From nobody Thu May 15 03:33:06 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1512147058205709.2907799194354; Fri, 1 Dec 2017 08:50:58 -0800 (PST) Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 2F1F82D0FD0; Fri, 1 Dec 2017 16:50:57 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 087565C8A5; Fri, 1 Dec 2017 16:50:57 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id C94BD3D386; Fri, 1 Dec 2017 16:50:56 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id vB1Gotif019134 for ; Fri, 1 Dec 2017 11:50:55 -0500 Received: by smtp.corp.redhat.com (Postfix) id 56A795D977; Fri, 1 Dec 2017 16:50:55 +0000 (UTC) Received: from icr.brq.redhat.com (unknown [10.43.2.100]) by smtp.corp.redhat.com (Postfix) with ESMTP id A97F25D98D for ; Fri, 1 Dec 2017 16:50:51 +0000 (UTC) From: =?UTF-8?q?J=C3=A1n=20Tomko?= To: libvir-list@redhat.com Date: Fri, 1 Dec 2017 17:50:13 +0100 Message-Id: <3b116924516761b66ca8399f99a0657c4ffae808.1512146967.git.jtomko@redhat.com> In-Reply-To: References: In-Reply-To: References: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-loop: libvir-list@redhat.com Subject: [libvirt] [PATCHv2 7/7] Do not pass driver to qemuDomainNamespace{Setup, Teardown} functions X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Fri, 01 Dec 2017 16:50:57 +0000 (UTC) X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The underlying function which needs the driver gets it from the passed virDomainObj object anyway. --- src/qemu/qemu_domain.c | 34 ++++++++++++---------------------- src/qemu/qemu_domain.h | 30 ++++++++++-------------------- src/qemu/qemu_driver.c | 2 +- src/qemu/qemu_hotplug.c | 42 +++++++++++++++++++++--------------------- 4 files changed, 44 insertions(+), 64 deletions(-) diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c index c9d7dc5b0..97f8a5a61 100644 --- a/src/qemu/qemu_domain.c +++ b/src/qemu/qemu_domain.c @@ -6454,7 +6454,7 @@ qemuDomainDiskChainElementRevoke(virQEMUDriverPtr dri= ver, if (qemuSecurityRestoreImageLabel(driver, vm, elem) < 0) VIR_WARN("Unable to restore security label on %s", NULLSTR(elem->p= ath)); =20 - if (qemuDomainNamespaceTeardownDisk(driver, vm, elem) < 0) + if (qemuDomainNamespaceTeardownDisk(vm, elem) < 0) VIR_WARN("Unable to remove /dev entry for %s", NULLSTR(elem->path)= ); =20 if (virDomainLockImageDetach(driver->lockManager, vm, elem) < 0) @@ -6496,7 +6496,7 @@ qemuDomainDiskChainElementPrepare(virQEMUDriverPtr dr= iver, goto cleanup; =20 if (newSource && - qemuDomainNamespaceSetupDisk(driver, vm, elem) < 0) + qemuDomainNamespaceSetupDisk(vm, elem) < 0) goto cleanup; =20 if (qemuSetupImageCgroup(vm, elem) < 0) @@ -10021,8 +10021,7 @@ qemuDomainNamespaceUnlinkPath(virDomainObjPtr vm, =20 =20 int -qemuDomainNamespaceSetupDisk(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceSetupDisk(virDomainObjPtr vm, virStorageSourcePtr src) { virStorageSourcePtr next; @@ -10055,8 +10054,7 @@ qemuDomainNamespaceSetupDisk(virQEMUDriverPtr drive= r ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceTeardownDisk(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm ATTRIBUTE_UNUSED, +qemuDomainNamespaceTeardownDisk(virDomainObjPtr vm ATTRIBUTE_UNUSED, virStorageSourcePtr src ATTRIBUTE_UNUSED) { /* While in hotplug case we create the whole backing