libvirt/src
Andrea Bolognani 971e767805 qemu: Reject TPM 1.2 in most scenarios
Everywhere we use TPM 2.0 as our default, the chances of TPM
1.2 being supported by the guest OS are very slim. Just reject
such configurations outright.

Signed-off-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Peter Krempa <pkrempa@redhat.com>
2024-06-07 11:13:19 +02:00
..
access api: add virNodeDeviceUpdate() 2024-02-26 11:03:51 +01:00
admin
bhyve src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
ch src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
conf network: save network status when firewall rules are reloaded 2024-05-22 23:20:07 -04:00
cpu cpu: Add removedPolicy parameter to virCPUUpdate 2024-05-02 19:56:45 +02:00
cpu_map cpu_map: Drop 'mpx' from x86 cpu models 2024-05-02 19:56:45 +02:00
esx
hyperv hyperv: prevent potential NULL dereference 2024-05-06 09:35:45 +02:00
hypervisor domain_interface: Fix build on FreeBSD 2024-04-15 08:51:23 +02:00
interface interface: fix udev reference leak with invalid flags 2024-06-05 12:19:12 +01:00
libxl src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
locking
logging log_cleaner: Detect rotated filenames properly 2024-05-31 08:34:29 +02:00
lxc virGetGroupList: Refactor and fix callers 2024-05-23 14:32:24 +02:00
network meson: Improve default firewall backend configuration 2024-05-28 19:28:58 +02:00
node_device src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
nwfilter util/network: new virFirewallBackend enum 2024-05-22 23:19:18 -04:00
openvz
qemu qemu: Reject TPM 1.2 in most scenarios 2024-06-07 11:13:19 +02:00
remote src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
rpc rpc: avoid leak of GSource in use for interrupting main loop 2024-06-05 12:03:24 +01:00
secret src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
security virGetGroupList: Refactor and fix callers 2024-05-23 14:32:24 +02:00
storage src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
storage_file
test test: nodedev: fill active_config at driver startup time 2024-04-24 09:38:54 -04:00
util virFileOpenForked: Fix handling of return value from virSocketSendFD() 2024-05-23 14:32:24 +02:00
vbox vbox: Drop needless g_new0(..., 0) in vbox_snapshot_conf.c 2024-04-13 23:16:54 +02:00
vmware
vmx vmx: Do not require DVS Port ID 2024-05-14 08:32:13 +02:00
vz src: Fix return types of .stateInitialize callbacks 2024-05-22 13:41:42 +02:00
admin_protocol-structs
datatypes.c
datatypes.h datatypes: Declare g_autoptr cleanup functions for more public objects 2024-05-07 13:03:19 +02:00
driver-hypervisor.h
driver-interface.h
driver-network.h
driver-nodedev.h
driver-nwfilter.h
driver-secret.h
driver-state.h
driver-storage.h
driver-stream.h
driver.c
driver.h
internal.h
libvirt_driver_modules.syms
libvirt_esx.syms
libvirt_internal.h
libvirt_libssh2.syms
libvirt_libssh.syms
libvirt_linux.syms
libvirt_logging.syms
libvirt_lxc.syms
libvirt_openvz.syms
libvirt_private.syms syms: Properly export 'virDomainDeviceDefValidate' 2024-05-31 12:54:32 +02:00
libvirt_probes.d
libvirt_public.syms
libvirt_qemu.syms
libvirt_remote.syms
libvirt_sasl.syms
libvirt_socket.syms
libvirt_vmware.syms
libvirt_vmx.syms vmx: hide private helpers 2020-10-14 11:23:18 +02:00
libvirt-domain-checkpoint.c
libvirt-domain-snapshot.c
libvirt-domain.c
libvirt-host.c
libvirt-interface.c
libvirt-lxc.c
libvirt-lxc.pc.in
libvirt-network.c network: ensure nparams is non-NULL and non-negative 2024-04-17 13:13:02 +01:00
libvirt-nodedev.c
libvirt-nwfilter.c
libvirt-qemu.c
libvirt-qemu.pc.in
libvirt-secret.c
libvirt-storage.c
libvirt-stream.c
libvirt.c
libvirt.conf
libvirt.pc.in
lock_protocol-structs
lxc_monitor_protocol-structs
lxc_protocol-structs
meson.build tests: build driver modules before virdrivermoduletest 2024-05-08 16:01:34 +01:00
qemu_protocol-structs
README
remote_protocol-structs
virkeepaliveprotocol-structs
virnetprotocol-structs
virtd-admin.socket.in
virtd-ro.socket.in
virtd-tcp.socket.in
virtd-tls.socket.in
virtd.service.in
virtd.service.limitmemlock.extra.in
virtd.service.limitnofile.extra.in
virtd.service.oomscoreadjust.extra.in
virtd.service.tasksmax.extra.in
virtd.socket.in

       libvirt library code README
       ===========================

The directory provides the bulk of the libvirt codebase. Everything
except for the libvirtd daemon and client tools. The build uses a
large number of libtool convenience libraries - one for each child
directory, and then links them together for the final libvirt.so,
although some bits get linked directly to libvirtd daemon instead.

The files directly in this directory are supporting the public API
entry points & data structures.

There are two core shared modules to be aware of:

 * util/  - a collection of shared APIs that can be used by any
            code. This directory is always in the include path
            for all things built

 * conf/  - APIs for parsing / manipulating all the official XML
            files used by the public API. This directory is only
            in the include path for driver implementation modules

 * vmx/   - VMware VMX config handling (used by esx/ and vmware/)


Then there are the hypervisor implementations:

 * bhyve         - bhyve - The BSD Hypervisor
 * esx/          - VMware ESX and GSX support using vSphere API over SOAP
 * hyperv/       - Microsoft Hyper-V support using WinRM
 * lxc/          - Linux Native Containers
 * openvz/       - OpenVZ containers using cli tools
 * qemu/         - QEMU / KVM using qemu CLI/monitor
 * remote/       - Generic libvirt native RPC client
 * test/         - A "mock" driver for testing
 * vbox/         - Virtual Box using native API
 * vmware/       - VMware Workstation and Player using the vmrun tool
 * xen/          - Xen using hypercalls, XenD SEXPR & XenStore


Finally some secondary drivers that are shared for several HVs.
Currently these are used by LXC, OpenVZ, QEMU and Xen drivers.
The ESX, Hyper-V, Remote, Test & VirtualBox drivers all
implement the secondary drivers directly

 * cpu/          - CPU feature management
 * interface/    - Host network interface management
 * network/      - Virtual NAT networking
 * nwfilter/     - Network traffic filtering rules
 * node_device/  - Host device enumeration
 * secret/       - Secret management
 * security/     - Mandatory access control drivers
 * storage/      - Storage management drivers


Since both the hypervisor and secondary drivers can be built as
dlopen()able modules, it is *FORBIDDEN* to have build dependencies
between these directories. Drivers are only allowed to depend on
the public API, and the internal APIs in the util/ and conf/
directories