From: Markus Armbruster <armbru@redhat.com>
To: Stefan Hajnoczi <stefanha@gmail.com>
Cc: Kevin Wolf <kwolf@redhat.com>,
Christoph Hellwig <chellwig@redhat.com>,
qemu-devel@nongnu.org, Luiz Capitulino <lcapitulino@redhat.com>,
Avi Kivity <avi@redhat.com>, Gerd Hoffmann <kraxel@redhat.com>
Subject: Re: [Qemu-devel] RFC v3: blockdev_add & friends, brief rationale, QMP docs
Date: Fri, 18 Jun 2010 09:27:48 +0200 [thread overview]
Message-ID: <m3k4pw3imj.fsf@blackfin.pond.sub.org> (raw)
In-Reply-To: <AANLkTilSQjM1Ml5G7KuqhlVeuF82pTSP7K4-BLHzw02p@mail.gmail.com> (Stefan Hajnoczi's message of "Thu, 17 Jun 2010 20:40:06 +0100")
Stefan Hajnoczi <stefanha@gmail.com> writes:
> On Thu, Jun 17, 2010 at 1:49 PM, Markus Armbruster <armbru@redhat.com> wrote:
>> Stefan Hajnoczi <stefanha@gmail.com> writes:
>>
>>> On Wed, Jun 16, 2010 at 6:27 PM, Markus Armbruster <armbru@redhat.com> wrote:
>>>> blockdev_add
>>>> ------------
>>>>
>>>> Add host block device.
>>>>
>>>> Arguments:
>>>>
>>>> - "id": the host block device's ID, must be unique (json-string)
>>>> - "format": image format (json-string, optional)
>>>> - Possible values: "raw", "qcow2", ...
>>>
>>> What is the default when unset? (I expect we'll auto-detect the
>>> format but this should be documented.)
>>
>> For command line and human monitor, we definitely want a sensible
>> default. I sketched one in section "Command line syntax". I'll quote
>> it for your convenience a few lines down.
>
> Ahem...the part that I skipped over ;). I should have read your
> entire email, thanks for pointing it out.
:)
>> To let users ask for this explicitely, we could have pseudo-format
>> "auto".
>>
>> We also need a pseudo-format "probe", which guesses the format from the
>> image contents. Can't be made the default, because it's insecure.
>
> In which scenario is probing the image format a security issue? I'm
> trying to think up scenarios where a cloud user modifies the guest
> disk image and gets QEMU to re-open the image file as another format,
> perhaps this would make the cloud owner/admin unhappy. I don't see a
> threat except for image format drivers have security bugs (corrupt
> images leading to arbitrary code execution).
User creates a raw image file.
VM starts. Image file gets probed, it's raw. Guest has access to the
complete file.
Guest writes a valid QCOW2 image to it, chosen to include the full
backing file in the resulting image contents. Set the backing file to
/secret/treasure.
Reboot VM. Image file gets probed, it's qcow2. Backing file gets
probed, it's raw. Guest has access to the contents of QCOW2 image.
This includes the backing file. Oops.
>>>> (2) It's possible to list supported disk formats and protocols by
>>>> running QEMU with arguments "-blockdev_add \?".
>>>
>>> Is there an query-block-driver command or something in QMP to
>>> enumerate supported formats and protocols? Not sure how useful this
>>> would be to the management stack - blockdev_add will probably return
>>> an error if an attempt is made to open an unsupported file.
>>
>> QMP should be "self-documenting": a client should be able to list
>> commands, their arguments, and possible argument values. Listing
>> supported formats then becomes "list possible values of command
>> blockdev_add's argument format".
>
> Nice :).
We still need to deliver the niceties...
>>>> blockdev_del
>>>> ------------
>>>>
>>>> Remove a host block device.
>>>>
>>>> Arguments:
>>>>
>>>> - "id": the host block device's ID (json-string)
>>>>
>>>> Example:
>>>>
>>>> -> { "execute": "blockdev_del", "arguments": { "id": "blk1" } }
>>>> <- { "return": {} }
>>>
>>> What about an attached guest device? Will this fail if the virtio-blk
>>> PCI device is still present? For SCSI I imagine we can usually just
>>> remove the host block device. For IDE there isn't hotplug support
>>> AFAIK, what happens?
>>
>> Command fails. You have to device_del the device first. Which is only
>> possible if its bus supports hot-plug.
>
> I think this deserves to be in the documentation.
Yes, QMP documentation should cover errors. It generally doesn't so far.
next prev parent reply other threads:[~2010-06-18 7:27 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-06-16 17:27 [Qemu-devel] RFC v3: blockdev_add & friends, brief rationale, QMP docs Markus Armbruster
2010-06-17 10:26 ` Stefan Hajnoczi
2010-06-17 12:49 ` Markus Armbruster
2010-06-17 19:40 ` Stefan Hajnoczi
2010-06-18 7:27 ` Markus Armbruster [this message]
2010-06-18 8:16 ` Stefan Hajnoczi
2010-06-18 9:36 ` Markus Armbruster
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=m3k4pw3imj.fsf@blackfin.pond.sub.org \
--to=armbru@redhat.com \
--cc=avi@redhat.com \
--cc=chellwig@redhat.com \
--cc=kraxel@redhat.com \
--cc=kwolf@redhat.com \
--cc=lcapitulino@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=stefanha@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).