Am 08.07.2015 um 13:36 hat Richard W.M. Jones geschrieben: > On Wed, Jul 08, 2015 at 12:23:37PM +0200, Kevin Wolf wrote: > > Am 03.07.2015 um 14:35 hat Markus Armbruster geschrieben: > > > "Richard W.M. Jones" <rjo...@redhat.com> writes: > > > > > > > Currently if qemu is connected to a curl source (eg. web server), and > > > > the web server fails / times out / dies, you always see a bogus EIO > > > > "Input/output error". > > > > > > > > For example, choose a large file located on any local webserver which > > > > you control: > > > > > > > > $ qemu-img convert -p http://example.com/large.iso /tmp/test > > > > > > > > Once it starts copying the file, stop the webserver and you will see > > > > qemu-img fail with: > > > > > > > > qemu-img: error while reading sector 61440: Input/output error > > > > > > > > This patch does two things: Firstly print the actual error from curl > > > > so it doesn't get lost. Secondly, change EIO to EPROTO. EPROTO is a > > > > POSIX.1 compatible errno which more accurately reflects that there was > > > > a protocol error, rather than some kind of hardware failure. > > > > > > > > After this patch is applied, the error changes to: > > > > > > > > $ qemu-img convert -p http://example.com/large.iso /tmp/test > > > > qemu-img: curl: transfer closed with 469989 bytes remaining to read > > > > qemu-img: error while reading sector 16384: Protocol error > > > > > > > > Signed-off-by: Richard W.M. Jones <rjo...@redhat.com> > > > > Reviewed-by: Stefan Hajnoczi <stefa...@redhat.com> > > > > --- > > > > block/curl.c | 9 ++++++++- > > > > 1 file changed, 8 insertions(+), 1 deletion(-) > > > > > > > > diff --git a/block/curl.c b/block/curl.c > > > > index 3a2b63e..2fd7c06 100644 > > > > --- a/block/curl.c > > > > +++ b/block/curl.c > > > > @@ -22,6 +22,7 @@ > > > > * THE SOFTWARE. > > > > */ > > > > #include "qemu-common.h" > > > > +#include "qemu/error-report.h" > > > > #include "block/block_int.h" > > > > #include "qapi/qmp/qbool.h" > > > > #include "qapi/qmp/qstring.h" > > > > @@ -298,6 +299,12 @@ static void > > > > curl_multi_check_completion(BDRVCURLState *s) > > > > /* ACBs for successful messages get completed in > > > > curl_read_cb */ > > > > if (msg->data.result != CURLE_OK) { > > > > int i; > > > > + > > > > + /* Don't lose the original error message from curl, > > > > since > > > > + * it contains extra data. > > > > + */ > > > > + error_report("curl: %s", state->errmsg); > > > > + > > > > for (i = 0; i < CURL_NUM_ACB; i++) { > > > > CURLAIOCB *acb = state->acb[i]; > > > > > > > > > > Printing an error message, then returning an error code is problematic. > > > > > > It works when the caller is going to print its own error message to the > > > same destination. Callee produces a specific error message devoid of > > > context, caller produces an unspecific one with hopefully more context. > > > Better than just one of them. Worse than a single specific error with > > > context, but that can't be done with just a "return errno code" > > > interface. > > > > > > It's kind of wrong when the caller reports its own error somewhere else, > > > e.g. to a monitor. Still, when barfing extra info to stderr is the best > > > we can do, it's better than nothing. > > > > > > It's more wrong when the caller handles the error quietly. I guess > > > that's never the case here, but I can't be sure without a lot more > > > sleuthing. Perhaps Kevin or Stefan can judge this immediately. > > > > I'm not worried too much about requests made by the monitor or during > > startup. I don't like the error_report() there, but having a more > > specific error message on stderr is better than having nothing. > > > > The case that bothers me more is guest requests. Depending on the > > werror/rerror settings, this may allow the guest to flood the log file > > with curl error messages. > > Can you expand a bit on how they would do this? I can see how the > remote web server can cause a curl error (itself possibly a concern), > but not how the guest can do it.
The guest can't cause it, but once the connection is down, I expect every request to fail. You don't have to have a malicious guest for filling up the log file, it just needs to be careless enough to continue trying new requests instead of offlining the device. Kevin