* Dan Kenigsberg <dan...@redhat.com> [2012-08-16 15:59]:
> On Thu, Aug 16, 2012 at 10:53:17AM -0500, Ryan Harper wrote:
> > * Dan Kenigsberg <dan...@redhat.com> [2012-08-16 03:37]:
> > > Dan Kenigsberg has posted comments on this change.
> > > 
> > > Change subject: Fix vdsm-faqemu VM launch failure on hosts with newer 
> > > libvirt
> > > ......................................................................
> > > 
> > > 
> > > Patch Set 1: I would prefer that you didn't submit this
> > > 
> > > (1 inline comment)
> > > 
> > > ....................................................
> > > File vdsm_hooks/faqemu/vdsm-faqemu
> > > Line 20: 
> > > Line 21: qemu_argv += filter(lambda x: x != "-enable-kvm", sys.argv[1:])
> > > Line 22: # libvirt 0.9.10+ checks for the presence of /dev/kvm to provide 
> > > Line 23: # better error messages, but this breaks this hook, fake it out
> > > Line 24: os.system("touch /dev/kvm")
> > > how can this work? this script runs as vdsm.
> > 
> > # sudo -u vdsm touch /dev/kvm  
> > touch: cannot touch `/dev/kvm': Permission denied
> > 
> > But I can assure you that it did work.  I didn't just touch the file as
> > root.  I installed the faqemu hook and /dev/kvm is owned by root.  Are
> > you sure hooks run as vdsm?
> 
> Yes. They are called by hooks.py's execCmd.
> However I was wrong about this script being a hook script: it is the
> emulator used by libvirt instead of qemu. Again, I am very much
> surprised that this runs as root - libvirt's default is qemu:qemu.

Agreed, I'm not quite sure what's going on here as the VMs indeed are
running as non-root qemu user:

qemu     31698  2.0  0.8 997456 71884 ?        Sl   Aug16  25:45 
/usr/bin/qemu-kvm -no-kvm -S -M pc-0.14 -m 20 -smp 
1,sockets=1,cores=1,threads=1 -name vm2 -uuid 
0c3767f1-e525-433c-aeaf-e27921624a37 -smbios type=1,manufacturer=Red 
Hat,product=RHEV 
Hypervisor,version=17-1,serial=69C248FD-BFE5-35FE-EB8E-1531D910109A_00:ff:fe:00:00:e4,uuid=0c3767f1-e525-433c-aeaf-e27921624a37
 -nodefconfig -nodefaults -chardev 
socket,id=charmonitor,path=/var/lib/libvirt/qemu/vm2.monitor,server,nowait -mon 
chardev=charmonitor,id=monitor,mode=control -rtc 
base=2012-08-16T15:43:58,driftfix=slew -no-shutdown -device 
piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -device 
virtio-serial-pci,id=virtio-serial0,bus=pci.0,addr=0x4 -drive 
file=/rhev/data-center/2a8898a0-e6ea-11e1-985c-00fffe0000eb/7af50e73-bdc4-4814-84bc-dd802542d688/images/11111111-1111-1111-1111-111111111111/RHEL6.3-20120531.0-Server-x86_64-DVD1.iso,if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw,serial=
 -device 
ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0,bootindex=1 -drive 
file=/rhev/data-center/2a8898a0-e6ea-11e1-985c-00fffe0000eb/f01871d2-de00-43a7-93e4-275470245cc9/images/b0139761-8926-42b6-8de6-aebb400190a6/3b3870af-4bbb-4c24-b438-f8e6c59f53fe,if=none,id=drive-virtio-disk0,format=raw,serial=b0139761-8926-42b6-8de6-aebb400190a6,cache=none,werror=stop,rerror=stop,aio=threads
 -device 
virtio-blk-pci,scsi=off,bus=pci.0,addr=0x5,drive=drive-virtio-disk0,id=virtio-disk0
 -netdev tap,fd=26,id=hostnet0,vhost=on,vhostfd=28 -device 
virtio-net-pci,netdev=hostnet0,id=net0,mac=00:1a:4a:a8:44:01,bus=pci.0,addr=0x3 
-chardev 
socket,id=charchannel0,path=/var/lib/libvirt/qemu/channels/vm2.com.redhat.rhevm.vdsm,server,nowait
 -device 
virtserialport,bus=virtio-serial0.0,nr=1,chardev=charchannel0,id=channel0,name=com.redhat.rhevm.vdsm
 -chardev spicevmc,id=charchannel1,name=vdagent -device 
virtserialport,bus=virtio-serial0.0,nr=2,chardev=charchannel1,id=channel1,name=com.redhat.spice.0
 -chardev pty,id=charconsole0 -device 
virtconsole,chardev=charconsole0,id=console0 -spice 
port=5902,tls-port=5903,addr=0,x509-dir=/etc/pki/vdsm/libvirt-spice,tls-channel=main,tls-channel=display,tls-channel=inputs,tls-channel=cursor,tls-channel=playback,tls-channel=record
 -k en-us -vga qxl -global qxl-vga.vram_size=67108864 -device 
virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x6


