1
The following changes since commit 661c2e1ab29cd9c4d268ae3f44712e8d421c0e56:
1
The following changes since commit 741e1a618b126e664f7b723e6fe1b7ace511caf7:
2
2
3
scripts/checkpatch: Fix a typo (2025-03-04 09:30:26 +0800)
3
Merge remote-tracking branch 'remotes/stefanberger/tags/pull-tpm-2018-09-07-1' into staging (2018-09-24 18:12:54 +0100)
4
4
5
are available in the Git repository at:
5
are available in the Git repository at:
6
6
7
https://gitlab.com/stefanha/qemu.git tags/block-pull-request
7
git://github.com/codyprime/qemu-kvm-jtc.git tags/block-pull-request
8
8
9
for you to fetch changes up to 2ad638a3d160923ef3dbf87c73944e6e44bdc724:
9
for you to fetch changes up to 637fa44ab80c6b317adf1d117494325a95daad60:
10
10
11
block/qed: fix use-after-free by nullifying timer pointer after free (2025-03-06 10:19:54 +0800)
11
curl: Make sslverify=off disable host as well as peer verification. (2018-09-24 23:46:05 -0400)
12
12
13
----------------------------------------------------------------
13
----------------------------------------------------------------
14
Pull request
14
RBD and Curl patches
15
16
QED need_check_timer use-after-free fix
17
18
----------------------------------------------------------------
15
----------------------------------------------------------------
19
16
20
Denis Rastyogin (1):
17
Jeff Cody (4):
21
block/qed: fix use-after-free by nullifying timer pointer after free
18
block/rbd: pull out qemu_rbd_convert_options
19
block/rbd: Attempt to parse legacy filenames
20
block/rbd: add iotest for rbd legacy keyvalue filename parsing
21
block/rbd: add deprecation documentation for filename keyvalue pairs
22
22
23
block/qed.c | 1 +
23
Richard W.M. Jones (1):
24
1 file changed, 1 insertion(+)
24
curl: Make sslverify=off disable host as well as peer verification.
25
26
block/curl.c | 2 +
27
block/rbd.c | 90 ++++++++++++++++++++++++++++++++------
28
qemu-deprecated.texi | 15 +++++++
29
tests/qemu-iotests/231 | 62 ++++++++++++++++++++++++++
30
tests/qemu-iotests/231.out | 9 ++++
31
tests/qemu-iotests/group | 1 +
32
6 files changed, 165 insertions(+), 14 deletions(-)
33
create mode 100755 tests/qemu-iotests/231
34
create mode 100644 tests/qemu-iotests/231.out
25
35
26
--
36
--
27
2.48.1
37
2.17.1
38
39
diff view generated by jsdifflib
New patch
1
Code movement to pull the conversion from Qdict to BlockdevOptionsRbd
2
into a helper function.
1
3
4
Reviewed-by: Eric Blake <eblake@redhat.com>
5
Reviewed-by: John Snow <jsnow@redhat.com>
6
Signed-off-by: Jeff Cody <jcody@redhat.com>
7
Message-id: 5b49a980f2cde6610ab1df41bb0277d00b5db893.1536704901.git.jcody@redhat.com
8
Signed-off-by: Jeff Cody <jcody@redhat.com>
9
---
10
block/rbd.c | 36 ++++++++++++++++++++++++------------
11
1 file changed, 24 insertions(+), 12 deletions(-)
12
13
diff --git a/block/rbd.c b/block/rbd.c
14
index XXXXXXX..XXXXXXX 100644
15
--- a/block/rbd.c
16
+++ b/block/rbd.c
17
@@ -XXX,XX +XXX,XX @@ failed_opts:
18
return r;
19
}
20
21
+static int qemu_rbd_convert_options(QDict *options, BlockdevOptionsRbd **opts,
22
+ Error **errp)
23
+{
24
+ Visitor *v;
25
+ Error *local_err = NULL;
26
+
27
+ /* Convert the remaining options into a QAPI object */
28
+ v = qobject_input_visitor_new_flat_confused(options, errp);
29
+ if (!v) {
30
+ return -EINVAL;
31
+ }
32
+
33
+ visit_type_BlockdevOptionsRbd(v, NULL, opts, &local_err);
34
+ visit_free(v);
35
+
36
+ if (local_err) {
37
+ error_propagate(errp, local_err);
38
+ return -EINVAL;
39
+ }
40
+
41
+ return 0;
42
+}
43
+
44
static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
45
Error **errp)
46
