mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-02-22 11:22:23 +00:00
qemu: Temporary disable owner remembering
Turns out, that there are few bugs that are not that trivial to fix (e.g. around block jobs). Instead of rushing in not thoroughly tested fixes disable the feature temporarily for the release. Signed-off-by: Michal Privoznik <mprivozn@redhat.com> ACKed-by: Peter Krempa <pkrempa@redhat.com>
This commit is contained in:
parent
1851233d31
commit
fc3990c7e6
@ -66,19 +66,6 @@
|
||||
qemu: Add support for ARMv6l guests
|
||||
</summary>
|
||||
</change>
|
||||
<change>
|
||||
<summary>
|
||||
Remember original owners and SELinux labels of files
|
||||
</summary>
|
||||
<description>
|
||||
When a domain is starting up libvirt changes DAC and
|
||||
SELinux labels so that domain can access it. However,
|
||||
it never remembered the original labels and therefore
|
||||
the file was returned back to <code>root:root</code>.
|
||||
With this release, the original labels are remembered
|
||||
and restored properly.
|
||||
</description>
|
||||
</change>
|
||||
<change>
|
||||
<summary>
|
||||
Support more NVDIMM configuration options
|
||||
|
@ -71,7 +71,6 @@ module Libvirtd_qemu =
|
||||
| str_entry "user"
|
||||
| str_entry "group"
|
||||
| bool_entry "dynamic_ownership"
|
||||
| bool_entry "remember_owner"
|
||||
| str_array_entry "cgroup_controllers"
|
||||
| str_array_entry "cgroup_device_acl"
|
||||
| int_entry "seccomp_sandbox"
|
||||
|
@ -450,11 +450,6 @@
|
||||
# Set to 0 to disable file ownership changes.
|
||||
#dynamic_ownership = 1
|
||||
|
||||
# Whether libvirt should remember and restore the original
|
||||
# ownership over files it is relabeling. Defaults to 1, set
|
||||
# to 0 to disable the feature.
|
||||
#remember_owner = 1
|
||||
|
||||
# What cgroup controllers to make use of with QEMU guests
|
||||
#
|
||||
# - 'cpu' - use for scheduler tunables
|
||||
|
@ -145,7 +145,6 @@ virQEMUDriverConfigPtr virQEMUDriverConfigNew(bool privileged)
|
||||
cfg->group = (gid_t)-1;
|
||||
}
|
||||
cfg->dynamicOwnership = privileged;
|
||||
cfg->rememberOwner = privileged;
|
||||
|
||||
cfg->cgroupControllers = -1; /* -1 == auto-detect */
|
||||
|
||||
@ -729,9 +728,6 @@ int virQEMUDriverConfigLoadFile(virQEMUDriverConfigPtr cfg,
|
||||
if (virConfGetValueBool(conf, "dynamic_ownership", &cfg->dynamicOwnership) < 0)
|
||||
goto cleanup;
|
||||
|
||||
if (virConfGetValueBool(conf, "remember_owner", &cfg->rememberOwner) < 0)
|
||||
goto cleanup;
|
||||
|
||||
if (virConfGetValueStringList(conf, "cgroup_controllers", false,
|
||||
&controllers) < 0)
|
||||
goto cleanup;
|
||||
|
@ -43,7 +43,6 @@ module Test_libvirtd_qemu =
|
||||
{ "user" = "root" }
|
||||
{ "group" = "root" }
|
||||
{ "dynamic_ownership" = "1" }
|
||||
{ "remember_owner" = "1" }
|
||||
{ "cgroup_controllers"
|
||||
{ "1" = "cpu" }
|
||||
{ "2" = "devices" }
|
||||
|
Loading…
x
Reference in New Issue
Block a user