On Thu, Jul 21, 2022 at 12:45:29PM +0200, Michal Prívozník wrote:
On 7/21/22 12:31, Michal Privoznik wrote:We have qemuCgroupAllowDevicePath() which sets up devices controller for just one path. And if we have more paths we have to call it in a loop. So far, we have just one such place, but soon we'll have another one (for SGX memory). Separate the loop into its own function so that it can be reused.And while at it, move setting the default set of devices as the first thing, right after all devices are disallowed. Signed-off-by: Michal Privoznik <mpriv...@redhat.com> --- src/qemu/qemu_cgroup.c | 51 +++++++++++++++++++++++++++++------------- 1 file changed, 36 insertions(+), 15 deletions(-) diff --git a/src/qemu/qemu_cgroup.c b/src/qemu/qemu_cgroup.c index e012ba92c0..8339caeb53 100644 --- a/src/qemu/qemu_cgroup.c +++ b/src/qemu/qemu_cgroup.c @@ -67,6 +67,32 @@ qemuCgroupAllowDevicePath(virDomainObj *vm, } +static int +qemuCgroupAllowDevicesPaths(virDomainObj *vm, + const char *const *deviceACL, + int perms, + bool ignoreEacces) +{ + size_t i; + + for (i = 0; deviceACL[i] != NULL; i++) { + int rv; + + if (!virFileExists(deviceACL[i])) { + VIR_DEBUG("Ignoring non-existent device %s", deviceACL[i]); + continue; + } + + rv = qemuCgroupAllowDevicePath(vm, deviceACL[i], perms, ignoreEacces); + if (rv < 0 && + !virLastErrorIsSystemErrno(ENOENT)) + return -1; + } + + return 0; +} + + static int qemuCgroupDenyDevicePath(virDomainObj *vm, const char *path, @@ -659,6 +685,10 @@ qemuSetupDevicesCgroup(virDomainObj *vm) if (!virCgroupHasController(priv->cgroup, VIR_CGROUP_CONTROLLER_DEVICES)) return 0; + deviceACL = cfg->cgroupDeviceACL ? + (const char *const *)cfg->cgroupDeviceACL : + defaultDeviceACL; +OOOps, this hunk does not belong here. I've screwed up conflict resolution. Consider fixed locally.
With this hunk removed Reviewed-by: Martin Kletzander <mklet...@redhat.com>
signature.asc
Description: PGP signature