]> xenbits.xensource.com Git - libvirt.git/commitdiff
qemu: Prepare RNGs when starting a domain
authorMichal Privoznik <mprivozn@redhat.com>
Tue, 15 Nov 2016 15:10:23 +0000 (16:10 +0100)
committerMichal Privoznik <mprivozn@redhat.com>
Thu, 15 Dec 2016 08:25:16 +0000 (09:25 +0100)
When starting a domain and separate mount namespace is used, we
have to create all the /dev entries that are configured for the
domain.

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
src/qemu/qemu_domain.c

index d6d5a622df0913a469d91029a1ce3610657684ed..49e8534ca0ef3545055f200cacc6c979ac0b6c45 100644 (file)
@@ -7221,6 +7221,46 @@ qemuDomainSetupAllInputs(virQEMUDriverPtr driver,
 }
 
 
+static int
+qemuDomainSetupRNG(virQEMUDriverPtr driver ATTRIBUTE_UNUSED,
+                   virDomainRNGDefPtr rng,
+                   const char *devPath)
+{
+    switch ((virDomainRNGBackend) rng->backend) {
+    case VIR_DOMAIN_RNG_BACKEND_RANDOM:
+        if (qemuDomainCreateDevice(rng->source.file, devPath, false) < 0)
+            return -1;
+
+    case VIR_DOMAIN_RNG_BACKEND_EGD:
+    case VIR_DOMAIN_RNG_BACKEND_LAST:
+        /* nada */
+        break;
+    }
+
+    return 0;
+}
+
+
+static int
+qemuDomainSetupAllRNGs(virQEMUDriverPtr driver,
+                       virDomainObjPtr vm,
+                       const char *devPath)
+{
+    size_t i;
+
+    VIR_DEBUG("Setting up RNGs");
+    for (i = 0; i < vm->def->nrngs; i++) {
+        if (qemuDomainSetupRNG(driver,
+                               vm->def->rngs[i],
+                               devPath) < 0)
+            return -1;
+    }
+
+    VIR_DEBUG("Setup all RNGs");
+    return 0;
+}
+
+
 int
 qemuDomainBuildNamespace(virQEMUDriverPtr driver,
                          virDomainObjPtr vm)
@@ -7274,6 +7314,9 @@ qemuDomainBuildNamespace(virQEMUDriverPtr driver,
     if (qemuDomainSetupAllInputs(driver, vm, devPath) < 0)
         goto cleanup;
 
+    if (qemuDomainSetupAllRNGs(driver, vm, devPath) < 0)
+        goto cleanup;
+
     if (mount(devPath, "/dev", NULL, mount_flags, NULL) < 0) {
         virReportSystemError(errno,
                              _("Failed to mount %s on /dev"),