chain, @@ -10070,8 +10068,7 @@ qemuDomainNamespaceTeardownDisk(virQEMUDriverPtr dr= iver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceSetupHostdev(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceSetupHostdev(virDomainObjPtr vm, virDomainHostdevDefPtr hostdev) { int ret =3D -1; @@ -10097,8 +10094,7 @@ qemuDomainNamespaceSetupHostdev(virQEMUDriverPtr dr= iver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceTeardownHostdev(virQEMUDriverPtr driver ATTRIBUTE_UNUSE= D, - virDomainObjPtr vm, +qemuDomainNamespaceTeardownHostdev(virDomainObjPtr vm, virDomainHostdevDefPtr hostdev) { int ret =3D -1; @@ -10125,8 +10121,7 @@ qemuDomainNamespaceTeardownHostdev(virQEMUDriverPtr= driver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceSetupMemory(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceSetupMemory(virDomainObjPtr vm, virDomainMemoryDefPtr mem) { if (mem->model !=3D VIR_DOMAIN_MEMORY_MODEL_NVDIMM) @@ -10140,8 +10135,7 @@ qemuDomainNamespaceSetupMemory(virQEMUDriverPtr dri= ver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceTeardownMemory(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceTeardownMemory(virDomainObjPtr vm, virDomainMemoryDefPtr mem) { if (mem->model !=3D VIR_DOMAIN_MEMORY_MODEL_NVDIMM) @@ -10155,8 +10149,7 @@ qemuDomainNamespaceTeardownMemory(virQEMUDriverPtr = driver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceSetupChardev(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceSetupChardev(virDomainObjPtr vm, virDomainChrDefPtr chr) { const char *path; @@ -10177,8 +10170,7 @@ qemuDomainNamespaceSetupChardev(virQEMUDriverPtr dr= iver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceTeardownChardev(virQEMUDriverPtr driver ATTRIBUTE_UNUSE= D, - virDomainObjPtr vm, +qemuDomainNamespaceTeardownChardev(virDomainObjPtr vm, virDomainChrDefPtr chr) { const char *path =3D NULL; @@ -10196,8 +10188,7 @@ qemuDomainNamespaceTeardownChardev(virQEMUDriverPtr= driver ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceSetupRNG(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceSetupRNG(virDomainObjPtr vm, virDomainRNGDefPtr rng) { const char *path =3D NULL; @@ -10220,8 +10211,7 @@ qemuDomainNamespaceSetupRNG(virQEMUDriverPtr driver= ATTRIBUTE_UNUSED, =20 =20 int -qemuDomainNamespaceTeardownRNG(virQEMUDriverPtr driver ATTRIBUTE_UNUSED, - virDomainObjPtr vm, +qemuDomainNamespaceTeardownRNG(virDomainObjPtr vm, virDomainRNGDefPtr rng) { const char *path =3D NULL; diff --git a/src/qemu/qemu_domain.h b/src/qemu/qemu_domain.h index c33af3671..e1f8a809a 100644 --- a/src/qemu/qemu_domain.h +++ b/src/qemu/qemu_domain.h @@ -905,44 +905,34 @@ void qemuDomainDestroyNamespace(virQEMUDriverPtr driv= er, =20 bool qemuDomainNamespaceAvailable(qemuDomainNamespace ns); =20 -int qemuDomainNamespaceSetupDisk(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceSetupDisk(virDomainObjPtr vm, virStorageSourcePtr src); =20 -int qemuDomainNamespaceTeardownDisk(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceTeardownDisk(virDomainObjPtr vm, virStorageSourcePtr src); =20 -int qemuDomainNamespaceSetupHostdev(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceSetupHostdev(virDomainObjPtr vm, virDomainHostdevDefPtr hostdev); =20 -int