{
47
BDRVRBDState *s = bs->opaque;
48
BlockdevOptionsRbd *opts = NULL;
49
- Visitor *v;
50
const QDictEntry *e;
51
Error *local_err = NULL;
52
char *keypairs, *secretid;
53
@@ -XXX,XX +XXX,XX @@ static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
54
qdict_del(options, "password-secret");
55
}
56
57
- /* Convert the remaining options into a QAPI object */
58
- v = qobject_input_visitor_new_flat_confused(options, errp);
59
- if (!v) {
60
- r = -EINVAL;
61
- goto out;
62
- }
63
-
64
- visit_type_BlockdevOptionsRbd(v, NULL, &opts, &local_err);
65
- visit_free(v);
66
-
67
+ r = qemu_rbd_convert_options(options, &opts, &local_err);
68
if (local_err) {
69
error_propagate(errp, local_err);
70
- r = -EINVAL;
71
goto out;
72
}
73
74
--
75
2.17.1
76
77
diff view generated by jsdifflib
1
From: Denis Rastyogin <gerben@altlinux.org>
1
When we converted rbd to get rid of the older key/value-centric
2
encoding format, we broke compatibility with image files with backing
3
file strings encoded in the old format.
2
4
3
This error was discovered by fuzzing qemu-img.
5
This leaves a bit of an ugly conundrum, and a hacky solution.
4
6
5
In the QED block driver, the need_check_timer timer is freed in
7
If the initial attempt to parse the "proper" options fails, it assumes
6
bdrv_qed_detach_aio_context, but the pointer to the timer is not
8
that we may have an older key/value encoded filename. Fall back to
7
set to NULL. This can lead to a use-after-free scenario
9
attempting to parse the filename, and extract the required options from
8
in bdrv_qed_drain_begin().
10
it. If that fails, pass along the original error message.
9
11
10
The need_check_timer pointer is set to NULL after freeing the timer.
12
We do not support mixed modern usage alongside legacy keyvalue pair
11
Which helps catch this condition when checking in bdrv_qed_drain_begin().
13
usage.
12
14
13
Closes: https://gitlab.com/qemu-project/qemu/-/issues/2852
15
A deprecation warning has been added, although care should be taken
14
Signed-off-by: Denis Rastyogin <gerben@altlinux.org>
16
when actually deprecating since the impact is not limited to
15
Message-ID: <20250304083927.37681-1-gerben@altlinux.org>
17
commandline or qapi usage, but also opening existing images.
16
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
18
19
Reviewed-by: Eric Blake <eblake@redhat.com>
20
Signed-off-by: Jeff Cody <jcody@redhat.com>
21
Message-id: 15b332e5432ad069441f7275a46080f465d789a0.1536704901.git.jcody@redhat.com
22
Signed-off-by: Jeff Cody <jcody@redhat.com>
17
---
23
---
18
block/qed.c | 1 +
24
block/rbd.c | 54 +++++++++++++++++++++++++++++++++++++++++++++++++++--
19
1 file changed, 1 insertion(+)
25
1 file changed, 52 insertions(+), 2 deletions(-)
20
26
21
diff --git a/block/qed.c b/block/qed.c
27
diff --git a/block/rbd.c b/block/rbd.c
22
index XXXXXXX..XXXXXXX 100644
28
index XXXXXXX..XXXXXXX 100644
23
--- a/block/qed.c
29
--- a/block/rbd.c
24
+++ b/block/qed.c
30
+++ b/block/rbd.c
25
@@ -XXX,XX +XXX,XX @@ static void bdrv_qed_detach_aio_context(BlockDriverState *bs)
31
@@ -XXX,XX +XXX,XX @@ static int qemu_rbd_convert_options(QDict *options, BlockdevOptionsRbd **opts,
26
32
return 0;
27
qed_cancel_need_check_timer(s);
28
timer_free(s->need_check_timer);
29
+ s->need_check_timer = NULL;
30
}
33
}
31
34
32
static void bdrv_qed_attach_aio_context(BlockDriverState *bs,
35
+static int qemu_rbd_attempt_legacy_options(QDict *options,
36
+ BlockdevOptionsRbd **opts,
37
+ char **keypairs)
38
+{
39
+ char *filename;
40
+ int r;
41
+
42
+ filename = g_strdup(qdict_get_try_str(options, "filename"));
