diff mbox

blockdev: reset werror/rerror on drive_del

Message ID 1370271492-5259-1-git-send-email-stefanha@redhat.com
State New
Headers show

Commit Message

Stefan Hajnoczi June 3, 2013, 2:58 p.m. UTC
Paolo Bonzini <pbonzini@redhat.com> suggested the following test case:

1. Launch a guest and wait at the GRUB boot menu:

  qemu-system-x86_64 -enable-kvm -m 1024 \
   -drive if=none,cache=none,file=test.img,id=foo,werror=stop,rerror=stop
   -device virtio-blk-pci,drive=foo,id=virtio0,addr=4

2. Hot unplug the device:

  (qemu) drive_del foo

3. Select the first boot menu entry

Without this patch the guest pauses due to ENOMEDIUM.  But it is not
possible to resolve this situation - the drive has become anonymous.

With this patch the guest the guest gets the ENOMEDIUM error.

Note that this scenario actually happens sometimes during libvirt disk
hot unplug, where device_del is followed by drive_del.  I/O may still be
submitted to the drive after drive_del if the guest does not process the
PCI hot unplug notification.

Reported-by: Dafna Ron <dron@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
---
 blockdev.c | 4 ++++
 1 file changed, 4 insertions(+)

Comments

Paolo Bonzini June 3, 2013, 3:20 p.m. UTC | #1
Il 03/06/2013 16:58, Stefan Hajnoczi ha scritto:
> Paolo Bonzini <pbonzini@redhat.com> suggested the following test case:
> 
> 1. Launch a guest and wait at the GRUB boot menu:
> 
>   qemu-system-x86_64 -enable-kvm -m 1024 \
>    -drive if=none,cache=none,file=test.img,id=foo,werror=stop,rerror=stop
>    -device virtio-blk-pci,drive=foo,id=virtio0,addr=4
> 
> 2. Hot unplug the device:
> 
>   (qemu) drive_del foo
> 
> 3. Select the first boot menu entry
> 
> Without this patch the guest pauses due to ENOMEDIUM.  But it is not
> possible to resolve this situation - the drive has become anonymous.
> 
> With this patch the guest the guest gets the ENOMEDIUM error.
> 
> Note that this scenario actually happens sometimes during libvirt disk
> hot unplug, where device_del is followed by drive_del.  I/O may still be
> submitted to the drive after drive_del if the guest does not process the
> PCI hot unplug notification.
> 
> Reported-by: Dafna Ron <dron@redhat.com>
> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
> ---
>  blockdev.c | 4 ++++
>  1 file changed, 4 insertions(+)
> 
> diff --git a/blockdev.c b/blockdev.c
> index d1ec99a..6eb81a3 100644
> --- a/blockdev.c
> +++ b/blockdev.c
> @@ -1180,6 +1180,10 @@ int do_drive_del(Monitor *mon, const QDict *qdict, QObject **ret_data)
>       */
>      if (bdrv_get_attached_dev(bs)) {
>          bdrv_make_anon(bs);
> +
> +        /* Further I/O must not pause the guest */
> +        bdrv_set_on_error(bs, BLOCKDEV_ON_ERROR_REPORT,
> +                          BLOCKDEV_ON_ERROR_REPORT);
>      } else {
>          drive_uninit(drive_get_by_blockdev(bs));
>      }
> 

Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>

Paolo
Markus Armbruster June 4, 2013, 4:37 p.m. UTC | #2
Stefan Hajnoczi <stefanha@redhat.com> writes:

> Paolo Bonzini <pbonzini@redhat.com> suggested the following test case:
>
> 1. Launch a guest and wait at the GRUB boot menu:
>
>   qemu-system-x86_64 -enable-kvm -m 1024 \
>    -drive if=none,cache=none,file=test.img,id=foo,werror=stop,rerror=stop
>    -device virtio-blk-pci,drive=foo,id=virtio0,addr=4
>
> 2. Hot unplug the device:
>
>   (qemu) drive_del foo
>
> 3. Select the first boot menu entry
>
> Without this patch the guest pauses due to ENOMEDIUM.  But it is not
> possible to resolve this situation - the drive has become anonymous.
>
> With this patch the guest the guest gets the ENOMEDIUM error.
>
> Note that this scenario actually happens sometimes during libvirt disk
> hot unplug, where device_del is followed by drive_del.  I/O may still be
> submitted to the drive after drive_del if the guest does not process the
> PCI hot unplug notification.
>
> Reported-by: Dafna Ron <dron@redhat.com>
> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
> ---
>  blockdev.c | 4 ++++
>  1 file changed, 4 insertions(+)
>
> diff --git a/blockdev.c b/blockdev.c
> index d1ec99a..6eb81a3 100644
> --- a/blockdev.c
> +++ b/blockdev.c
> @@ -1180,6 +1180,10 @@ int do_drive_del(Monitor *mon, const QDict *qdict, QObject **ret_data)
>       */
>      if (bdrv_get_attached_dev(bs)) {
>          bdrv_make_anon(bs);
> +
> +        /* Further I/O must not pause the guest */
> +        bdrv_set_on_error(bs, BLOCKDEV_ON_ERROR_REPORT,
> +                          BLOCKDEV_ON_ERROR_REPORT);
>      } else {
>          drive_uninit(drive_get_by_blockdev(bs));
>      }

