From: Kevin Wolf <kwolf@redhat.com> To: Max Reitz <mreitz@redhat.com> Cc: qemu-block@nongnu.org, qemu-devel@nongnu.org Subject: Re: [Qemu-devel] [Qemu-block] [PATCH v2 10/10] file-posix: Make auto-read-only dynamic Date: Tue, 30 Apr 2019 13:31:17 +0200 [thread overview] Message-ID: <20190430113117.GH5607@linux.fritz.box> (raw) In-Reply-To: <03585bce-afb0-cd39-9732-7946fa1b03fc@redhat.com> [-- Attachment #1: Type: text/plain, Size: 3341 bytes --] Am 29.04.2019 um 22:16 hat Max Reitz geschrieben: > On 11.03.19 17:50, Kevin Wolf wrote: > > Until now, with auto-read-only=on we tried to open the file read-write > > first and if that failed, read-only was tried. This is actually not good > > enough for libvirt, which gives QEMU SELinux permissions for read-write > > only as soon as it actually intends to write to the image. So we need to > > be able to switch between read-only and read-write at runtime. > > > > This patch makes auto-read-only dynamic, i.e. the file is opened > > read-only as long as no user of the node has requested write > > permissions, but it is automatically reopened read-write as soon as the > > first writer is attached. Conversely, if the last writer goes away, the > > file is reopened read-only again. > > > > bs->read_only is no longer set for auto-read-only=on files even if the > > file descriptor is opened read-only because it will be transparently > > upgraded as soon as a writer is attached. This changes the output of > > qemu-iotests 232. > > > > Signed-off-by: Kevin Wolf <kwolf@redhat.com> > > --- > > block/file-posix.c | 36 +++++++++++++++++------------------- > > tests/qemu-iotests/232.out | 12 ++++++------ > > 2 files changed, 23 insertions(+), 25 deletions(-) > > https://bugzilla.redhat.com/show_bug.cgi?id=1703793 seems to be caused > by this patch: When the mirror job completes, it drops all permissions > on its target BB with an &error_abort. As of this patch, this may > result in file-posix attempting to reopen the FD, which may fail. Hm, yes. But we already agreed that dropping permissions should never fail, so maybe we should just implement that now (in block.c). > There are two problems I can see: First, the previous patch should have > updated s->open_flags along with s->fd when the FD is switched. As it > is now, s->open_flags is not updated, so it stays on O_RDONLY and every > time the permissions are checked, the FD is reconfigured and then switched. > > That's simple to fix, just add BDRVRawState.perm_change_flags and set it > to open_flags after raw_reconfigure_getfd() returned a ret != s->fd > (when s->perm_change_fd is set). ...and actually do s->open_flags = s->perm_change_flags in raw_set_perm(), otherwise it doesn't help much. :-) > That fixes the problem of file-posix attempting to reopen the FD to > O_RDWR all the time, which caused the crash. Good. > But that gives us another crash, because now dropping the permissions > (correctly) reopens the FD to O_RDONLY, with the exact same implications > as above: If the target becomes unavailable, opening the new FD will > fail, and qemu will crash. > > I don't know what to do about this. In the spirit of "dropping > permissions should always work", I presume raw_reconfigure_getfd() > should just return the old FD if it had more permissions than the new > one would have. But if the user issues an explicit reopen command, they > probably want such an error to be reported. Yes, I think file-posix should let the operation fail (because it actually failed) and the permission functions in block.c should ignore the error for dropping permissions. This way, reopen will still correctly return the error because it has a different call chain. Kevin [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 801 bytes --]
WARNING: multiple messages have this Message-ID (diff)
From: Kevin Wolf <kwolf@redhat.com> To: Max Reitz <mreitz@redhat.com> Cc: qemu-devel@nongnu.org, qemu-block@nongnu.org Subject: Re: [Qemu-devel] [Qemu-block] [PATCH v2 10/10] file-posix: Make auto-read-only dynamic Date: Tue, 30 Apr 2019 13:31:17 +0200 [thread overview] Message-ID: <20190430113117.GH5607@linux.fritz.box> (raw) Message-ID: <20190430113117.rMCDB6mhfEYHMV5qPu9cQRBLy30bnuA1rcOjyNKV3yo@z> (raw) In-Reply-To: <03585bce-afb0-cd39-9732-7946fa1b03fc@redhat.com> [-- Attachment #1: Type: text/plain, Size: 3341 bytes --] Am 29.04.2019 um 22:16 hat Max Reitz geschrieben: > On 11.03.19 17:50, Kevin Wolf wrote: > > Until now, with auto-read-only=on we tried to open the file read-write > > first and if that failed, read-only was tried. This is actually not good > > enough for libvirt, which gives QEMU SELinux permissions for read-write > > only as soon as it actually intends to write to the image. So we need to > > be able to switch between read-only and read-write at runtime. > > > > This patch makes auto-read-only dynamic, i.e. the file