1. 19 10月, 2017 8 次提交
  2. 18 10月, 2017 1 次提交
  3. 16 10月, 2017 2 次提交
    • D
      qemu: ensure TLS clients always verify the server certificate · 441d3eb6
      Daniel P. Berrange 提交于
      The default_tls_x509_verify (and related) parameters in qemu.conf
      control whether the QEMU TLS servers request & verify certificates
      from clients. This works as a simple access control system for
      servers by requiring the CA to issue certs to permitted clients.
      This use of client certificates is disabled by default, since it
      requires extra work to issue client certificates.
      
      Unfortunately the code was using this configuration parameter when
      setting up both TLS clients and servers in QEMU. The result was that
      TLS clients for character devices and disk devices had verification
      turned off, meaning they would ignore errors while validating the
      server certificate.
      
      This allows for trivial MITM attacks between client and server,
      as any certificate returned by the attacker will be accepted by
      the client.
      
      This is assigned CVE-2017-1000256  / LSN-2017-0002
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      441d3eb6
    • D
      Use https:// links for most sites · e371b3bf
      Daniel P. Berrange 提交于
      This adds a rule to require https links for the libvirt, qemu
      and kvm websites.
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      e371b3bf
  4. 05 10月, 2017 4 次提交
  5. 04 10月, 2017 1 次提交
    • L
      qemu: Support multiqueue virtio-blk · abca72fa
      Lin Ma 提交于
      qemu 2.7.0 introduces multiqueue virtio-blk(commit 2f27059).
      This patch introduces a new attribute "queues". An example of
      the XML:
      
      <disk type='file' device='disk'>
        <driver name='qemu' type='qcow2' queues='4'/>
      
      The corresponding QEMU command line:
      
      -device virtio-blk-pci,scsi=off,num-queues=4,id=virtio-disk0
      Signed-off-by: NLin Ma <lma@suse.com>
      Signed-off-by: NJán Tomko <jtomko@redhat.com>
      abca72fa
  6. 28 9月, 2017 1 次提交
    • A
      qemu: Add TLS support for Veritas HyperScale (VxHS) · 6885b51e
      Ashish Mittal 提交于
      Alter qemu command line generation in order to possibly add TLS for
      a suitably configured domain.
      
      Sample TLS args generated by libvirt -
      
          -object tls-creds-x509,id=objvirtio-disk0_tls0,dir=/etc/pki/qemu,\
          endpoint=client,verify-peer=yes \
          -drive file.driver=vxhs,file.tls-creds=objvirtio-disk0_tls0,\
          file.vdisk-id=eb90327c-8302-4725-9e1b-4e85ed4dc251,\
          file.server.type=tcp,file.server.host=192.168.0.1,\
          file.server.port=9999,format=raw,if=none,\
          id=drive-virtio-disk0,cache=none \
          -device virtio-blk-pci,bus=pci.0,addr=0x4,drive=drive-virtio-disk0,\
          id=virtio-disk0
      
      Update the qemuxml2argvtest with a couple of examples. One for a
      simple case and the other a bit more complex where multiple VxHS disks
      are added where at least one uses a VxHS that doesn't require TLS
      credentials and thus sets the domain disk source attribute "tls = 'no'".
      
      Update the hotplug to be able to handle processing the tlsAlias whether
      it's to add the TLS object when hotplugging a disk or to remove the TLS
      object when hot unplugging a disk.  The hot plug/unplug code is largely
      generic, but the addition code does make the VXHS specific checks only
      because it needs to grab the correct config directory and generate the
      object as the command line would do.
      Signed-off-by: NAshish Mittal <Ashish.Mittal@veritas.com>
      Signed-off-by: NJohn Ferlan <jferlan@redhat.com>
      6885b51e
  7. 21 9月, 2017 1 次提交
    • M
      qemuBuildHostNetStr: Don't leak @addr · 57d8afcf
      Michal Privoznik 提交于
      The virSocketAddrFormat() allocates the string and it's caller
      responsibility to free it afterwards.
      
