selinux.c b/src/security/security_selinux.c
|
|
||||||
index b2c8581..975b315 100644
|
|
||||||
--- a/src/security/security_selinux.c
|
|
||||||
+++ b/src/security/security_selinux.c
|
|
||||||
@@ -616,6 +616,14 @@ SELinuxRestoreSecurityAllLabel(virDomainObjPtr vm)
|
|
||||||
rc = -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ if (vm->def->os.kernel &&
|
|
||||||
+ SELinuxRestoreSecurityFileLabel(vm->def->os.kernel) < 0)
|
|
||||||
+ rc = -1;
|
|
||||||
+
|
|
||||||
+ if (vm->def->os.initrd &&
|
|
||||||
+ SELinuxRestoreSecurityFileLabel(vm->def->os.initrd) < 0)
|
|
||||||
+ rc = -1;
|
|
||||||
+
|
|
||||||
return rc;
|
|
||||||
}
|
|
||||||
|
|
||||||
@@ -736,6 +744,14 @@ SELinuxSetSecurityAllLabel(virDomainObjPtr vm)
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ if (vm->def->os.kernel &&
|
|
||||||
+ SELinuxSetFilecon(vm->def->os.kernel, default_content_context) < 0)
|
|
||||||
+ return -1;
|
|
||||||
+
|
|
||||||
+ if (vm->def->os.initrd &&
|
|
||||||
+ SELinuxSetFilecon(vm->def->os.initrd, default_content_context) < 0)
|
|
||||||
+ return -1;
|
|
||||||
+
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
--
|
|
||||||
1.6.6.1
|
|
||||||
|
|
2924
libvirt.spec
2924
libvirt.spec
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue