From nobody Sun May 12 16:49:30 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) client-ip=209.132.183.28; envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com; dmarc=pass(p=none dis=none) header.from=redhat.com Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mx.zohomail.com with SMTPS id 1530542928697979.1354585043126; Mon, 2 Jul 2018 07:48:48 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B2733C0587D1; Mon, 2 Jul 2018 14:48:44 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7D706601A8; Mon, 2 Jul 2018 14:48:43 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 6181D24F61; Mon, 2 Jul 2018 14:48:41 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id w62ElGjb010744 for ; Mon, 2 Jul 2018 10:47:16 -0400 Received: by smtp.corp.redhat.com (Postfix) id A34612027EBA; Mon, 2 Jul 2018 14:47:16 +0000 (UTC) Received: from inaba.usersys.redhat.com (unknown [10.43.2.44]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 4E31F2026D5B; Mon, 2 Jul 2018 14:47:15 +0000 (UTC) From: Andrea Bolognani To: libvir-list@redhat.com Date: Mon, 2 Jul 2018 16:47:00 +0200 Message-Id: <20180702144700.5591-1-abologna@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-loop: libvir-list@redhat.com Cc: pkrempa@redhat.com, jtomko@redhat.com, mprivozn@redhat.com, ptoscano@redhat.com, brijesh.singh@amd.com, jdenemar@redhat.com Subject: [libvirt] [PATCH] news: Update for 4.5.0 release X-BeenThere: libvir-list@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Development discussions about the libvirt library & tools List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Sender: libvir-list-bounces@redhat.com Errors-To: libvir-list-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Mon, 02 Jul 2018 14:48:47 +0000 (UTC) X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Signed-off-by: Andrea Bolognani --- I've CC'd all those who introduced the changes mentioned below, both to give them a chance to point out any mistake I might have made and to possibly annoy them into updating the release notes themselves next time :) docs/news.xml | 83 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 83 insertions(+) diff --git a/docs/news.xml b/docs/news.xml index 468d34093a..65c23e51b6 100644 --- a/docs/news.xml +++ b/docs/news.xml @@ -61,6 +61,16 @@ Support specifying extended TSEG size for SMM in QEMU. + + + qemu: Add support for SEV guests + + + SEV (Secure Encrypted Virtualization) is a feature available on = AMD + CPUs that encrypts the guest memory and makes it inaccessible ev= en + to the host OS. + +
@@ -76,6 +86,24 @@ secret objects, but that support was never added to libvirt. + + + Make GnuTLS mandatory + + + Building without GnuTLS is no longer possible. + + + + + qemu: Remove allow_disk_format_probing configuration option + + + The option represented a security risk when used with malicious + disk images, so users were recommended against enabling it; with + this release, it's been removed altogether. + +
@@ -130,6 +158,41 @@ or virStorageVolCreateXMLFrom. + + + qemu: Add support for vsock hot (un)plug and cold (un)plug + + + + + qemu: Add support for NBD over TLS + + + Securely accessing NBD volumes no longer requires tunnelling over + SSH or another secure protocol: the native TLS support can now be + used instead. + + + + + qemu: Implement FD passing for Unix sockets + + + Instead of having QEMU open the socket and then connecting to it, + which is inherently racy, starting with QEMU 2.12 we can open the + socket ourselves and pass it to QEMU, avoiding race conditions. + + + + + virsh: Introduce --nowait option for domstat command + + + When this option is specified, virsh will try to fetch the guest + stats but abort instead of stalling if they can't be retrieved r= ight + away. + +
@@ -143,6 +206,26 @@ us getting to the worker pool initialization. + + + qemu: Fix domain resume after failed migration + + + Recent versions of QEMU activate block devices before the guest = CPU + has been started, which makes it impossible to roll back a failed + migration. Use the late-block-activate migration + capability if supported to avoid the issue. + + + + + vmx: Permit guests to have an odd number of vCPUs + + + This was forbidden in the past, but current versions of ESX can + deal with a guest configured as such. + +
--=20 2.17.1 -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list