Yuanhan Liu <yuanhan.liu at linux.intel.com> writes:

> On Fri, Jun 24, 2016 at 07:43:29AM +0000, Loftus, Ciara wrote:
>> > 
>> > On Tue, Jun 21, 2016 at 09:15:03AM -0400, Aaron Conole wrote:
>> > > Yuanhan Liu <yuanhan.liu at linux.intel.com> writes:
>> > >
>> > > > On Fri, Jun 17, 2016 at 11:32:36AM -0400, Aaron Conole wrote:
>> > > >> Prior to this commit, the only way to add a vhost-user socket to the
>> > > >> system is by relying on librte_vhost to open the unix domain socket 
>> > > >> and
>> > > >> add it to the unix socket list.  This is problematic for applications
>> > > >> which would like to set the permissions,
>> > > >
>> > > > So, you want to address the issue raised by following patch?
>> > > >
>> > > >     http://dpdk.org/dev/patchwork/patch/12222/
>> > >
>> > > That patch does try to address the issue, however - it has some
>> > > problems.  The biggest is a TOCTTOU issue when using chown.  The way to
>> > > solve that issue properly is different depending on which operating
>> > > system is being used (for instance, FreeBSD doesn't honor
>> > > fchown(),fchmod() on file descriptors).  My solution is basically to
>> > > punt that responsibility to the controlling application.
>> > >
>> > > > I would still like to stick to my proposal, that is to introduce a
>> > > > new API to do the permission change at anytime, if we end up with
>> > > > wanting to introduce a new API.
>> > >
>> > > I've spent a lot of time looking at the TOCTTOU problem, and I think
>> > > that is a really hard problem to solve portably.  Might be good to just
>> > > start with the flexible mechanism here that lets the application
>> > > developer satisfy their own needs.
>> > >
>> > > >> or applications which are not
>> > > >> directly allowed to open sockets due to policy restrictions.
>> > > >
>> > > > Could you name a specific example?
>> > >
>> > > SELinux policy might require one application to open the socket, and
>> > > pass it back via a dbus mechanism.  I can't actually think of a concrete
>> > > implemented case, so it may not be valid.
>> > >
>> > > > BTW, JFYI, since 16.07, DPDK supports client mode. It's QEMU (acting
>> > > > as the server) will create the socket file. I guess that would diminish
>> > > > (or even avoid?) the permission pain that DPDK acting as server brings.
>> > > > I doubt the API to do the permission change is really needed then.
>> > >
>> > > I wouldn't say it 'solves' the issue so much as hopes no one uses server
>> > > mode in DPDK.  I agree, for OvS, it could.
>> > 
>> > Actually, I think I would (personally) suggest people to switch to DPDK
>> > vhost-user client mode, for two good reasons:
>> > 
>> > - it should solve the socket permission issue raised by you and Christian.
>> > 
>> > - it has the "reconnect" feature since 16.07. Which means guest network
>> >   will still work from a DPDK vhost-user restart/crash. DPDK vhost-user
>> >   as server simply doesn't support that.
>> > 
>> > And FYI, Loftus is doing the DPDK for OVS intergration. Not quite sure
>> > whether she put the client mode as the default mode though.
>> 
>> Hi Yuanhan,
>
> Hi Ciara,
>
> Thanks for the note.
>
>> I intend to keep the DPDK server-mode as the default. My reasoning is that 
>> not
>> all users will have access to QEMU v2.7.0 initially. We will keep
>> operating as before
>> but have an option to switch to DPDK client mode,
>
> And yes, good point.
>
>> and then perhaps look at
>> switching the default in a later release.
>
> Also okay to me.

Is there still merit to this patch, given above?  If so, I'd finish my
integration and testing work and submit it formally.



Reply via email to