qemuDomainNamespaceTeardownHostdev(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceTeardownHostdev(virDomainObjPtr vm, virDomainHostdevDefPtr hostdev); =20 -int qemuDomainNamespaceSetupMemory(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceSetupMemory(virDomainObjPtr vm, virDomainMemoryDefPtr memory); =20 -int qemuDomainNamespaceTeardownMemory(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceTeardownMemory(virDomainObjPtr vm, virDomainMemoryDefPtr memory); =20 -int qemuDomainNamespaceSetupChardev(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceSetupChardev(virDomainObjPtr vm, virDomainChrDefPtr chr); =20 -int qemuDomainNamespaceTeardownChardev(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceTeardownChardev(virDomainObjPtr vm, virDomainChrDefPtr chr); =20 -int qemuDomainNamespaceSetupRNG(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceSetupRNG(virDomainObjPtr vm, virDomainRNGDefPtr rng); =20 -int qemuDomainNamespaceTeardownRNG(virQEMUDriverPtr driver, - virDomainObjPtr vm, +int qemuDomainNamespaceTeardownRNG(virDomainObjPtr vm, virDomainRNGDefPtr rng); =20 int qemuDomainNamespaceSetupInput(virDomainObjPtr vm, diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c index 5eae7d24a..3cf488d42 100644 --- a/src/qemu/qemu_driver.c +++ b/src/qemu/qemu_driver.c @@ -16529,7 +16529,7 @@ qemuDomainBlockPivot(virQEMUDriverPtr driver, =20 if (disk->mirror->format && disk->mirror->format !=3D VIR_STORAGE_FILE_RAW && - (qemuDomainNamespaceSetupDisk(driver, vm, disk->src) < 0 || + (qemuDomainNamespaceSetupDisk(vm, disk->src) < 0 || qemuSetupDiskCgroup(vm, disk) < 0 || qemuSecuritySetDiskLabel(driver, vm, disk) < 0)) goto cleanup; diff --git a/src/qemu/qemu_hotplug.c b/src/qemu/qemu_hotplug.c index cbc7af59b..f26839c09 100644 --- a/src/qemu/qemu_hotplug.c +++ b/src/qemu/qemu_hotplug.c @@ -112,7 +112,7 @@ qemuHotplugPrepareDiskAccess(virQEMUDriverPtr driver, vm, disk) < 0) goto cleanup; =20 - if (qemuDomainNamespaceSetupDisk(driver, vm, disk->src) < 0) + if (qemuDomainNamespaceSetupDisk(vm, disk->src) < 0) goto rollback_lock; =20 if (qemuSecuritySetDiskLabel(driver, vm, disk) < 0) @@ -134,7 +134,7 @@ qemuHotplugPrepareDiskAccess(virQEMUDriverPtr driver, virDomainDiskGetSource(disk)); =20 rollback_namespace: - if (qemuDomainNamespaceTeardownDisk(driver, vm, disk->src) < 0) + if (qemuDomainNamespaceTeardownDisk(vm, disk->src) < 0) VIR_WARN("Unable to remove /dev entry for %s", virDomainDiskGetSource(disk)); =20 @@ -1304,7 +1304,7 @@ qemuDomainAttachHostPCIDevice(virQEMUDriverPtr driver, } vm->def->hostdevs[--(vm->def->nhostdevs)] =3D NULL; =20 - if (qemuDomainNamespaceSetupHostdev(driver, vm, hostdev) < 0) + if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0) goto error; teardowndevice =3D true; =20 @@ -1374,7 +1374,7 @@ qemuDomainAttachHostPCIDevice(virQEMUDriverPtr driver, qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0) VIR_WARN("Unable to restore host device labelling on hotplug fail"= ); if (teardowndevice && - qemuDomainNamespaceTeardownHostdev(driver, vm, hostdev) < 0) + qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0) VIR_WARN("Unable to remove host device from /dev"); =20 if (releaseaddr) @@ -1831,7 +1831,7 @@ int qemuDomainAttachChrDevice(virConnectPtr conn, if (rc =3D=3D 1) need_release =3D true; =20 - if (qemuDomainNamespaceSetupChardev(driver, vm, chr) < 0) + if (qemuDomainNamespaceSetupChardev(vm, chr) < 0) goto cleanup; teardowndevice =3D true; =20 @@ -1877,7 +1877,7 @@ int qemuDomainAttachChrDevice(virConnectPtr conn, qemuDomainReleaseDeviceAddress(vm, &chr->info, NULL); if (teardowncgroup && qemuTeardownChardevCgroup(vm, chr) < 0) VIR_WARN("Unable to remove chr device cgroup ACL on hotplug fa= il"); - if (teardowndevice && qemuDomainNamespaceTeardownChardev(driver, v= m, chr) < 0) + if (teardowndevice && qemuDomainNamespaceTeardownChardev(vm, chr) = < 0) VIR_WARN("Unable to remove chr device from /dev"); } VIR_FREE(tlsAlias); @@ -1934,7 +1934,7 @@ qemuDomainAttachRNGDevice(virConnectPtr conn, if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, "rng") < 0) return -1; =20 - if (qemuDomainNamespaceSetupRNG(driver, vm, rng) < 0) + if (qemuDomainNamespaceSetupRNG(vm, rng) < 0) goto cleanup; teardowndevice =3D true; =20 @@ -1998,7 +1998,7 @@ qemuDomainAttachRNGDevice(virConnectPtr conn, qemuDomainReleaseDeviceAddress(vm, &rng->info, NULL); if (teardowncgroup && qemuTeardownRNGCgroup(vm, rng) < 0) VIR_WARN("Unable to remove RNG device cgroup ACL on hotplug fa= il"); - if (teardowndevice && qemuDomainNamespaceTeardownRNG(driver, vm, r= ng) < 0) + if (teardowndevice && qemuDomainNamespaceTeardownRNG(vm, rng) < 0) VIR_WARN("Unable to remove chr device from /dev"); } =20 @@ -2084,7 +2084,7 @@ qemuDomainAttachMemory(virQEMUDriverPtr driver, if (qemuProcessBuildDestroyMemoryPaths(driver, vm, mem, true) < 0) goto cleanup; =20 - if (qemuDomainNamespaceSetupMemory(driver, vm, mem) < 0) + if (qemuDomainNamespaceSetupMemory(vm, mem) < 0) goto cleanup; teardowndevice =3D true; =20 @@ -2142,7 +2142,7 @@ qemuDomainAttachMemory(virQEMUDriverPtr driver, if (teardownlabel && qemuSecurityRestoreMemoryLabel(driver, vm, me= m) < 0) VIR_WARN("Unable to restore security label on memdev"); if (teardowndevice && - qemuDomainNamespaceTeardownMemory(driver, vm, mem) < 0) + qemuDomainNamespaceTeardownMemory(vm, mem) < 0) VIR_WARN("Unable to remove memory device from /dev"); } =20 @@ -2203,7 +2203,7 @@ qemuDomainAttachHostUSBDevice(virQEMUDriverPtr driver, =20 added =3D true; =20 - if (qemuDomainNamespaceSetupHostdev(driver, vm, hostdev) < 0) + if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0) goto cleanup; teardowndevice =3D true; =20 @@ -2244,7 +2244,7 @@ qemuDomainAttachHostUSBDevice(virQEMUDriverPtr driver, qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0) VIR_WARN("Unable to restore host device labelling on hotplug f= ail"); if (teardowndevice && - qemuDomainNamespaceTeardownHostdev(driver, vm, hostdev) < 0) + qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0) VIR_WARN("Unable to remove host device from /dev"); if (added) qemuHostdevReAttachUSBDevices(driver, vm->def->name, &hostdev,= 1); @@ -2302,7 +2302,7 @@ qemuDomainAttachHostSCSIDevice(virConnectPtr conn, if (qemuHostdevPrepareSCSIDevices(driver, vm->def->name, &hostdev, 1) = < 0) return -1; =20 - if (qemuDomainNamespaceSetupHostdev(driver, vm, hostdev) < 0) + if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0) goto cleanup; teardowndevice =3D true; =20 @@ -2375,7 +2375,7 @@ qemuDomainAttachHostSCSIDevice(virConnectPtr