43
+ if (!filename) {
44
+ return -EINVAL;
45
+ }
46
+ qdict_del(options, "filename");
47
+
48
+ qemu_rbd_parse_filename(filename, options, NULL);
49
+
50
+ /* keypairs freed by caller */
51
+ *keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs"));
52
+ if (*keypairs) {
53
+ qdict_del(options, "=keyvalue-pairs");
54
+ }
55
+
56
+ r = qemu_rbd_convert_options(options, opts, NULL);
57
+
58
+ g_free(filename);
59
+ return r;
60
+}
61
+
62
static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
63
Error **errp)
64
{
65
@@ -XXX,XX +XXX,XX @@ static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
66
67
r = qemu_rbd_convert_options(options, &opts, &local_err);
68
if (local_err) {
69
- error_propagate(errp, local_err);
70
- goto out;
71
+ /* If keypairs are present, that means some options are present in
72
+ * the modern option format. Don't attempt to parse legacy option
73
+ * formats, as we won't support mixed usage. */
74
+ if (keypairs) {
75
+ error_propagate(errp, local_err);
76
+ goto out;
77
+ }
78
+
79
+ /* If the initial attempt to convert and process the options failed,
80
+ * we may be attempting to open an image file that has the rbd options
81
+ * specified in the older format consisting of all key/value pairs
82
+ * encoded in the filename. Go ahead and attempt to parse the
83
+ * filename, and see if we can pull out the required options. */
84
+ r = qemu_rbd_attempt_legacy_options(options, &opts, &keypairs);
85
+ if (r < 0) {
86
+ /* Propagate the original error, not the legacy parsing fallback
87
+ * error, as the latter was just a best-effort attempt. */
88
+ error_propagate(errp, local_err);
89
+ goto out;
90
+ }
91
+ /* Take care whenever deciding to actually deprecate; once this ability
92
+ * is removed, we will not be able to open any images with legacy-styled
93
+ * backing image strings. */
94
+ error_report("RBD options encoded in the filename as keyvalue pairs "
95
+ "is deprecated");
96
}
97
98
/* Remove the processed options from the QDict (the visitor processes
33
--
99
--
34
2.48.1
100
2.17.1
101
102
diff view generated by jsdifflib
New patch
1
This is a small test that will check for the ability to parse
2
both legacy and modern options for rbd.
1
3
4
The way the test is set up is for failure to occur, but without
5
having to wait to timeout on a non-existent rbd server. The error
6
messages in the success path show that the arguments were parsed.
7
8
The failure behavior prior to the patch series that has this test, is
9
qemu-img complaining about mandatory options (e.g. 'pool') not being
10
provided.
11
12
Reviewed-by: Eric Blake <eblake@redhat.com>
13
Signed-off-by: Jeff Cody <jcody@redhat.com>
14
Message-id: f830580e339b974a83ed4870d11adcdc17f49a47.1536704901.git.jcody@redhat.com
15
Signed-off-by: Jeff Cody <jcody@redhat.com>
16
---
17
tests/qemu-iotests/231 | 62 ++++++++++++++++++++++++++++++++++++++
18
tests/qemu-iotests/231.out | 9 ++++++
19
tests/qemu-iotests/group | 1 +
20
3 files changed, 72 insertions(+)
21
create mode 100755 tests/qemu-iotests/231
22
create mode 100644 tests/qemu-iotests/231.out
23
24
diff --git a/tests/qemu-iotests/231 b/tests/qemu-iotests/231
25
new file mode 100755
26
index XXXXXXX..XXXXXXX
27
--- /dev/null
28
+++ b/tests/qemu-iotests/231
29
@@ -XXX,XX +XXX,XX @@
30
+#!/bin/bash
31
+#
32
+# Test legacy and modern option parsing for rbd/ceph. This will not
33
+# actually connect to a ceph server, but rather looks for the appropriate
34
+# error message that indicates we parsed the options correctly.
35
+#
36
+# Copyright (C) 2018 Red Hat, Inc.