is opened > > read-only as long as no user of the node has requested write > > permissions, but it is automatically reopened read-write as soon as the > > first writer is attached. Conversely, if the last writer goes away, the > > file is reopened read-only again. > > > > bs->read_only is no longer set for auto-read-only=on files even if the > > file descriptor is opened read-only because it will be transparently > > upgraded as soon as a writer is attached. This changes the output of > > qemu-iotests 232. > > > > Signed-off-by: Kevin Wolf <kwolf@redhat.com> > > --- > > block/file-posix.c | 36 +++++++++++++++++------------------- > > tests/qemu-iotests/232.out | 12 ++++++------ > > 2 files changed, 23 insertions(+), 25 deletions(-) > > https://bugzilla.redhat.com/show_bug.cgi?id=1703793 seems to be caused > by this patch: When the mirror job completes, it drops all permissions > on its target BB with an &error_abort. As of this patch, this may > result in file-posix attempting to reopen the FD, which may fail. Hm, yes. But we already agreed that dropping permissions should never fail, so maybe we should just implement that now (in block.c). > There are two problems I can see: First, the previous patch should have > updated s->open_flags along with s->fd when the FD is switched. As it > is now, s->open_flags is not updated, so it stays on O_RDONLY and every > time the permissions are checked, the FD is reconfigured and then switched. > > That's simple to fix, just add BDRVRawState.perm_change_flags and set it > to open_flags after raw_reconfigure_getfd() returned a ret != s->fd > (when s->perm_change_fd is set). ...and actually do s->open_flags = s->perm_change_flags in raw_set_perm(), otherwise it doesn't help much. :-) > That fixes the problem of file-posix attempting to reopen the FD to > O_RDWR all the time, which caused the crash. Good. > But that gives us another crash, because now dropping the permissions > (correctly) reopens the FD to O_RDONLY, with the exact same implications > as above: If the target becomes unavailable, opening the new FD will > fail, and qemu will crash. > > I don't know what to do about this. In the spirit of "dropping > permissions should always work", I presume raw_reconfigure_getfd() > should just return the old FD if it had more permissions than the new > one would have. But if the user issues an explicit reopen command, they > probably want such an error to be reported. Yes, I think file-posix should let the operation fail (because it actually failed) and the permission functions in block.c should ignore the error for dropping permissions. This way, reopen will still correctly return the error because it has a different call chain. Kevin [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 801 bytes --]
next prev parent reply other threads:[~2019-04-30 11:32 UTC|newest] Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-03-11 16:50 [Qemu-devel] [PATCH v2 00/10] file-posix: Make auto-read-only dynamic Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 01/10] tests/virtio-blk-test: Disable auto-read-only Kevin Wolf 2019-03-12 2:50 ` Eric Blake 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 02/10] qemu-iotests: commit to backing file with auto-read-only Kevin Wolf 2019-03-12 2:52 ` Eric Blake 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 03/10] block: Avoid useless local_err Kevin Wolf 2019-03-11 17:00 ` Kevin Wolf 2019-03-12 2:53 ` Eric Blake 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 04/10] block: Make permission changes in reopen less wrong Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 05/10] file-posix: Fix bdrv_open_flags() for snapshot=on Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 06/10] file-posix: Factor out raw_reconfigure_getfd() Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 07/10] file-posix: Store BDRVRawState.reopen_state during reopen Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 08/10] file-posix: Lock new fd in raw_reopen_prepare() Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 09/10] file-posix: Prepare permission code for fd switching Kevin Wolf 2019-03-11 16:50 ` [Qemu-devel] [PATCH v2 10/10] file-posix: Make auto-read-only dynamic Kevin Wolf 2019-03-11 17:26 ` Eric Blake 2019-03-11 19:59 ` Peter Krempa 2019-03-11 20:10 ` Eric Blake 2019-03-11 20:25 ` Peter Krempa 2019-03-11 21:15 ` Markus Armbruster 2019-04-29 20:16 ` [Qemu-devel] [Qemu-block] " Max Reitz 2019-04-29 20:16 ` Max Reitz 2019-04-30 11:31 ` Kevin Wolf [this message] 2019-04-30 11:31 ` Kevin Wolf 2019-03-11 20:38 ` [Qemu-devel] [PATCH v2 00/10] " Peter Krempa
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20190430113117.GH5607@linux.fritz.box \ --to=kwolf@redhat.com \ --cc=mreitz@redhat.com \ --cc=qemu-block@nongnu.org \ --cc=qemu-devel@nongnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).