[libvirt] [PATCH 09/12] Fix security driver calls in hotplug cleanup paths
Daniel Veillard
veillard at redhat.com
Wed Jan 20 17:37:14 UTC 2010
On Wed, Jan 20, 2010 at 03:15:06PM +0000, Daniel P. Berrange wrote:
> The hotplug code was not correctly invoking the security driver
> in error paths. If a hotplug attempt failed, the device would
> be left with VM permissions applied, rather than restored to the
> original permissions. Also, a CDROM media that is ejected was
> not restored to original permissions. Finally there was a bogus
> call to set hostdev permissions in the hostdev unplug code
>
> * qemu/qemu_driver.c: Fix security driver usage in hotplug/unplug
> ---
> src/qemu/qemu_driver.c | 177 +++++++++++++++++++++++++++++++++---------------
> 1 files changed, 123 insertions(+), 54 deletions(-)
> diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
> index 22b6adc..5054bcf 100644
> --- a/src/qemu/qemu_driver.c
> +++ b/src/qemu/qemu_driver.c
> @@ -5126,6 +5126,11 @@ static int qemudDomainChangeEjectableMedia(virConnectPtr conn,
Okay the refactoring for error handling of the functions is not trivial
to follow but looks fine,
ACK,
Daniel
--
Daniel Veillard | libxml Gnome XML XSLT toolkit http://xmlsoft.org/
daniel at veillard.com | Rpmfind RPM search engine http://rpmfind.net/
http://veillard.com/ | virtualization library http://libvirt.org/
More information about the libvir-list
mailing list