37
+#
38
+# This program is free software; you can redistribute it and/or modify
39
+# it under the terms of the GNU General Public License as published by
40
+# the Free Software Foundation; either version 2 of the License, or
41
+# (at your option) any later version.
42
+#
43
+# This program is distributed in the hope that it will be useful,
44
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
45
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
46
+# GNU General Public License for more details.
47
+#
48
+# You should have received a copy of the GNU General Public License
49
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
50
+#
51
+
52
+# creator
53
+owner=jcody@redhat.com
54
+
55
+seq=`basename $0`
56
+echo "QA output created by $seq"
57
+
58
+here=`pwd`
59
+status=1    # failure is the default!
60
+
61
+_cleanup()
62
+{
63
+ rm "${BOGUS_CONF}"
64
+}
65
+trap "_cleanup; exit \$status" 0 1 2 3 15
66
+
67
+# get standard environment, filters and checks
68
+. ./common.rc
69
+. ./common.filter
70
+
71
+_supported_fmt generic
72
+_supported_proto rbd
73
+_supported_os Linux
74
+
75
+BOGUS_CONF=${TEST_DIR}/ceph-$$.conf
76
+touch "${BOGUS_CONF}"
77
+
78
+_filter_conf()
79
+{
80
+ sed -e "s#$BOGUS_CONF#BOGUS_CONF#g"
81
+}
82
+
83
+# We expect this to fail, with no monitor ip provided and a null conf file. Just want it
84
+# to fail in the right way.
85
+$QEMU_IMG info "json:{'file.driver':'rbd','file.filename':'rbd:rbd/bogus:conf=${BOGUS_CONF}'}" 2>&1 | _filter_conf
86
+$QEMU_IMG info "json:{'file.driver':'rbd','file.pool':'rbd','file.image':'bogus','file.conf':'${BOGUS_CONF}'}" 2>&1 | _filter_conf
87
+
88
+# success, all done
89
+echo "*** done"
90
+rm -f $seq.full
91
+status=0
92
diff --git a/tests/qemu-iotests/231.out b/tests/qemu-iotests/231.out
93
new file mode 100644
94
index XXXXXXX..XXXXXXX
95
--- /dev/null
96
+++ b/tests/qemu-iotests/231.out
97
@@ -XXX,XX +XXX,XX @@
98
+QA output created by 231
99
+qemu-img: RBD options encoded in the filename as keyvalue pairs is deprecated. Future versions may cease to parse these options in the future.
100
+unable to get monitor info from DNS SRV with service name: ceph-mon
101
+no monitors specified to connect to.
102
+qemu-img: Could not open 'json:{'file.driver':'rbd','file.filename':'rbd:rbd/bogus:conf=BOGUS_CONF'}': error connecting: No such file or directory
103
+unable to get monitor info from DNS SRV with service name: ceph-mon
104
+no monitors specified to connect to.
105
+qemu-img: Could not open 'json:{'file.driver':'rbd','file.pool':'rbd','file.image':'bogus','file.conf':'BOGUS_CONF'}': error connecting: No such file or directory
106
+*** done
107
diff --git a/tests/qemu-iotests/group b/tests/qemu-iotests/group
108
index XXXXXXX..XXXXXXX 100644
109
--- a/tests/qemu-iotests/group
110
+++ b/tests/qemu-iotests/group
111
@@ -XXX,XX +XXX,XX @@
112
226 auto quick
113
227 auto quick
114
229 auto quick
115
+231 auto quick
116
--
117
2.17.1
118
119
diff view generated by jsdifflib
New patch
1
Signed-off-by: Jeff Cody <jcody@redhat.com>
2
Message-id: 647f5b5ab7efd8bf567a504c832b1d2d6f719b23.1536704901.git.jcody@redhat.com
3
Signed-off-by: Jeff Cody <jcody@redhat.com>
4
---
5
qemu-deprecated.texi | 15 +++++++++++++++
6
1 file changed, 15 insertions(+)
1
7
8
diff --git a/qemu-deprecated.texi b/qemu-deprecated.texi
9
index XXXXXXX..XXXXXXX 100644
10
--- a/qemu-deprecated.texi
11
+++ b/qemu-deprecated.texi
12
@@ -XXX,XX +XXX,XX @@ used instead.
13
In order to prevent QEMU from automatically opening an image's backing
14
chain, use ``"backing": null'' instead.
