diff options
author | Michal Privoznik <mprivozn@redhat.com> | 2019-01-14 17:53:43 +0100 |
---|---|---|
committer | Michal Privoznik <mprivozn@redhat.com> | 2019-01-15 09:45:22 +0100 |
commit | fc3990c7e64be1da1631952d3ec384ebef50e125 (patch) | |
tree | a3256c7924d0b3bc2d6a17849cbbc8607c46580a | |
parent | 1851233d3188eeee83fcb65997cae65aa2055b48 (diff) | |
download | libvirt-fc3990c7e64be1da1631952d3ec384ebef50e125.tar.gz |
qemu: Temporary disable owner remembering
Turns out, that there are few bugs that are not that trivial to
fix (e.g. around block jobs). Instead of rushing in not
thoroughly tested fixes disable the feature temporarily for the
release.
Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
ACKed-by: Peter Krempa <pkrempa@redhat.com>
-rw-r--r-- | docs/news.xml | 13 | ||||
-rw-r--r-- | src/qemu/libvirtd_qemu.aug | 1 | ||||
-rw-r--r-- | src/qemu/qemu.conf | 5 | ||||
-rw-r--r-- | src/qemu/qemu_conf.c | 4 | ||||
-rw-r--r-- | src/qemu/test_libvirtd_qemu.aug.in | 1 |
5 files changed, 0 insertions, 24 deletions
diff --git a/docs/news.xml b/docs/news.xml index 90b7e8891e..c7a4dde463 100644 --- a/docs/news.xml +++ b/docs/news.xml @@ -68,19 +68,6 @@ </change> <change> <summary> - Remember original owners and SELinux labels of files - </summary> - <description> - When a domain is starting up libvirt changes DAC and - SELinux labels so that domain can access it. However, - it never remembered the original labels and therefore - the file was returned back to <code>root:root</code>. - With this release, the original labels are remembered - and restored properly. - </description> - </change> - <change> - <summary> Support more NVDIMM configuration options </summary> <description> diff --git a/src/qemu/libvirtd_qemu.aug b/src/qemu/libvirtd_qemu.aug index 8a5b39e568..ddc4bbfd1d 100644 --- a/src/qemu/libvirtd_qemu.aug +++ b/src/qemu/libvirtd_qemu.aug @@ -71,7 +71,6 @@ module Libvirtd_qemu = | str_entry "user" | str_entry "group" | bool_entry "dynamic_ownership" - | bool_entry "remember_owner" | str_array_entry "cgroup_controllers" | str_array_entry "cgroup_device_acl" | int_entry "seccomp_sandbox" diff --git a/src/qemu/qemu.conf b/src/qemu/qemu.conf index 29093f6329..28e51b2c59 100644 --- a/src/qemu/qemu.conf +++ b/src/qemu/qemu.conf @@ -450,11 +450,6 @@ # Set to 0 to disable file ownership changes. #dynamic_ownership = 1 -# Whether libvirt should remember and restore the original -# ownership over files it is relabeling. Defaults to 1, set -# to 0 to disable the feature. -#remember_owner = 1 - # What cgroup controllers to make use of with QEMU guests # # - 'cpu' - use for scheduler tunables diff --git a/src/qemu/qemu_conf.c b/src/qemu/qemu_conf.c index 20952e9607..b03e38b831 100644 --- a/src/qemu/qemu_conf.c +++ b/src/qemu/qemu_conf.c @@ -145,7 +145,6 @@ virQEMUDriverConfigPtr virQEMUDriverConfigNew(bool privileged) cfg->group = (gid_t)-1; } cfg->dynamicOwnership = privileged; - cfg->rememberOwner = privileged; cfg->cgroupControllers = -1; /* -1 == auto-detect */ @@ -729,9 +728,6 @@ int virQEMUDriverConfigLoadFile(virQEMUDriverConfigPtr cfg, if (virConfGetValueBool(conf, "dynamic_ownership", &cfg->dynamicOwnership) < 0) goto cleanup; - if (virConfGetValueBool(conf, "remember_owner", &cfg->rememberOwner) < 0) - goto cleanup; - if (virConfGetValueStringList(conf, "cgroup_controllers", false, &controllers) < 0) goto cleanup; diff --git a/src/qemu/test_libvirtd_qemu.aug.in b/src/qemu/test_libvirtd_qemu.aug.in index 92a8ae1192..f1e8806ad2 100644 --- a/src/qemu/test_libvirtd_qemu.aug.in +++ b/src/qemu/test_libvirtd_qemu.aug.in @@ -43,7 +43,6 @@ module Test_libvirtd_qemu = { "user" = "root" } { "group" = "root" } { "dynamic_ownership" = "1" } -{ "remember_owner" = "1" } { "cgroup_controllers" { "1" = "cpu" } { "2" = "devices" } |