From: "Daniel P. Berrangé" <berrange@redhat.com>
To: Eric Blake <eblake@redhat.com>
Cc: David Gibson <david@gibson.dropbear.id.au>,
otubo@redhat.com, pbonzini@redhat.com, qemu-ppc@nongnu.org,
qemu-devel@nongnu.org
Subject: Re: [Qemu-devel] [PATCH] Allow -sandbox off with --disable-seccomp
Date: Wed, 27 Feb 2019 14:08:43 +0000 [thread overview]
Message-ID: <20190227140843.GI31688@redhat.com> (raw)
In-Reply-To: <b9f4a52e-43e0-c209-4743-2f039e96a6b9@redhat.com>
On Wed, Feb 27, 2019 at 07:59:11AM -0600, Eric Blake wrote:
> On 2/27/19 5:01 AM, Daniel P. Berrangé wrote:
> > On Wed, Feb 27, 2019 at 12:21:32PM +1100, David Gibson wrote:
> >> At present, when seccomp support is compiled out with --disable-seccomp
> >> we fail with an error if the user puts -sandbox on the command line.
> >>
> >> That kind of makes sense, but it's a bit strange that we reject a request
> >> to disable sandboxing with "-sandbox off" saying we don't support
> >> sandboxing.
> >>
> >> This puts in a small sandbox to (correctly) silently ignore -sandbox off
> >> when we don't have sandboxing support compiled in. This makes life easier
> >> for testcases, since they can safely specify "-sandbox off" without having
> >> to care if the qemu they're using is compiled with sandbox support or not.
> >>
> >> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
>
> > '-sandbox off' is just syntax sugar for '-sandbox enable=off', with
> > the default arg name handled by QemuOpts.
>
> Except that libvirt probes, via query-command-line-options, whether the
> '-sandbox' option supports the 'enable' key. You risk breaking
> introspection (where libvirt knows NOT to use enable=on|off) if -sandbox
> enable=off is advertised even when the feature is not compiled in.
It is even more complex than that. Libvirt looks for "elevateprivileges"
option to decide to enable the sandbox. It only looks for "enable" when
libvirt is configured to disable the sandbox, at which point is sets
"-sandbox off". So I don't think my suggestion should break it.
I do hate the idea of QEMU tailoring its CLI handling to suit the
current specific impl of one client app though.
If anything I'd suggest we should completely disable any parsing
of -sandbox when seccomp is disabled, rather than leaving getopt
to parse -sandbox and then raise an error.
>
> >
> > If we want to keep ability to run "-sandbox off" we should do it via
> > the QEMU opts code we already have in the first part of the conditional,
> > so that "-sandbox enable=off" also works as normal.
> >
> > Essentially we need to push the #ifdef CONFIG_SECCOMP down into the
> > parse_sandbox method, so that it parses the "enable" option normally
> > but rejects any value except disabled..
> >
> > The QemuOptsList should also be conditional to only register the
> > "enable" arg and not the other bits.
>
> Whatever we do here had better be careful that the introspection used by
> libvirt doesn't break, when libvirt is trying to learn when seccomp was
> not compiled in.
Regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|
next prev parent reply other threads:[~2019-02-27 14:08 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-02-27 1:21 [Qemu-devel] [PATCH] Allow -sandbox off with --disable-seccomp David Gibson
2019-02-27 9:51 ` Marc-André Lureau
2019-02-27 10:39 ` Stefano Garzarella
2019-02-27 11:01 ` Daniel P. Berrangé
2019-02-27 13:59 ` Eric Blake
2019-02-27 14:08 ` Daniel P. Berrangé [this message]
2019-02-27 19:21 ` Markus Armbruster
2019-02-28 10:22 ` Daniel P. Berrangé
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190227140843.GI31688@redhat.com \
--to=berrange@redhat.com \
--cc=david@gibson.dropbear.id.au \
--cc=eblake@redhat.com \
--cc=otubo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=qemu-ppc@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).