Re: [PATCH V3 1/2] Apparmor: Add profile for virtqemud

2021-06-25 Thread Jim Fehlig
On 6/25/21 5:19 AM, Christian Boltz wrote: Hello, [please CC me in replies] Your updated patches still look good, I just noticed something that is probably minor nitpicking: Am Donnerstag, 24. Juni 2021, 22:48:58 CEST schrieb Jim Fehlig: [...] + signal (send) set=("kill", "term")

[libvirt PATCH 1/3] spec: drop/update dependencies on systemd-{units, sysv}

2021-06-25 Thread Daniel P . Berrangé
From: Zbigniew Jędrzejewski-Szmek -sysv was probably a left-over, and the -units deps was outdated and not necessary, see https://docs.fedoraproject.org/en-US/packaging-guidelines/Scriptlets/#_dependencies_on_the_systemd_package. Only for 'systemctl mask' which is executed in %post, we want to

[libvirt PATCH 3/3] spec: avoid rpm warning about macro in comment

2021-06-25 Thread Daniel P . Berrangé
From: Zbigniew Jędrzejewski-Szmek Signed-off-by: Zbigniew Jędrzejewski-Szmek --- libvirt.spec.in | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/libvirt.spec.in b/libvirt.spec.in index 39226175ce..cb48dd0be0 100644 --- a/libvirt.spec.in +++ b/libvirt.spec.in @@ -1182,7

[libvirt PATCH 0/3] spec: misc cleanups

2021-06-25 Thread Daniel P . Berrangé
This will be pushed to git master from https://gitlab.com/libvirt/libvirt/-/merge_requests/94 once CI completes. Zbigniew Jędrzejewski-Szmek (3): spec: drop/update dependencies on systemd-{units,sysv} spec: avoid repeated calls to systemd macros and binaries spec: avoid rpm warning

[libvirt PATCH 2/3] spec: avoid repeated calls to systemd macros and binaries

2021-06-25 Thread Daniel P . Berrangé
From: Zbigniew Jędrzejewski-Szmek The macro can take multiple arguments, and the calls are more efficient if done in one go. Signed-off-by: Zbigniew Jędrzejewski-Szmek --- libvirt.spec.in | 50 +++-- 1 file changed, 28 insertions(+), 22 deletions(-)

[libvirt PATCH 5/5] qemu: Reject TPM 1.2 for ARM virt guests

2021-06-25 Thread Andrea Bolognani
We already reject TPM 1.2 in a number of scenarios; let's add ARM virt guests to the list. https://bugzilla.redhat.com/show_bug.cgi?id=1970310 Signed-off-by: Andrea Bolognani --- src/qemu/qemu_validate.c | 6 ++ .../qemuxml2argvdata/aarch64-tpm-wrong-model.err |

[libvirt PATCH 3/5] qemu: Default to TPM 2.0 for ARM virt guests

2021-06-25 Thread Andrea Bolognani
The TPM 2.0 specification predates ARM virtualization, and so implementing TPM 1.2 support on ARM was not considered a useful endeavor. This is technically a breaking change, but TPM support on ARM was only introduced fairly recently (libvirt 7.1.0) and the previous default resulted in non

[libvirt PATCH 4/5] tests: Test the defaults for TPM on ARM virt guests

2021-06-25 Thread Andrea Bolognani
Instead of providing the configuration explicitly, let libvirt fill in the blanks. After the recent changes, this results in a working configuration without the need for user input. Signed-off-by: Andrea Bolognani --- tests/qemuxml2argvdata/aarch64-tpm.xml | 4 ++-- 1 file changed, 2

[libvirt PATCH 2/5] tests: Add aarch64-tpm test to qemuxml2xml

2021-06-25 Thread Andrea Bolognani
We're going to change the input file later, and having this additional coverage will demonstrate that such a change does not alter the behavior. Signed-off-by: Andrea Bolognani --- .../aarch64-tpm.aarch64-latest.xml| 29 +++ tests/qemuxml2xmltest.c

[libvirt PATCH 0/5] qemu: Fix defaults for TPM on ARM virt guests

2021-06-25 Thread Andrea Bolognani
The current default is unfortunately broken, and the user has to manually step in and provide the version number explicitly for the TPM device to work at all. https://bugzilla.redhat.com/show_bug.cgi?id=1970310 Andrea Bolognani (5): docs: Fix information for default TPM version tests: Add

[libvirt PATCH 1/5] docs: Fix information for default TPM version

2021-06-25 Thread Andrea Bolognani
The current information is not accurate, because the default is 2.0 instead of 1.2 for the tpm-crb and tpm-spapr models. Any detailed list will surely become obsolete and out of sync with reality over time, so let's just document that the default model depends on a number of factors and avoid

[PATCH] virDomainMachineNameAppendValid: Handle special characters better

2021-06-25 Thread Michal Privoznik
When constructing guest name for machined we have to be very cautious as machined expects a name that's basically a valid URI. Therefore, if there's a dot it has to be followed by a letter or a number. And if there's a sequence of two or more dashes they should be joined into a single dash. These

Re: [PATCH V3 1/2] Apparmor: Add profile for virtqemud

2021-06-25 Thread Christian Boltz
Hello, [please CC me in replies] Your updated patches still look good, I just noticed something that is probably minor nitpicking: Am Donnerstag, 24. Juni 2021, 22:48:58 CEST schrieb Jim Fehlig: [...] > + signal (send) set=("kill", "term") peer=unconfined, [...] > + signal (send)

