1. 12 10月, 2015 1 次提交
  2. 24 9月, 2015 1 次提交
  3. 15 9月, 2015 3 次提交
    • D
      ui: convert VNC server to use QCryptoTLSSession · 3e305e4a
      Daniel P. Berrange 提交于
      Switch VNC server over to using the QCryptoTLSSession object
      for the TLS session. This removes the direct use of gnutls
      from the VNC server code. It also removes most knowledge
      about TLS certificate handling from the VNC server code.
      This has the nice effect that all the CONFIG_VNC_TLS
      conditionals go away and the user gets an actual error
      message when requesting TLS instead of it being silently
      ignored.
      
      With this change, the existing configuration options for
      enabling TLS with -vnc are deprecated.
      
      Old syntax for anon-DH credentials:
      
        -vnc hostname:0,tls
      
      New syntax:
      
        -object tls-creds-anon,id=tls0,endpoint=server \
        -vnc hostname:0,tls-creds=tls0
      
      Old syntax for x509 credentials, no client certs:
      
        -vnc hostname:0,tls,x509=/path/to/certs
      
      New syntax:
      
        -object tls-creds-x509,id=tls0,dir=/path/to/certs,endpoint=server,verify-peer=no \
        -vnc hostname:0,tls-creds=tls0
      
      Old syntax for x509 credentials, requiring client certs:
      
        -vnc hostname:0,tls,x509verify=/path/to/certs
      
      New syntax:
      
        -object tls-creds-x509,id=tls0,dir=/path/to/certs,endpoint=server,verify-peer=yes \
        -vnc hostname:0,tls-creds=tls0
      
      This aligns VNC with the way TLS credentials are to be
      configured in the future for chardev, nbd and migration
      backends. It also has the benefit that the same TLS
      credentials can be shared across multiple VNC server
      instances, if desired.
      
      If someone uses the deprecated syntax, it will internally
      result in the creation of a 'tls-creds' object with an ID
      based on the VNC server ID. This allows backwards compat
      with the CLI syntax, while still deleting all the original
      TLS code from the VNC server.
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      3e305e4a
    • D
      crypto: introduce new module for TLS x509 credentials · 85bcbc78
      Daniel P. Berrange 提交于
      Introduce a QCryptoTLSCredsX509 class which is used to
      manage x509 certificate TLS credentials. This will be
      the preferred credential type offering strong security
      characteristics
      
      Example CLI configuration:
      
       $QEMU -object tls-creds-x509,id=tls0,endpoint=server,\
                     dir=/path/to/creds/dir,verify-peer=yes
      
      The 'id' value in the -object args will be used to associate the
      credentials with the network services. For example, when the VNC
      server is later converted it would use
      
       $QEMU -object tls-creds-x509,id=tls0,.... \
             -vnc 127.0.0.1:1,tls-creds=tls0
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      Reviewed-by: NEric Blake <eblake@redhat.com>
      85bcbc78
    • D
      crypto: introduce new module for TLS anonymous credentials · e00adf6c
      Daniel P. Berrange 提交于
      Introduce a QCryptoTLSCredsAnon class which is used to
      manage anonymous TLS credentials. Use of this class is
      generally discouraged since it does not offer strong
      security, but it is required for backwards compatibility
      with the current VNC server implementation.
      
      Simple example CLI configuration:
      
       $QEMU -object tls-creds-anon,id=tls0,endpoint=server
      
      Example using pre-created diffie-hellman parameters
      
       $QEMU -object tls-creds-anon,id=tls0,endpoint=server,\
                     dir=/path/to/creds/dir
      
      The 'id' value in the -object args will be used to associate the
      credentials with the network services. For example, when the VNC
      server is later converted it would use
      
