On Tue, 14 Feb 2023 12:13:28 +0100 Michal Prívozník <mprivozn(a)redhat.com> wrote:On 2/14/23 11:08, Stefano Brivio wrote:I don't know exactly, I thought the "probing" phase would be considered enough -- I'm not saying it's possible, just that it was my (flawed, then) assumption.On Tue, 14 Feb 2023 09:01:39 +0100 Michal Prívozník <mprivozn(a)redhat.com> wrote:I'm failing to see how that would be possible. Starting a guest involves many actions, each one of can fail. From defensive coding POV it's better we have the option to kill passt.On 2/9/23 00:13, Laine Stump wrote:Okay, I see the point now -- I thought libvirtd would start passt only once it knows for sure that the guest will connect to it.I initially had the passt process being started in an identical fashion to the slirp-helper - libvirt was daemonizing the new process and recording its pid in a pidfile. The problem with this is that, since it is daemonized immediately, any startup error in passt happens after the daemonization, and thus isn't seen by libvirt - libvirt believes that the process has started successfully and continues on its merry way. The result was that sometimes a guest would be started, but there would be no passt process for qemu to use for network traffic. Instead, we should be starting passt in the same manner we start dnsmasq - we just exec it as normal (along with a request that passt create the pidfile, which is just another option on the passt commandline) and wait for the child process to exit; passt then has a chance to parse its commandline and complete all the setup prior to daemonizing itself; if it encounters an error and exits with a non-0 code, libvirt will see the code and know about the failure. We can then grab the output from stderr, log that so the "user" has some idea of what went wrong, and then fail the guest startup. Signed-off-by: Laine Stump <laine(a)redhat.com> --- src/qemu/qemu_passt.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-)OOOPS, somehow I've accidentally merged this. Let me post follow up patches.diff --git a/src/qemu/qemu_passt.c b/src/qemu/qemu_passt.c index 0f09bf3db8..f640a69c00 100644 --- a/src/qemu/qemu_passt.c +++ b/src/qemu/qemu_passt.c @@ -141,24 +141,23 @@ qemuPasstStart(virDomainObj *vm, g_autofree char *passtSocketName = qemuPasstCreateSocketPath(vm, net); g_autoptr(virCommand) cmd = NULL; g_autofree char *pidfile = qemuPasstCreatePidFilename(vm, net); + g_autofree char *errbuf = NULL; char macaddr[VIR_MAC_STRING_BUFLEN]; size_t i; pid_t pid = (pid_t) -1; int exitstatus = 0; int cmdret = 0; - VIR_AUTOCLOSE errfd = -1; cmd = virCommandNew(PASST); virCommandClearCaps(cmd); - virCommandSetPidFile(cmd, pidfile); - virCommandSetErrorFD(cmd, &errfd); - virCommandDaemonize(cmd); + virCommandSetErrorBuffer(cmd, &errbuf); virCommandAddArgList(cmd, "--one-off",BTW: we definitely need something better than this. IF, something goes wrong after we've executed passt but before we execute QEMU, then passt just hangs there. This is because passt clone()-s itself (i.e. creates a child process), but QEMU that would connect to the socket never comes around. Thus, the child process never sees the EOF on the socket and just hangs in there thinking there will be somebody connecting, soon.Yes, but other than being a security feature, that's how non-interactive executables are typically implemented.Well, it's clone() that brings all the problems (well, in combination with setsid()).I thought this could be solved by just killing the whole process group, but the child process calls setsid(), which creates its own process group. I've managed to work around this by passing --foreground, but I'm unclear about the consequences. Though, it looks like it's still dropping caps, creating its own namespaces, etc. So this may actually be the way to go.I wouldn't recommend that: --foreground is really intended for interactive usage and we won't be able, for example, to spawn a child in a new PID namespace, which is a nice security feature, I think.There's no need for an end-of-file, just closing the socket is enough. Any other method of terminating the process relies on passt to do or not do something specific anyway, such as writing the correct PID file, writing a PID file at all, not blocking SIGTERM (in case you use that), etc. Even if you run it with --foreground, you still rely on it on correctly parsing options and not creating new processes in new sessions. Connecting to the socket and closing it is in the same class of reliability, I think. Statistically speaking, we had one (embarrassing) issue with the contents of the PID file being wrong, see passt commit 3ec02c097536 ("passt: Truncate PID file on open()"), and (so far) zero reported issues with passt not terminating on EPOLLHUP on its socket with --one-off.I already suggested this to Laine offline: can libvirt just connect() to the socket and close() it, in case QEMU doesn't start? Then passt will terminate.That relies on the fact that passt isn't stuck and responds to the EOF.We certainly can do that if passt needs graceful shutdown, but mustn't rely on that.It doesn't need that -- it does absolutely nothing on shutdown. I'm just saying you can use that to terminate passt, only in case QEMU doesn't start.The problem is where you get those PIDs from, at least if you just rely on PID files. If you don't use PID file descriptors ("pidfd", which I don't see used anywhere in libvirt), you could add the PID of another process (which had its PID recycled from a passt process that terminated meanwhile) to the cgroup, and later terminate something unrelated. -- StefanoIt should be a few (~5) lines of code, instead of all the complexity potentially involved in tracking PIDs and avoiding related races, and design-wise it looks clean to me (libvirtd plays for a moment the QEMU role, because QEMU is not around).Well, we can place all these helper processes into a CGroup and let it trace PIDs. That should be race free.