Re: Avoiding lockspace already exists error from virtlockd

2021-06-25 Thread Michal Prívozník
On 5/28/21 8:30 PM, Jim Fehlig wrote: > Hi All! > > I received a bug report about virtlockd emitting an error whenever > libvirtd is (re)started > > May 25 15:44:31 virt81 virtlockd[7723]: Requested operation is not > valid: Lockspace for path /data/libvirtd/lockspace already exists > > The

Re: [PATCH v3 0/6] Support for launchSecurity type s390-pv

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:43PM +0200, Boris Fiuczynski wrote: > This patch series introduces the launch security type s390-pv. > Specifying s390-pv as launch security type in an s390 domain prepares for > running the guest in protected virtualization secure mode, also known as > IBM Secure

Re: [PATCH v3 6/6] docs: add s390-pv documentation

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:49PM +0200, Boris Fiuczynski wrote: > Add documentation for launch security type s390-pv. > > Signed-off-by: Boris Fiuczynski > Reviewed-by: Daniel Henrique Barboza > --- > docs/formatdomain.rst | 7 > docs/kbase/s390_protected_virt.rst | 55

Re: [PATCH v3 5/6] conf: add s390-pv as launch security type

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:48PM +0200, Boris Fiuczynski wrote: > Add launch security type 's390-pv' as well as some tests. > > Signed-off-by: Boris Fiuczynski > Reviewed-by: Daniel Henrique Barboza > --- > docs/schemas/domaincommon.rng | 1 + > src/conf/domain_conf.c

Re: [PATCH v3 4/6] qemu: add s390-pv-guest capability

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:47PM +0200, Boris Fiuczynski wrote: > Add s390-pv-guest capability. > > Signed-off-by: Boris Fiuczynski > Reviewed-by: Daniel Henrique Barboza > --- > src/qemu/qemu_capabilities.c| 2 ++ > src/qemu/qemu_capabilities.h| 1 + >

Re: [PATCH v4 14/14] kbase: Document virtio-mem

2021-06-25 Thread Michal Prívozník
On 6/23/21 5:52 PM, Jim Fehlig wrote: > On 6/23/21 4:12 AM, Michal Privoznik wrote: >> This commit adds new memorydevices.rst page which should serve >> all models of memory devices. Yet, I'm documenting virtio-mem >> quirks only. >> >> Signed-off-by: Michal Privoznik >> --- >>  

Entering freeze for libvirt-7.5.0

2021-06-25 Thread Jiri Denemark
I have just tagged v7.5.0-rc1 in the repository and pushed signed tarballs and source RPMs to https://libvirt.org/sources/ Please give the release candidate some testing and in case you find a serious issue which should have a fix in the upcoming release, feel free to reply to this thread to make

Re: [PATCH v3 3/6] conf: refactor launch security to allow more types

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:46PM +0200, Boris Fiuczynski wrote: > Adding virDomainSecDef for general launch security data > and moving virDomainSEVDef as an element for SEV data. > > Signed-off-by: Boris Fiuczynski > --- > src/conf/domain_conf.c | 127 +++-

Re: [PATCH v3 2/6] conf: modernize SEV XML parse and format methods

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:45PM +0200, Boris Fiuczynski wrote: > Make use of virDomainLaunchSecurity enum and automatic memory freeing. > > Signed-off-by: Boris Fiuczynski > --- > src/conf/domain_conf.c | 123 + > src/conf/domain_conf.h | 2 + > 2

Re: [PATCH v3 1/6] schemas: Make SEV policy on launch security optional

2021-06-25 Thread Pavel Hrdina
On Tue, Jun 22, 2021 at 03:10:44PM +0200, Boris Fiuczynski wrote: > Change launch security policy of type SEV from required to > optional and add a test to ensure the required launch security > policy remains required when launch security type is SEV. > > Signed-off-by: Boris Fiuczynski > --- >

[PATCH 2/2] virSetUIDGIDWithCaps: Assume PR_CAPBSET_DROP is always defined

2021-06-25 Thread Michal Privoznik
Bounding set capabilities were introduced in kernel commit of v2.6.25-rc1~912. I guess it is safe to assume that all Linux hosts we ran on have at least that version or newer. Signed-off-by: Michal Privoznik --- src/util/virutil.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff

[PATCH 0/2] virSetUIDGIDWithCaps: Two small improvements

2021-06-25 Thread Michal Privoznik
The first one fixes a problem I've started seeing with RHEL-9 and the other is just removal of check for tautology. Michal Prívozník (2): virSetUIDGIDWithCaps: Don't drop CAP_SETPCAP right away virSetUIDGIDWithCaps: Assume PR_CAPBSET_DROP is always defined src/util/virutil.c | 11

[PATCH 1/2] virSetUIDGIDWithCaps: Don't drop CAP_SETPCAP right away

2021-06-25 Thread Michal Privoznik
There are few cases where we execute a virCommand with all caps cleared (virCommandClearCaps()). For instance dnsmasqCapsRefreshInternal() does just that. This means, that after fork() and before exec() the virSetUIDGIDWithCaps() is called. But since the caller did not want to change anything,