       $QEMU -object tls-creds-anon,id=tls0,.... \
             -vnc 127.0.0.1:1,tls-creds=tls0
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      Reviewed-by: NEric Blake <eblake@redhat.com>
      e00adf6c
  4. 11 9月, 2015 2 次提交
  5. 10 9月, 2015 1 次提交
  6. 07 9月, 2015 1 次提交
  7. 24 7月, 2015 1 次提交
  8. 20 7月, 2015 1 次提交
  9. 02 7月, 2015 2 次提交
    • P
      block/iscsi: restore compatiblity with libiscsi 1.9.0 · 9049736e
      Peter Lieven 提交于
      RHEL7 and others are stuck with libiscsi 1.9.0 since there
      unfortunately was an ABI breakage after that release.
      Signed-off-by: NPeter Lieven <pl@kamp.de>
      Reviewed-by: NPaolo Bonzini <pbonzini@redhat.com>
      Message-id: 1435313881-19366-1-git-send-email-pl@kamp.de
      Signed-off-by: NStefan Hajnoczi <stefanha@redhat.com>
      9049736e
    • P
      block/iscsi: add support for request timeouts · 5dd7a535
      Peter Lieven 提交于
      libiscsi starting with 1.15 will properly support timeout of iscsi
      commands. The default will remain no timeout, but this can
      be changed via cmdline parameters, e.g.:
      
      qemu -iscsi timeout=30 -drive file=iscsi://...
      
      If a timeout occurs a reconnect is scheduled and the timed out command
      will be requeued for processing after a successful reconnect.
      
      The required API call iscsi_set_timeout is present since libiscsi
      1.10 which was released in October 2013. However, due to some bugs
      in the libiscsi code the use is not recommended before version 1.15.
      
      Please note that this patch bumps the libiscsi requirement to 1.10
      to have all function and macros defined. The patch fixes also a
      off-by-one error in the NOP timeout calculation which was fixed
      while touching these code parts.
      Signed-off-by: NPeter Lieven <pl@kamp.de>
      Message-id: 1434455107-19328-1-git-send-email-pl@kamp.de
      Signed-off-by: NStefan Hajnoczi <stefanha@redhat.com>
      5dd7a535
  10. 26 6月, 2015 1 次提交
  11. 24 6月, 2015 2 次提交
  12. 20 6月, 2015 1 次提交
  13. 19 6月, 2015 1 次提交
    • L
      semihosting: add --semihosting-config arg sub-argument · a59d31a1
      Leon Alrae 提交于
      Add new "arg" sub-argument to the --semihosting-config allowing the user
      to pass multiple input arguments separately. It is required for example
      by UHI semihosting to construct argc and argv.
      
      Also, update ARM semihosting to support new option (at the moment it is
      the only target which cares about arguments).
      
      If the semihosting is enabled and no semihosting args have been specified,
      then fall back to -kernel/-append. The -append string is split on whitespace
      before initializing semihosting.argv[1..n]; this is different from what
      QEMU MIPS machines' pseudo-bootloaders do (i.e. argv[1] contains the whole
      -append), but is more intuitive from UHI user's point of view and Linux
      kernel just does not care as it concatenates argv[1..n] into single cmdline
      string anyway.
      Signed-off-by: NLeon Alrae <leon.alrae@imgtec.com>
      Message-id: 1434643256-16858-3-git-send-email-leon.alrae@imgtec.com
      Reviewed-by: NPeter Maydell <peter.maydell@linaro.org>
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      a59d31a1
  14. 12 6月, 2015 2 次提交
  15. 11 6月, 2015 2 次提交
  16. 10 6月, 2015 1 次提交
    • G
      fw_cfg: insert fw_cfg file blobs via qemu cmdline · 81b2b810
      Gabriel L. Somlo 提交于
      Allow user supplied files to be inserted into the fw_cfg
      device before starting the guest. Since fw_cfg_add_file()
      already disallows duplicate fw_cfg file names, qemu will
      exit with an error message if the user supplies multiple
      blobs with the same fw_cfg file name, or if a blob name
      collides with a fw_cfg name programmatically added from
      within the QEMU source code. A warning message will be
      printed if the fw_cfg item name does not begin with the
      prefix "opt/", which is recommended for external, user
      provided blobs.
      Signed-off-by: NGabriel Somlo <somlo@cmu.edu>
      Reviewed-by: NLaszlo Ersek <lersek@redhat.com>
      Signed-off-by: NGerd Hoffmann <kraxel@redhat.com>
      81b2b810
  17. 08 6月, 2015 1 次提交
  18. 05 6月, 2015 2 次提交
  19. 03 6月, 2015 1 次提交
  20. 01 6月, 2015 1 次提交
  21. 29 5月, 2015 1 次提交
  22. 27 5月, 2015 1 次提交
    • T
      net: Change help text to list -netdev instead of -net by default · 6a8b4a5b
      Thomas Huth 提交于
      Looking at the output of "qemu-system-xxx -help", you easily get
      the impression that "-net" is the preferred way instead of "-netdev"
      to specify host network interface, since the "-net" option is
      omnipresent but the "-netdev" option is only listed as a one-liner
      at the end. This is ugly since "-net" is considered as legacy and
      even might be removed one day. Thus, this patch switches the output
      to explain the host network interfaces with the "-netdev" option
      instead, moving the old "-net" option into some few lines at
      the end.
      Signed-off-by: NThomas Huth <thuth@redhat.com>
      Message-id: 1431701904-12230-1-git-send-email-thuth@redhat.com
      Signed-off-by: NStefan Hajnoczi <stefanha@redhat.com>
      6a8b4a5b
  23. 30 4月, 2015 1 次提交
  24. 19 3月, 2015 2 次提交
  25. 16 3月, 2015 2 次提交
    • A
      migration: Allow to suppress vmdesc submission · 9850c604
      Alexander Graf 提交于
      We now always send a JSON blob describing the migration file format as part
      of the migration stream. However, some tools built around QEMU have proven
      to stumble over this.
      
