Yuanhan Liu <yuanhan.liu at linux.intel.com> writes: > On Fri, Jun 24, 2016 at 07:43:29AM +0000, Loftus, Ciara wrote: >> > >> > On Tue, Jun 21, 2016 at 09:15:03AM -0400, Aaron Conole wrote: >> > > Yuanhan Liu <yuanhan.liu at linux.intel.com> writes: >> > > >> > > > On Fri, Jun 17, 2016 at 11:32:36AM -0400, Aaron Conole wrote: >> > > >> Prior to this commit, the only way to add a vhost-user socket to the >> > > >> system is by relying on librte_vhost to open the unix domain socket >> > > >> and >> > > >> add it to the unix socket list. This is problematic for applications >> > > >> which would like to set the permissions, >> > > > >> > > > So, you want to address the issue raised by following patch? >> > > > >> > > > http://dpdk.org/dev/patchwork/patch/12222/ >> > > >> > > That patch does try to address the issue, however - it has some >> > > problems. The biggest is a TOCTTOU issue when using chown. The way to >> > > solve that issue properly is different depending on which operating >> > > system is being used (for instance, FreeBSD doesn't honor >> > > fchown(),fchmod() on file descriptors). My solution is basically to >> > > punt that responsibility to the controlling application. >> > > >> > > > I would still like to stick to my proposal, that is to introduce a >> > > > new API to do the permission change at anytime, if we end up with >> > > > wanting to introduce a new API. >> > > >> > > I've spent a lot of time looking at the TOCTTOU problem, and I think >> > > that is a really hard problem to solve portably. Might be good to just >> > > start with the flexible mechanism here that lets the application >> > > developer satisfy their own needs. >> > > >> > > >> or applications which are not >> > > >> directly allowed to open sockets due to policy restrictions. >> > > > >> > > > Could you name a specific example? >> > > >> > > SELinux policy might require one application to open the socket, and >> > > pass it back via a dbus mechanism. I can't actually think of a concrete >> > > implemented case, so it may not be valid. >> > > >> > > > BTW, JFYI, since 16.07, DPDK supports client mode. It's QEMU (acting >> > > > as the server) will create the socket file. I guess that would diminish >> > > > (or even avoid?) the permission pain that DPDK acting as server brings. >> > > > I doubt the API to do the permission change is really needed then. >> > > >> > > I wouldn't say it 'solves' the issue so much as hopes no one uses server >> > > mode in DPDK. I agree, for OvS, it could. >> > >> > Actually, I think I would (personally) suggest people to switch to DPDK >> > vhost-user client mode, for two good reasons: >> > >> > - it should solve the socket permission issue raised by you and Christian. >> > >> > - it has the "reconnect" feature since 16.07. Which means guest network >> > will still work from a DPDK vhost-user restart/crash. DPDK vhost-user >> > as server simply doesn't support that. >> > >> > And FYI, Loftus is doing the DPDK for OVS intergration. Not quite sure >> > whether she put the client mode as the default mode though. >> >> Hi Yuanhan, > > Hi Ciara, > > Thanks for the note. > >> I intend to keep the DPDK server-mode as the default. My reasoning is that >> not >> all users will have access to QEMU v2.7.0 initially. We will keep >> operating as before >> but have an option to switch to DPDK client mode, > > And yes, good point. > >> and then perhaps look at >> switching the default in a later release. > > Also okay to me.
Is there still merit to this patch, given above? If so, I'd finish my integration and testing work and submit it formally.