From: Anthony Liguori <aliguori@us.ibm.com>
To: Stefan Hajnoczi <stefanha@gmail.com>
Cc: Tyler C Hicks <tchicks@us.ibm.com>,
Corey C Bryant <bryntcor@us.ibm.com>,
qemu-devel@nongnu.org
Subject: Re: [Qemu-devel] [PATCH] Add support for fd: protocol
Date: Mon, 23 May 2011 08:21:20 -0500 [thread overview]
Message-ID: <4DDA5F50.8050203@us.ibm.com> (raw)
In-Reply-To: <BANLkTikSEnM-q2jWmF7bL2HyndodP_D8mw@mail.gmail.com>
On 05/23/2011 08:09 AM, Stefan Hajnoczi wrote:
> On Mon, May 23, 2011 at 1:50 PM, Anthony Liguori<aliguori@us.ibm.com> wrote:
>> On 05/23/2011 04:45 AM, Daniel P. Berrange wrote:
>>>
>>> On Fri, May 20, 2011 at 02:48:23PM -0400, Corey Bryant wrote:
>>>>
>>>> sVirt provides SELinux MAC isolation for Qemu guest processes and their
>>>> corresponding resources (image files). sVirt provides this support
>>>> by labeling guests and resources with security labels that are stored
>>>> in file system extended attributes. Some file systems, such as NFS, do
>>>> not support the extended attribute security namespace, which is needed
>>>> for image file isolation when using the sVirt SELinux security driver
>>>> in libvirt.
>>>>
>>>> The proposed solution entails a combination of Qemu, libvirt, and
>>>> SELinux patches that work together to isolate multiple guests' images
>>>> when they're stored in the same NFS mount. This results in an
>>>> environment where sVirt isolation and NFS image file isolation can both
>>>> be provided.
>>>>
>>>> Currently, Qemu opens an image file in addition to performing the
>>>> necessary read and write operations. The proposed solution will move
>>>> the open out of Qemu and into libvirt. Once libvirt opens an image
>>>> file for the guest, it will pass the file descriptor to Qemu via a
>>>> new fd: protocol.
>>>>
>>>> If the image file resides in an NFS mount, the following SELinux policy
>>>> changes will provide image isolation:
>>>>
>>>> - A new SELinux boolean is created (e.g. virt_read_write_nfs) to
>>>> allow Qemu (svirt_t) to only have SELinux read and write
>>>> permissions on nfs_t files
>>>>
>>>> - Qemu (svirt_t) also gets SELinux use permissions on libvirt
>>>> (virtd_t) file descriptors
>>>>
>>>> Following is a sample invocation of Qemu using the fd: protocol:
>>>>
>>>> qemu -drive file=fd:4,format=qcow2
>>>>
>>>> This patch contains the Qemu code to support this solution. I would
>>>> like to solicit input from the libvirt community prior to starting
>>>> the libvirt patch.
>>>>
>>>> This patch was tested with the following formats: raw, cow, qcow,
>>>> qcow2, vmdk, using the fd: protocol as well as existing file name
>>>> support. Non-valid file descriptors were also tested.
>>>
>>> How can backing files work ? The '-drive' syntax doesn't provide
>>> any way to set properties against the backing files (which may be
>>> nested to arbitrary depth).
>>
>> This is orthogonal to having an fd: protocol.
>>
>>> Also, there are a few places in QEMU, where it re-opens the existing
>>> block driver on the fly. What is the plan for supporting this, without
>>> having QEMU block on waiting for libvirt to pass it a new FD ?
>>
>> That's only host CDROM AFAICT.
>
> The host page cache on|off option also uses it because fcntl(2) cannot
> change O_DIRECT. Actually for Linux it may be doable with
> open('/proc/fd/<old>', flags ^ O_DIRECT) and on other hosts SELinux
> does not exist.
QEMU doesn't actually know which caching mode the fd is in if it's being
passed to it so this command doesn't make much sense.
Regards,
Anthony Liguori
>
> On the other hand fcntl(2) should really support changing O_DIRECT -
> only that there is not much incentive to fix Linux if other OSes don't
> support it either (and older Linux kernels also require workarounds).
>
> Stefan
next prev parent reply other threads:[~2011-05-23 13:21 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-05-20 18:48 [Qemu-devel] [PATCH] Add support for fd: protocol Corey Bryant
2011-05-20 19:05 ` Anthony Liguori
2011-05-20 19:25 ` Blue Swirl
2011-05-20 19:42 ` Anthony Liguori
2011-05-20 19:53 ` Blue Swirl
2011-05-23 14:28 ` Kevin Wolf
2011-05-23 15:24 ` Markus Armbruster
2011-05-23 15:56 ` Kevin Wolf
2011-05-23 19:50 ` Blue Swirl
2011-05-23 21:55 ` Anthony Liguori
2011-05-23 18:20 ` Corey Bryant
2011-05-23 9:45 ` Daniel P. Berrange
2011-05-23 10:19 ` Stefan Hajnoczi
2011-05-23 10:30 ` Daniel P. Berrange
2011-05-23 12:59 ` Anthony Liguori
2011-05-23 14:35 ` Markus Armbruster
2011-05-23 22:49 ` Jamie Lokier
2011-05-24 8:39 ` Stefan Hajnoczi
2011-05-24 15:31 ` Jamie Lokier
2011-05-23 12:50 ` Anthony Liguori
2011-05-23 13:06 ` Daniel P. Berrange
2011-05-23 13:09 ` Stefan Hajnoczi
2011-05-23 13:21 ` Anthony Liguori [this message]
2011-05-23 13:26 ` Stefan Hajnoczi
2011-05-23 13:42 ` Daniel P. Berrange
2011-05-23 9:48 ` Daniel P. Berrange
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4DDA5F50.8050203@us.ibm.com \
--to=aliguori@us.ibm.com \
--cc=bryntcor@us.ibm.com \
--cc=qemu-devel@nongnu.org \
--cc=stefanha@gmail.com \
--cc=tchicks@us.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).