      ==28857== 11 bytes in 1 blocks are definitely lost in loss record 37 of 168
      ==28857==    at 0x4C2BEDF: malloc (vg_replace_malloc.c:299)
      ==28857==    by 0x9A81D79: strdup (in /lib64/libc-2.23.so)
      ==28857==    by 0x5DA3BF0: virStrdup (virstring.c:902)
      ==28857==    by 0x5D96182: virSocketAddrFormatFull (virsocketaddr.c:427)
      ==28857==    by 0x5D95E13: virSocketAddrFormat (virsocketaddr.c:352)
      ==28857==    by 0x5706890: qemuBuildHostNetStr (qemu_command.c:3891)
      ==28857==    by 0x57138D3: qemuBuildInterfaceCommandLine (qemu_command.c:8597)
      ==28857==    by 0x5713D6A: qemuBuildNetCommandLine (qemu_command.c:8699)
      ==28857==    by 0x57176F6: qemuBuildCommandLine (qemu_command.c:10027)
      ==28857==    by 0x5769D61: qemuProcessCreatePretendCmd (qemu_process.c:6004)
      ==28857==    by 0x4056EC: testCompareXMLToArgv (qemuxml2argvtest.c:502)
      ==28857==    by 0x41DF40: virTestRun (testutils.c:180)
      Signed-off-by: NMichal Privoznik <mprivozn@redhat.com>
      Reviewed-by: NJohn Ferlan <jferlan@redhat.com>
      57d8afcf
  8. 20 9月, 2017 2 次提交
  9. 18 9月, 2017 1 次提交
  10. 12 9月, 2017 1 次提交
  11. 07 9月, 2017 1 次提交
  12. 05 9月, 2017 1 次提交
  13. 29 8月, 2017 2 次提交
  14. 27 8月, 2017 1 次提交
  15. 10 8月, 2017 1 次提交
  16. 03 8月, 2017 3 次提交
    • C
      qemu: command: explicitly error for non-x86 default CPU · 64665fa8
      Cole Robinson 提交于
      The code only currently handles writing an x86 default -cpu
      argument, and doesn't know anything about other architectures.
      Let's make this explicit rather than leaving ex. qemu ppc64 to
      throw an error about -cpu qemu64
      Reviewed-by: NJán Tomko <jtomko@redhat.com>
      Signed-off-by: NCole Robinson <crobinso@redhat.com>
      64665fa8
    • C
      qemu: command: rework adding of default cpu model · 05583fcb
      Cole Robinson 提交于
      Certain XML features that aren't in the <cpu> block map to -cpu
      flags on the qemu cli. If one of these is specified but the user
      didn't explicitly pass an XML <cpu> model, we need to format a
      default model on the command line.
      
      The current code handles this by sprinkling this default cpu handling
      among all the different flag string formatting. Instead, switch it
      to do this just once.
      
      This alters some test output slightly: the previous code would
      write the default -cpu in some cases when no flags were actually
      added, so the output was redundant.
      Reviewed-by: NJán Tomko <jtomko@redhat.com>
      Signed-off-by: NCole Robinson <crobinso@redhat.com>
      05583fcb
    • N
      qemu: command: align disk serial check to schema · cc6d43bb
      Nikolay Shirokovskiy 提交于
      Disk serial schema has extra '.+' allowed characters in comparison
      with check in code. Looks like there is no reason for that as qemu
      allows any character AFAIK for serial. This discrepancy is originated
      in commit id '85d15b51' where the ability to add serial was added.
      
      Alter the disk-serial test to add a disk with all the possible
      characters listed as the serial value.
      cc6d43bb
  17. 02 8月, 2017 2 次提交
  18. 27 7月, 2017 1 次提交
  19. 25 7月, 2017 1 次提交
  20. 24 7月, 2017 3 次提交
  21. 22 7月, 2017 1 次提交
  22. 21 7月, 2017 1 次提交
    • S
      qemu: Enable NUMA node tag in pci-root for PPC64 · e5a05799
      Shivaprasad G Bhat 提交于
      This patch addresses the same aspects on PPC the bug 1103314 addressed
      on x86.
      
      PCI expander bus creates multiple primary PCI busses, where each of these
      busses can be assigned a specific NUMA affinity, which, on x86 is
      advertised through ACPI on a per-bus basis.
      
      For SPAPR, a PHB's NUMA affinities are assigned on a per-PHB basis, and
      there is no mechanism for advertising NUMA affinities to a guest on a
      per-bus basis. So, even if qemu-ppc manages to get some sort of multi-bus
      topology working using PXB, there is no way to expose the affinities
      of these busses to the guest. It can only be exposed on a per-PHB/per-domain
      basis.
      
      So patch enables NUMA node tag in pci-root controller on PPC.
      
      The way to set the NUMA node is through the numa_node option of
      spapr-pci-host-bridge device. However for the implicit PHB, the only way
      to set the numa_node is from the -global option. The -global option applies
      to all the PHBs unless explicitly specified with the option on the
      respective PHB of CLI. The default PHB has the emulated devices only, so
      the patch prevents setting the NUMA node for the default PHB.
      Signed-off-by: NShivaprasad G Bhat <sbhat@linux.vnet.ibm.com>
      Reviewed-by: NAndrea Bolognani <abologna@redhat.com>
      e5a05799