The user gets exactly what he ordered.  He ordered "stop on error", then
provoked errors by turning the virtual block device into a virtual pile
of scrap metal.  Because that's exactly what drive_del does when used
while a device model is attached to the drive.

The only sane use case for drive_del I can think of is revoking access
to an image violently, after the guest failed to honor a hot unplug.

Even then, using drive_del when the block device is removable is
unnecessary.  Just rip out the medium with eject -f.  Look ma, no scrap
metal.

I'm not sure what you mean by "it is not possible to resolve this
situation".  The device is shot!  Can't see how that could be resolved.

I figure the bit that can't be resolved now is letting the user switch
off "stop on error" safely before a drive_del.  Even if we had a command
for that, there'd still be a window between that command's execution and
drive_del's.  Your patch solves the problem by having drive_del switch
it off unconditionally.  Oookay, but please document it, because it's
not exactly obvious.

Re "the guest gets the ENOMEDIUM error": depends on the device.  I doubt
disks can signal "no medium", and even if they could, I doubt device
drivers are prepared for it.

Re "this scenario actually happens sometimes during libvirt disk hot
unplug, where device_del is followed by drive_del": if I remember
correctly, libvirt disk hot unplug runs drive_del right after
device_del, opening a window where the guest sees a dead device.  That's
asking for trouble, and trouble is known to oblige.
Paolo Bonzini June 4, 2013, 5:04 p.m. UTC | #3
Il 04/06/2013 18:37, Markus Armbruster ha scritto:
> I figure the bit that can't be resolved now is letting the user switch
> off "stop on error" safely before a drive_del.  Even if we had a command
> for that, there'd still be a window between that command's execution and
> drive_del's.  Your patch solves the problem by having drive_del switch
> it off unconditionally.  Oookay, but please document it, because it's
> not exactly obvious.

It is not obvious, but it is not surprising either when you see it (i.e.
you won't really be surprised by the errors in the guest and won't need
to know that, under the hood, rerror has been changed from the value you
specified).

> Re "the guest gets the ENOMEDIUM error": depends on the device.  I doubt
> disks can signal "no medium", and even if they could, I doubt device
> drivers are prepared for it.

SCSI disks can signal whatever they want.  Device drivers will just
treat it as any other error (sense code) they don't recognize.

> Re "this scenario actually happens sometimes during libvirt disk hot
> unplug, where device_del is followed by drive_del": if I remember
> correctly, libvirt disk hot unplug runs drive_del right after
> device_del, opening a window where the guest sees a dead device.  That's
> asking for trouble, and trouble is known to oblige.

I think it's causing too much trouble though, and Stefan's patch is
making the trouble evident to the guest.  Surprise removal is a fact of
life, I don't think it makes sense to stop the machine on surprise
removal.  It's very different from I/O errors.

Paolo
Markus Armbruster June 4, 2013, 7:24 p.m. UTC | #4
Paolo Bonzini <pbonzini@redhat.com> writes:

> Il 04/06/2013 18:37, Markus Armbruster ha scritto:
>> I figure the bit that can't be resolved now is letting the user switch
>> off "stop on error" safely before a drive_del.  Even if we had a command
>> for that, there'd still be a window between that command's execution and
>> drive_del's.  Your patch solves the problem by having drive_del switch
>> it off unconditionally.  Oookay, but please document it, because it's
>> not exactly obvious.
>
> It is not obvious, but it is not surprising either when you see it (i.e.
> you won't really be surprised by the errors in the guest and won't need
> to know that, under the hood, rerror has been changed from the value you
> specified).
>
>> Re "the guest gets the ENOMEDIUM error": depends on the device.  I doubt
>> disks can signal "no medium", and even if they could, I doubt device
>> drivers are prepared for it.
>
> SCSI disks can signal whatever they want.  Device drivers will just
> treat it as any other error (sense code) they don't recognize.

My point is: the commit message claims "the guest gets the ENOMEDIUM
error", which isn't really true.  No biggie, of course.