15
16
+@subsubsection rbd keyvalue pair encoded filenames: "" (since 3.1.0)
17
+
18
+Options for ``rbd'' should be specified according to its runtime options,
19
+like other block drivers. Legacy parsing of keyvalue pair encoded
20
+filenames is useful to open images with the old format for backing files;
21
+These image files should be updated to use the current format.
22
+
23
+Example of legacy encoding:
24
+
25
+@code{json:@{"file.driver":"rbd", "file.filename":"rbd:rbd/name"@}}
26
+
27
+The above, converted to the current supported format:
28
+
29
+@code{json:@{"file.driver":"rbd", "file.pool":"rbd", "file.image":"name"@}}
30
+
31
@subsection vio-spapr-device device options
32
33
@subsubsection "irq": "" (since 3.0.0)
34
--
35
2.17.1
36
37
diff view generated by jsdifflib
New patch
1
From: "Richard W.M. Jones" <rjones@redhat.com>
1
2
3
The sslverify setting is supposed to turn off all TLS certificate
4
checks in libcurl. However because of the way we use it, it only
5
turns off peer certificate authenticity checks
6
(CURLOPT_SSL_VERIFYPEER). This patch makes it also turn off the check
7
that the server name in the certificate is the same as the server
8
you're connecting to (CURLOPT_SSL_VERIFYHOST).
9
10
We can use Google's server at 8.8.8.8 which happens to have a bad TLS
11
certificate to demonstrate this:
12
13
$ ./qemu-img create -q -f qcow2 -b 'json: { "file.sslverify": "off", "file.driver": "https", "file.url": "https://8.8.8.8/foo" }' /var/tmp/file.qcow2
14
qemu-img: /var/tmp/file.qcow2: CURL: Error opening file: SSL: no alternative certificate subject name matches target host name '8.8.8.8'
15
Could not open backing image to determine size.
16
17
With this patch applied, qemu-img connects to the server regardless of
18
the bad certificate:
19
20
$ ./qemu-img create -q -f qcow2 -b 'json: { "file.sslverify": "off", "file.driver": "https", "file.url": "https://8.8.8.8/foo" }' /var/tmp/file.qcow2
21
qemu-img: /var/tmp/file.qcow2: CURL: Error opening file: The requested URL returned error: 404 Not Found
22
23
(The 404 error is expected because 8.8.8.8 is not actually serving a
24
file called "/foo".)
25
26
Of course the default (without sslverify=off) remains to always check
27
the certificate:
28
29
$ ./qemu-img create -q -f qcow2 -b 'json: { "file.driver": "https", "file.url": "https://8.8.8.8/foo" }' /var/tmp/file.qcow2
30
qemu-img: /var/tmp/file.qcow2: CURL: Error opening file: SSL: no alternative certificate subject name matches target host name '8.8.8.8'
31
Could not open backing image to determine size.
32
33
Further information about the two settings is available here:
34
35
https://curl.haxx.se/libcurl/c/CURLOPT_SSL_VERIFYPEER.html
36
https://curl.haxx.se/libcurl/c/CURLOPT_SSL_VERIFYHOST.html
37
38
Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
39
Message-id: 20180914095622.19698-1-rjones@redhat.com
40
Signed-off-by: Jeff Cody <jcody@redhat.com>
41
---
42
block/curl.c | 2 ++
43
1 file changed, 2 insertions(+)
44
45
diff --git a/block/curl.c b/block/curl.c
46
index XXXXXXX..XXXXXXX 100644
47
--- a/block/curl.c
48
+++ b/block/curl.c
49
@@ -XXX,XX +XXX,XX @@ static int curl_init_state(BDRVCURLState *s, CURLState *state)
50
curl_easy_setopt(state->curl, CURLOPT_URL, s->url);
51
curl_easy_setopt(state->curl, CURLOPT_SSL_VERIFYPEER,
52
(long) s->sslverify);
53
+ curl_easy_setopt(state->curl, CURLOPT_SSL_VERIFYHOST,
54
+ s->sslverify ? 2L : 0L);
55
if (s->cookie) {
56
curl_easy_setopt(state->curl, CURLOPT_COOKIE, s->cookie);
57
}
58
--
59
2.17.1
60
61
diff view generated by jsdifflib