Re: [Qemu-devel] [PATCH v2 3/3] raw-posix: Re-open host CD-ROM after media change

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Apr 03, 2011 at 07:06:17PM +0100, Stefan Hajnoczi wrote:
> On Sun, Apr 3, 2011 at 2:12 PM, Blue Swirl <blauwirbel@xxxxxxxxx> wrote:
> > On Sun, Apr 3, 2011 at 2:57 PM, Stefan Hajnoczi <stefanha@xxxxxxxxx> wrote:
> >> On Tue, Mar 29, 2011 at 8:04 PM, Stefan Hajnoczi
> >> <stefanha@xxxxxxxxxxxxxxxxxx> wrote:
> >>> Piggy-back on the guest CD-ROM polling to poll on the host. ÂOpen and
> >>> close the host CD-ROM file descriptor to ensure we read the new size and
> >>> not a stale size.
> >>>
> >>> Two things are going on here:
> >>>
> >>> 1. If hald/udisks is not already polling CD-ROMs on the host then
> >>> Â re-opening the CD-ROM causes the host to read the new medium's size.
> >>>
> >>> 2. There is a bug in Linux which means the CD-ROM file descriptor must
> >>> Â be re-opened in order for lseek(2) to see the new size. ÂThe
> >>> Â inode size gets out of sync with the underlying device (which you can
> >>> Â confirm by checking that /sys/block/sr0/size and lseek(2) do not
> >>> Â match after media change). ÂI have raised this with the
> >>> Â maintainers but we need a workaround for the foreseeable future.
> >>>
> >>> Note that these changes are all in a #ifdef __linux__ section.
> >>>
> >>> Signed-off-by: Stefan Hajnoczi <stefanha@xxxxxxxxxxxxxxxxxx>
> >>> ---
> >>> Âblock/raw-posix.c | Â 26 ++++++++++++++++++++++----
> >>> Â1 files changed, 22 insertions(+), 4 deletions(-)
> >>>
> >>> diff --git a/block/raw-posix.c b/block/raw-posix.c
> >>> index 6b72470..8b5205c 100644
> >>> --- a/block/raw-posix.c
> >>> +++ b/block/raw-posix.c
> >>> @@ -1238,10 +1238,28 @@ static int cdrom_is_inserted(BlockDriverState *bs)
> >>> Â Â BDRVRawState *s = bs->opaque;
> >>> Â Â int ret;
> >>>
> >>> - Â Âret = ioctl(s->fd, CDROM_DRIVE_STATUS, CDSL_CURRENT);
> >>> - Â Âif (ret == CDS_DISC_OK)
> >>> - Â Â Â Âreturn 1;
> >>> - Â Âreturn 0;
> >>> + Â Â/*
> >>> + Â Â * Close the file descriptor if no medium is present and open it to poll
> >>> + Â Â * again. ÂThis ensures the medium size is refreshed. ÂIf the file
> >>> + Â Â * descriptor is kept open the size can become stale. ÂThis is essentially
> >>> + Â Â * replicating CD-ROM polling but is driven by the guest. ÂAs the guest
> >>> + Â Â * polls, we poll the host.
> >>> + Â Â */
> >>> +
> >>> + Â Âif (s->fd == -1) {
> >>> + Â Â Â Âs->fd = qemu_open(bs->filename, s->open_flags, 0644);
> >>> + Â Â Â Âif (s->fd < 0) {
> >>> + Â Â Â Â Â Âreturn 0;
> >>> + Â Â Â Â}
> >>> + Â Â}
> >>> +
> >>> + Â Âret = (ioctl(s->fd, CDROM_DRIVE_STATUS, CDSL_CURRENT) == CDS_DISC_OK);
> >>> +
> >>> + Â Âif (!ret) {
> >>> + Â Â Â Âclose(s->fd);
> >>> + Â Â Â Âs->fd = -1;
> >>> + Â Â}
> >>> + Â Âreturn ret;
> >>> Â}
> >>>
> >>> Âstatic int cdrom_eject(BlockDriverState *bs, int eject_flag)
> >>> --
> >>> 1.7.4.1
> >>>
> >>>
> >>>
> >>
> >> There is an issue with reopening host devices in QEMU when running
> >> under libvirt. ÂIt appears that libvirt chowns image files (including
> >> device nodes) so that the launched QEMU process can access them.
> >>
> >> Unfortunately after media change on host devices udev will reset the
> >> ownership of the device node. ÂThis causes open(2) to fail with EACCES
> >> since the QEMU process does not have the right uid/gid/groups and
> >> libvirt is unaware that the file's ownership has changed.
> >>
> >> In order for media change to work with Linux host CD-ROM it is
> >> necessary to reopen the file (otherwise the inode size will not
> >> refresh, this is an issue with existing kernels).
> >>
> >> How can libvirt's security model be made to support this case? ÂIn
> >> theory udev could be temporarily configured with libvirt permissions
> >> for the CD-ROM device while passed through to the guest, but is that
> >> feasible?
> >
> > How about something like this: Add an explicit reopen method to
> > BlockDriver. Make a special block device for passed file descriptors.
> > Pass descriptors in libvirt for CD-ROMs instead of the device paths.
> > The reopen method for file descriptors should notify libvirt about
> > need to pass a reopened descriptor and then block all accesses until a
> > new descriptor is available. This should also solve your earlier
> > problem.
> 
> I'm hoping libvirt's behavior can be made to just work rather than
> adding new features to QEMU.  But perhaps passing file descriptors is
> useful for more than just reopening host devices.  This would
> basically be a privilege separation model where the QEMU process isn't
> able to open files itself but can request libvirt to open them on its
> behalf.

It is rather frickin' annoying the way udev resets the ownership
when the media merely changes. If it isn't possible to stop udev
doing this, then i think the only practical thing is to use ACLs
instead of user/group ownership. We wanted to switch to ACLs in
libvirt for other reasons already, but it isn't quite as simple
as it sounds[1] so we've not done it just yet.

Daniel

[1] Mostly due to handling upgrades from existing libvirtd while
    VMs are running, and coping with filesystems which don't
    support ACLs (or have them turned of by mount options)
-- 
|: http://berrange.com      -o-    http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org              -o-             http://virt-manager.org :|
|: http://autobuild.org       -o-         http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org       -o-       http://live.gnome.org/gtk-vnc :|

--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list



[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]