conn, qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0) VIR_WARN("Unable to restore host device labelling on hotplug f= ail"); if (teardowndevice && - qemuDomainNamespaceTeardownHostdev(driver, vm, hostdev) < 0) + qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0) VIR_WARN("Unable to remove host device from /dev"); } qemuDomainSecretHostdevDestroy(hostdev); @@ -2429,7 +2429,7 @@ qemuDomainAttachSCSIVHostDevice(virQEMUDriverPtr driv= er, if (qemuHostdevPrepareSCSIVHostDevices(driver, vm->def->name, &hostdev= , 1) < 0) return -1; =20 - if (qemuDomainNamespaceSetupHostdev(driver, vm, hostdev) < 0) + if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0) goto cleanup; teardowndevice =3D true; =20 @@ -2499,7 +2499,7 @@ qemuDomainAttachSCSIVHostDevice(virQEMUDriverPtr driv= er, qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0) VIR_WARN("Unable to restore host device labelling on hotplug f= ail"); if (teardowndevice && - qemuDomainNamespaceTeardownHostdev(driver, vm, hostdev) < 0) + qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0) VIR_WARN("Unable to remove host device from /dev"); if (releaseaddr) qemuDomainReleaseDeviceAddress(vm, hostdev->info, NULL); @@ -3733,7 +3733,7 @@ qemuDomainRemoveDiskDevice(virQEMUDriverPtr driver, if (virDomainLockDiskDetach(driver->lockManager, vm, disk) < 0) VIR_WARN("Unable to release lock on %s", src); =20 - if (qemuDomainNamespaceTeardownDisk(driver, vm, disk->src) < 0) + if (qemuDomainNamespaceTeardownDisk(vm, disk->src) < 0) VIR_WARN("Unable to remove /dev entry for %s", src); =20 dev.type =3D VIR_DOMAIN_DEVICE_DISK; @@ -3816,7 +3816,7 @@ qemuDomainRemoveMemoryDevice(virQEMUDriverPtr driver, if (qemuTeardownMemoryDevicesCgroup(vm, mem) < 0) VIR_WARN("Unable to remove memory device cgroup ACL"); =20 - if (qemuDomainNamespaceTeardownMemory(driver, vm, mem) < 0) + if (qemuDomainNamespaceTeardownMemory(vm, mem) < 0) VIR_WARN("Unable to remove memory device from /dev"); =20 virDomainMemoryDefFree(mem); @@ -3946,7 +3946,7 @@ qemuDomainRemoveHostDevice(virQEMUDriverPtr driver, if (qemuTeardownHostdevCgroup(vm, hostdev) < 0) VIR_WARN("Failed to remove host device cgroup ACL"); =20 - if (qemuDomainNamespaceTeardownHostdev(driver, vm, hostdev) < 0) + if (qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0) VIR_WARN("Unable to remove host device from /dev"); =20 switch ((virDomainHostdevSubsysType) hostdev->source.subsys.type) { @@ -4154,7 +4154,7 @@ qemuDomainRemoveChrDevice(virQEMUDriverPtr driver, if (qemuTeardownChardevCgroup(vm, chr) < 0) VIR_WARN("Failed to remove chr device cgroup ACL"); =20 - if (qemuDomainNamespaceTeardownChardev(driver, vm, chr) < 0) + if (qemuDomainNamespaceTeardownChardev(vm, chr) < 0) VIR_WARN("Unable to remove chr device from /dev"); =20 event =3D virDomainEventDeviceRemovedNewFromObj(vm, chr->info.alias); @@ -4235,7 +4235,7 @@ qemuDomainRemoveRNGDevice(virQEMUDriverPtr driver, if (qemuTeardownRNGCgroup(vm, rng) < 0) VIR_WARN("Failed to remove RNG device cgroup ACL"); =20 - if (qemuDomainNamespaceTeardownRNG(driver, vm, rng) < 0) + if (qemuDomainNamespaceTeardownRNG(vm, rng) < 0) VIR_WARN("Unable to remove RNG device from /dev"); =20 event =3D virDomainEventDeviceRemovedNewFromObj(vm, rng->info.alias); --=20 2.13.6 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list