From nobody Mon May 6 14:06:57 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1509554034162134.7037223492041; Wed, 1 Nov 2017 09:33:54 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B6E9480461; Wed, 1 Nov 2017 16:33:52 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 3321D60BE3; Wed, 1 Nov 2017 16:33:51 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 5EE491800BC7; Wed, 1 Nov 2017 16:33:47 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id vA1GXkHU023308 for ; Wed, 1 Nov 2017 12:33:46 -0400 Received: by smtp.corp.redhat.com (Postfix) id 0FC305D757; Wed, 1 Nov 2017 16:33:46 +0000 (UTC) Received: from inaba.usersys.redhat.com (ovpn-204-48.brq.redhat.com [10.40.204.48]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 66DB05D754 for ; Wed, 1 Nov 2017 16:33:43 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com B6E9480461 Authentication-Results: ext-mx04.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx04.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=libvir-list-bounces@redhat.com From: Andrea Bolognani To: libvir-list@redhat.com Date: Wed, 1 Nov 2017 17:33:40 +0100 Message-Id: <20171101163340.32020-1-abologna@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-loop: libvir-list@redhat.com Subject: [libvirt] [PATCH] news: Update for 3.9.0 release X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.28]); Wed, 01 Nov 2017 16:33:53 +0000 (UTC) X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Signed-off-by: Andrea Bolognani Reviewed-by: John Ferlan --- As usual, a lot of changes have made it to master without the release notes being updated at the same time. I'll push this tomorrow in the morning, so that it can make it into the release, unless it gets (N)ACKed earlier. docs/news.xml | 138 ++++++++++++++++++++++++++++++++++++++++++++++++++++++= ++++ 1 file changed, 138 insertions(+) diff --git a/docs/news.xml b/docs/news.xml index 6a864916d..3cf761d89 100644 --- a/docs/news.xml +++ b/docs/news.xml @@ -49,6 +49,36 @@ easily. + + + qemu: Support multiqueue for virtio-blk + + + Multiqueue support for virtio-blk has been available + in QEMU ever since 2.7.0, and now libvirt guests can enable it. + + + + + Add virDomainSetLifecycleAction() API + + + This new API, also exposed through the + set-lifecycle-action virsh command, al= lows + the user to dynamically control how the guest will react to being + powered off, being restarted or crashing. + + + + + qemu: Allow cold(un)plugging and hot(un)plugging input devices + + + + + net: Implement QoS for vhostuser + +
@@ -64,6 +94,82 @@ in order to decrypt the volume. + + + net: Ignore auto-generated MAC address when detaching an interfa= ce + + + If the MAC address has not been specified by the user, libvirt w= ill + try and fill in the gaps by generating one; however, that leads = to + very confusing error messages, so it's not desiderable. + + + + + net: Enable MAC address lookup for virDomainInterfaceStats() + + + + + apparmor: Several improvements + + + Changes include permitting access to data about USB devices and + dnsmasq instances, allowing spaces in guest names a= nd + many more. + + + + + cpu: Use CPU information obtained from QEMU when possible + + + Recent QEMU versions can expose information about which CPU mode= ls + are available and usable on the host; libvirt will now make use = of + such information whenever possible. + + + + + hyperv: Various improvements + + + The error reported when clients can't connect to Hyper-V has been + made more descriptive, and memory limits for guests are now mapp= ed + to more appropriate libvirt equivalents. + + + + + qemu: Report QEMU error on failed migration + + + Instead of reporting a generic error, ask QEMU for a more detail= ed + and thus hopefully more helpful one. + + + + + vbox: Implement autoport for RDP + + + libvirt will now obtain the (dynamically allocated) RDP port num= ber + from VirtualBox itself, avoiding conflicts between multiple gues= ts + wanting to use RDP at the same time. + + + + + qemu: Allow rotation of small logs + + + On a host where tons of unique instances are executed per day, i= t's + quite possible that while each of the single log files are quite + small, they will build up to quite a bit of clutter. Removing the + constraints that log have to be bigger than 100 KiB before they = can + be rotated solves the issue. + +
@@ -87,6 +193,38 @@ the LUKS encrypted volume. + + + qemu: Reserve PCI addresses for implicit i440fx devices + + + Failing to do so causes the addresses to be considered usable by + libvirt, which means they could be assigned to more than one dev= ice + resulting in the guest failing to start. + + + + + qemu: Ensure TLS clients always verify the server certificate + + + While it's reasonable to turn off client certificate validation, + as setting it up can be non-trivial, clients should always verify + the server certificate to avoid MITM attacks. libvirt was, howev= er, + using the same knob to control both checks, leading to + CVE-2017-1000256 / LSN-2017-0002. + + + + + spec: Restart libvirtd only at the end of the upgrade process + + + Use %posttrans to make sure libvirtd + is not restarted before all other components, such as the library + itself and storage / hypervisor drivers, have already been upgra= ded. + +
--=20 2.13.6 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list