> 
> 
> > 
> > It's run as root:
> > 
> > [root@ichigo-dom228 tmp]# cat /usr/libexec/vdsm/vdsm-faqemu
> > #!/usr/bin/python
> > 
> > import os
> > import sys
> > 
> > qemu_paths = [
> >     "/usr/bin/qemu-kvm",
> >     "/usr/libexec/qemu-kvm",
> > ]
> > 
> > for qemu_bin in qemu_paths:
> >     if os.path.exists(qemu_bin): break
> > else:
> >     raise RuntimeError, "QEMU binary not found"
> > 
> > qemu_argv = [ qemu_bin ]
> > 
> > if not "-no-kvm" in sys.argv:
> >     qemu_argv += [ "-no-kvm" ]
> > 
> > qemu_argv += filter(lambda x: x != "-enable-kvm", sys.argv[1:])
> > os.system('id > /tmp/faqemu_id.out')
> > os.system('touch /dev/kvm')
> > os.execv(qemu_bin, qemu_argv)
> > 
> > [root@ichigo-dom228 tmp]# cat /tmp/faqemu_id.out 
> > uid=0(root) gid=0(root) groups=0(root) 
> > context=system_u:system_r:virtd_t:s0-s0:c0.c1023
> > 
> > 
> > > 
> > > also, there are less expensive ways to create a file - how about shipping 
> > > it in this hook's rpm ?
> > 
> > Is that really less expensive?  I worry about having an rpm include the 
> > file;
> > and /dev gets remounted/changed accross reboots; so this wouldn't work.
> > 
> > What's expensive about a touch?
> 
> It is, comparing to opening the file for writing
> 
>     file('/dev/kvm', 'w')

We're launching a VM, an additional exec isn't a lot of overhead.  If
someone comes back and says launching the VM took too long and we spend
all our time in one os.system('touch') call, then maybe you're right.

(platechiller) ~ % cat touch.py 
import os
os.system('touch /dev/kvm')
(platechiller) ~ % sudo time python touch.py 
0.01user 0.00system 0:00.01elapsed 84%CPU (0avgtext+0avgdata
      21328maxresident)k
0inputs+0outputs (0major+2424minor)pagefaults 0swaps

> 
> 
> Anyway, I cannot say that I'm happy with this solution: nothing clears
> /dev/kvm after the hook is uninstalled, for one's.

/dev/kvm will be removed on reboot since /dev is reconstructed.

The presence of the file doesn't bother loading of the module either:

(platechiller) ~ % ls -al /dev/kvm
crw-rw----+ 1 root kvm 10, 232 Aug 17 08:06 /dev/kvm
(platechiller) ~ % sudo modprobe -vr kvm_intel kvm 
rmmod /lib/modules/3.2.0-29-generic/kernel/arch/x86/kvm/kvm-intel.ko
rmmod /lib/modules/3.2.0-29-generic/kernel/arch/x86/kvm/kvm.ko
(platechiller) ~ % ls -al /dev/kvm
ls: cannot access /dev/kvm: No such file or directory
(platechiller) ~ % sudo touch /dev/kvm 
(platechiller) ~ % ls -al /dev/kvm
-rw-r--r-- 1 root root 0 Aug 17 08:06 /dev/kvm
(platechiller) ~ % sudo modprobe -v kvm-intel
insmod /lib/modules/3.2.0-29-generic/kernel/arch/x86/kvm/kvm.ko 
insmod /lib/modules/3.2.0-29-generic/kernel/arch/x86/kvm/kvm-intel.ko 
(platechiller) ~ % ls -al /dev/kvm 
crw-rw----+ 1 root kvm 10, 232 Aug 17 08:07 /dev/kvm

> 
> Regards,
> 
> Dan.

-- 
Ryan Harper
Software Engineer; Linux Technology Center
IBM Corp., Austin, Tx
ry...@us.ibm.com

_______________________________________________
vdsm-devel mailing list
vdsm-devel@lists.fedorahosted.org
https://lists.fedorahosted.org/mailman/listinfo/vdsm-devel

Reply via email to