>> Re "this scenario actually happens sometimes during libvirt disk hot
>> unplug, where device_del is followed by drive_del": if I remember
>> correctly, libvirt disk hot unplug runs drive_del right after
>> device_del, opening a window where the guest sees a dead device.  That's
>> asking for trouble, and trouble is known to oblige.
>
> I think it's causing too much trouble though, and Stefan's patch is
> making the trouble evident to the guest.  Surprise removal is a fact of
> life, I don't think it makes sense to stop the machine on surprise
> removal.  It's very different from I/O errors.

I don't disagree with Stefan's patch, or your defense of it.

Except I'm reluctant to not document something non-obvious because "you
don't need to know" when I can document it in less time it would take me
to overcome my resistance to "you don't need to know" arguments ;)

This is drive_add's documentation in hmp-commands.hx:

    Remove host block device.  The result is that guest generated IO is
    no longer submitted against the host device underlying the disk.
    Once a drive has been deleted, the QEMU Block layer returns -EIO
    which results in IO errors in the guest for applications that are
    reading/writing to the device.

Suggest to add:

    These errors are always reported to the guest, regardless of the
    drive's error actions (drive options rerror, werror).

Independently, libvirt needs fixing.
Eric Blake June 4, 2013, 7:32 p.m. UTC | #5
On 06/04/2013 01:24 PM, Markus Armbruster wrote:
> Paolo Bonzini <pbonzini@redhat.com> writes:
> 
>> Il 04/06/2013 18:37, Markus Armbruster ha scritto:
>>> I figure the bit that can't be resolved now is letting the user switch
>>> off "stop on error" safely before a drive_del.  Even if we had a command
>>> for that, there'd still be a window between that command's execution and
>>> drive_del's.  Your patch solves the problem by having drive_del switch
>>> it off unconditionally.  Oookay, but please document it, because it's
>>> not exactly obvious.
>>
>> It is not obvious, but it is not surprising either when you see it (i.e.
>> you won't really be surprised by the errors in the guest and won't need
>> to know that, under the hood, rerror has been changed from the value you
>> specified).
>>

> This is drive_add's documentation in hmp-commands.hx:
> 
>     Remove host block device.  The result is that guest generated IO is
>     no longer submitted against the host device underlying the disk.
>     Once a drive has been deleted, the QEMU Block layer returns -EIO
>     which results in IO errors in the guest for applications that are
>     reading/writing to the device.
> 
> Suggest to add:
> 
>     These errors are always reported to the guest, regardless of the
>     drive's error actions (drive options rerror, werror).
> 
> Independently, libvirt needs fixing.

Total agreement that libvirt needs to use a saner disk hot-unplug
sequence when it is known that qemu provides one.  I've filed
https://bugzilla.redhat.com/show_bug.cgi?id=970761
to remind us to fix libvirt.
Markus Armbruster June 5, 2013, 7:09 a.m. UTC | #6
Eric Blake <eblake@redhat.com> writes:

> On 06/04/2013 01:24 PM, Markus Armbruster wrote:
>> Paolo Bonzini <pbonzini@redhat.com> writes:
>> 
>>> Il 04/06/2013 18:37, Markus Armbruster ha scritto:
>>>> I figure the bit that can't be resolved now is letting the user switch
>>>> off "stop on error" safely before a drive_del.  Even if we had a command
>>>> for that, there'd still be a window between that command's execution and
>>>> drive_del's.  Your patch solves the problem by having drive_del switch
>>>> it off unconditionally.  Oookay, but please document it, because it's
>>>> not exactly obvious.
>>>
>>> It is not obvious, but it is not surprising either when you see it (i.e.
>>> you won't really be surprised by the errors in the guest and won't need
>>> to know that, under the hood, rerror has been changed from the value you
>>> specified).
>>>
>
>> This is drive_add's documentation in hmp-commands.hx:
>> 
>>     Remove host block device.  The result is that guest generated IO is
>>     no longer submitted against the host device underlying the disk.
>>     Once a drive has been deleted, the QEMU Block layer returns -EIO
>>     which results in IO errors in the guest for applications that are
>>     reading/writing to the device.
>> 
>> Suggest to add:
>> 
>>     These errors are always reported to the guest, regardless of the
>>     drive's error actions (drive options rerror, werror).
>> 
>> Independently, libvirt needs fixing.
>
> Total agreement that libvirt needs to use a saner disk hot-unplug
> sequence when it is known that qemu provides one.  I've filed
> https://bugzilla.redhat.com/show_bug.cgi?id=970761
> to remind us to fix libvirt.

