qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Markus Armbruster <armbru@redhat.com>
To: Stefan Hajnoczi <stefanha@gmail.com>
Cc: Kevin Wolf <kwolf@redhat.com>,
	Christoph Hellwig <chellwig@redhat.com>,
	qemu-devel@nongnu.org, Luiz Capitulino <lcapitulino@redhat.com>,
	Avi Kivity <avi@redhat.com>, Gerd Hoffmann <kraxel@redhat.com>
Subject: Re: [Qemu-devel] RFC v3: blockdev_add & friends, brief rationale, QMP  docs
Date: Fri, 18 Jun 2010 09:27:48 +0200	[thread overview]
Message-ID: <m3k4pw3imj.fsf@blackfin.pond.sub.org> (raw)
In-Reply-To: <AANLkTilSQjM1Ml5G7KuqhlVeuF82pTSP7K4-BLHzw02p@mail.gmail.com> (Stefan Hajnoczi's message of "Thu, 17 Jun 2010 20:40:06 +0100")

Stefan Hajnoczi <stefanha@gmail.com> writes:

> On Thu, Jun 17, 2010 at 1:49 PM, Markus Armbruster <armbru@redhat.com> wrote:
>> Stefan Hajnoczi <stefanha@gmail.com> writes:
>>
>>> On Wed, Jun 16, 2010 at 6:27 PM, Markus Armbruster <armbru@redhat.com> wrote:
>>>> blockdev_add
>>>> ------------
>>>>
>>>> Add host block device.
>>>>
>>>> Arguments:
>>>>
>>>> - "id": the host block device's ID, must be unique (json-string)
>>>> - "format": image format (json-string, optional)
>>>>    - Possible values: "raw", "qcow2", ...
>>>
>>> What is the default when unset?  (I expect we'll auto-detect the
>>> format but this should be documented.)
>>
>> For command line and human monitor, we definitely want a sensible
>> default.  I sketched one in section "Command line syntax".  I'll quote
>> it for your convenience a few lines down.
>
> Ahem...the part that I skipped over ;).  I should have read your
> entire email, thanks for pointing it out.

:)

>> To let users ask for this explicitely, we could have pseudo-format
>> "auto".
>>
>> We also need a pseudo-format "probe", which guesses the format from the
>> image contents.  Can't be made the default, because it's insecure.
>
> In which scenario is probing the image format a security issue?  I'm
> trying to think up scenarios where a cloud user modifies the guest
> disk image and gets QEMU to re-open the image file as another format,
> perhaps this would make the cloud owner/admin unhappy.  I don't see a
> threat except for image format drivers have security bugs (corrupt
> images leading to arbitrary code execution).

User creates a raw image file.

VM starts.  Image file gets probed, it's raw.  Guest has access to the
complete file.

Guest writes a valid QCOW2 image to it, chosen to include the full
backing file in the resulting image contents.  Set the backing file to
/secret/treasure.

Reboot VM.  Image file gets probed, it's qcow2.  Backing file gets
probed, it's raw.  Guest has access to the contents of QCOW2 image.
This includes the backing file.  Oops.

>>>> (2) It's possible to list supported disk formats and protocols by
>>>>    running QEMU with arguments "-blockdev_add \?".
>>>
>>> Is there an query-block-driver command or something in QMP to
>>> enumerate supported formats and protocols?  Not sure how useful this
>>> would be to the management stack - blockdev_add will probably return
>>> an error if an attempt is made to open an unsupported file.
>>
>> QMP should be "self-documenting": a client should be able to list
>> commands, their arguments, and possible argument values.  Listing
>> supported formats then becomes "list possible values of command
>> blockdev_add's argument format".
>
> Nice :).

We still need to deliver the niceties...

>>>> blockdev_del
>>>> ------------
>>>>
>>>> Remove a host block device.
>>>>
>>>> Arguments:
>>>>
>>>> - "id": the host block device's ID (json-string)
>>>>
>>>> Example:
>>>>
>>>> -> { "execute": "blockdev_del", "arguments": { "id": "blk1" } }
>>>> <- { "return": {} }
>>>
>>> What about an attached guest device?  Will this fail if the virtio-blk
>>> PCI device is still present?  For SCSI I imagine we can usually just
>>> remove the host block device.  For IDE there isn't hotplug support
>>> AFAIK, what happens?
>>
>> Command fails.  You have to device_del the device first.  Which is only
>> possible if its bus supports hot-plug.
>
> I think this deserves to be in the documentation.

Yes, QMP documentation should cover errors.  It generally doesn't so far.

  reply	other threads:[~2010-06-18  7:27 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-06-16 17:27 [Qemu-devel] RFC v3: blockdev_add & friends, brief rationale, QMP docs Markus Armbruster
2010-06-17 10:26 ` Stefan Hajnoczi
2010-06-17 12:49   ` Markus Armbruster
2010-06-17 19:40     ` Stefan Hajnoczi
2010-06-18  7:27       ` Markus Armbruster [this message]
2010-06-18  8:16         ` Stefan Hajnoczi
2010-06-18  9:36           ` Markus Armbruster

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=m3k4pw3imj.fsf@blackfin.pond.sub.org \
    --to=armbru@redhat.com \
    --cc=avi@redhat.com \
    --cc=chellwig@redhat.com \
    --cc=kraxel@redhat.com \
    --cc=kwolf@redhat.com \
    --cc=lcapitulino@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=stefanha@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).