On Fri, Nov 24, 2017 at 04:42:00PM +0100, Paolo Bonzini wrote: > On 24/11/2017 15:52, Daniel P. Berrange wrote: > >> So what has been suggested so far is: > >> > >> <disk type='block' device='disk'> > >> <source dev='/dev/sda'> > >> <target dev='sda' bus='scsi'/> > >> <reservations enable='yes'/> > >> </disk> > > <reservations> without an inner <source> element leaves libvirtd with > the choice of a daemon per QEMU, or a daemon per host in a well-known > location. Unprivileged libvirtd would always use the latter; for > privileged libvirtd it is implementation-defined. I like it. > > <reservations> with an inner <source> always gives a daemon per host in > a custom location. It can be used by either unprivileged or privileged > libvirtd. > > >> Now, my question is, in the first case - how should libvirt chose the > >> path? Should it be different for each disk/domain? How is the daemon > >> started in the first place - should libvirt start it? And when should > >> libvirt kill it? > > > > The core question is one daemon per QEMU, or one daemon per host. I'd be > > more inclined to have one daemon per QEMU so we always have isolation > > and thus do't have to worry about a shared daemon being a potential > > attack point between distinct QEMU's. > > One daemon per QEMU is nicer IMO because it lets us do MCS. Of course > one daemon per QEMU can only apply to system libvirtd; session must use > one daemon per host. > > One daemon per host is easy, because it's just a couple new command-line > options as far as libvirtd is concerned, but we need to check that it > works well with MCS. In both cases we can do MCS, but it would work differently. If we had one daemon per QEMU, then we would give the daemon the same MCS label as QEMU. The kernel will thus enforce this label matches the label on the QEMU process when it connects to the UNIX socket. The kernel will also validate the label on the disk file descriptor passed to the daemon by QEMU. If we had one daemon per host, then that daemon will need a generic label that lets all QEMUs connect to it. When QEMU passes in a disk FD, the daemon will need to query the SELinux context of the remote QEMU process, and then perform a userspace ACL check of that against the FD that is passed in. The latter case means the QEMU helper will need to link to libselinux and performs checks itself. Regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :| -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list