      This patch gives the user the chance to disable said self-describing part of
      the migration stream. To disable vmdesc submission, just add
      
        -machine suppress-vmdesc=on
      
      to your QEMU command line.
      Signed-off-by: NAlexander Graf <agraf@suse.de>
      Signed-off-by: NJuan Quintela <quintela@redhat.com>
      9850c604
    • T
      s390x: CPACF: Handle key wrap machine options · 2eb1cd07
      Tony Krowiak 提交于
      Check for the aes_key_wrap and dea_key_wrap machine options and set the
      appropriate KVM device attribute(s) to tell the kernel to enable or disable
      the AES/DEA protected key functions for the guest domain.
      
      This patch introduces two new machine options for indicating the state of
      AES/DEA key wrapping functions.  This controls whether the guest will
      have access to the AES/DEA crypto functions.
      
      aes_key_wrap="on | off" is changed to aes-key-wrap="on | off"
      dea_key_wrap="on | off" is changed to dea-key-wrap="on | off"
      
      Check for the aes-key-wrap and dea-key-wrap machine options and set the
      appropriate KVM device attribute(s) to tell the kernel to enable or disable
      the AES/DEA protected key functions for the guest domain.
      Reviewed-by: NDavid Hildenbrand <dahi@linux.vnet.ibm.com>
      Signed-off-by: NTony Krowiak <akrowiak@linux.vnet.ibm.com>
      Signed-off-by: NJens Freimann <jfrei@linux.vnet.ibm.com>
      Message-Id: <1426164834-38648-4-git-send-email-jfrei@linux.vnet.ibm.com>
      Signed-off-by: NCornelia Huck <cornelia.huck@de.ibm.com>
      2eb1cd07
  26. 10 3月, 2015 2 次提交
  27. 05 3月, 2015 1 次提交
  28. 22 1月, 2015 1 次提交
  29. 11 12月, 2014 1 次提交
    • L
      Add the "-semihosting-config" option. · a38bb079
      Liviu Ionescu 提交于
      The usual semihosting behaviour is to process the system calls locally and
      return; unfortuantelly the initial implementation dinamically changed the
      target to GDB during debug sessions, which, for the usual arm-none-eabi-gdb,
      is not implemented. The result was that during debug sessions the semihosting
      calls were discarded.
      
      This patch adds a configuration variable and an option to set it on the
      command line:
      
          -semihosting-config [enable=on|off,]target=native|gdb|auto
      
      This option enables semihosting and defines where the semihosting calls will
      be addressed, to QEMU ('native') or to GDB ('gdb'). The default is auto, which
      means 'gdb' during debug sessions and 'native' otherwise.
      Signed-off-by: NLiviu Ionescu <ilg@livius.net>
      Message-id: 1416341957-9796-1-git-send-email-ilg@livius.net
      [PMM: moved declaration and definition of semihosting_target to
       gdbstub.h and gdbstub.c to fix build failure on linux-user]
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      a38bb079