Sane sequence

1. device_del

2. Wait for DEVICE_DELETED

3. if timeout, drive_del

Might make sense to offer a choice in the API between "fail" and
"destroy the block device" if guest doesn't cooperate.
Stefan Hajnoczi June 5, 2013, 8:21 a.m. UTC | #7
On Tue, Jun 04, 2013 at 06:37:27PM +0200, Markus Armbruster wrote:
> Stefan Hajnoczi <stefanha@redhat.com> writes:
> 
> > Paolo Bonzini <pbonzini@redhat.com> suggested the following test case:
> >
> > 1. Launch a guest and wait at the GRUB boot menu:
> >
> >   qemu-system-x86_64 -enable-kvm -m 1024 \
> >    -drive if=none,cache=none,file=test.img,id=foo,werror=stop,rerror=stop
> >    -device virtio-blk-pci,drive=foo,id=virtio0,addr=4
> >
> > 2. Hot unplug the device:
> >
> >   (qemu) drive_del foo
> >
> > 3. Select the first boot menu entry
> >
> > Without this patch the guest pauses due to ENOMEDIUM.  But it is not
> > possible to resolve this situation - the drive has become anonymous.
> >
> > With this patch the guest the guest gets the ENOMEDIUM error.
> >
> > Note that this scenario actually happens sometimes during libvirt disk
> > hot unplug, where device_del is followed by drive_del.  I/O may still be
> > submitted to the drive after drive_del if the guest does not process the
> > PCI hot unplug notification.
> >
> > Reported-by: Dafna Ron <dron@redhat.com>
> > Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
> > ---
> >  blockdev.c | 4 ++++
> >  1 file changed, 4 insertions(+)
> >
> > diff --git a/blockdev.c b/blockdev.c
> > index d1ec99a..6eb81a3 100644
> > --- a/blockdev.c
> > +++ b/blockdev.c
> > @@ -1180,6 +1180,10 @@ int do_drive_del(Monitor *mon, const QDict *qdict, QObject **ret_data)
> >       */
> >      if (bdrv_get_attached_dev(bs)) {
> >          bdrv_make_anon(bs);
> > +
> > +        /* Further I/O must not pause the guest */
> > +        bdrv_set_on_error(bs, BLOCKDEV_ON_ERROR_REPORT,
> > +                          BLOCKDEV_ON_ERROR_REPORT);
> >      } else {
> >          drive_uninit(drive_get_by_blockdev(bs));
> >      }
> 
> The user gets exactly what he ordered.  He ordered "stop on error", then
> provoked errors by turning the virtual block device into a virtual pile
> of scrap metal.  Because that's exactly what drive_del does when used
> while a device model is attached to the drive.
> 
> The only sane use case for drive_del I can think of is revoking access
> to an image violently, after the guest failed to honor a hot unplug.
> 
> Even then, using drive_del when the block device is removable is
> unnecessary.  Just rip out the medium with eject -f.  Look ma, no scrap
> metal.
> 
> I'm not sure what you mean by "it is not possible to resolve this
> situation".  The device is shot!  Can't see how that could be resolved.

This is the critical part: the guest is paused and there is no way to
resolve the continuous pause loop.  The drive is gone but the guest
hasn't PCI hot unplugged the storage controller.  As a user, there's
nothing you can do on the QEMU monitor to resume the guest - it will
just pause itself again.

This behavior is really bad, QEMU has basically wedged the guest into an
unrecoverable state and that's what I was trying to describe.

> I figure the bit that can't be resolved now is letting the user switch
> off "stop on error" safely before a drive_del.  Even if we had a command
> for that, there'd still be a window between that command's execution and
> drive_del's.  Your patch solves the problem by having drive_del switch
> it off unconditionally.  Oookay, but please document it, because it's
> not exactly obvious.

Thanks for the documentation suggestion, will add it in v2.

> Re "the guest gets the ENOMEDIUM error": depends on the device.  I doubt
> disks can signal "no medium", and even if they could, I doubt device
> drivers are prepared for it.

Yep, error reporting depends on the emulated storage controller.
virtio-blk and IDE just report a generic error status.

> Re "this scenario actually happens sometimes during libvirt disk hot
> unplug, where device_del is followed by drive_del": if I remember
> correctly, libvirt disk hot unplug runs drive_del right after
> device_del, opening a window where the guest sees a dead device.  That's
> asking for trouble, and trouble is known to oblige.

Agreed.
Fam Zheng June 5, 2013, 8:26 a.m. UTC | #8
On Mon, 06/03 16:58, Stefan Hajnoczi wrote:
> Paolo Bonzini <pbonzini@redhat.com> suggested the following test case:
> 
> 1. Launch a guest and wait at the GRUB boot menu:
> 
>   qemu-system-x86_64 -enable-kvm -m 1024 \
>    -drive if=none,cache=none,file=test.img,id=foo,werror=stop,rerror=stop
>    -device virtio-blk-pci,drive=foo,id=virtio0,addr=4
> 
> 2. Hot unplug the device:
> 
>   (qemu) drive_del foo
> 
> 3. Select the first boot menu entry
> 
> Without this patch the guest pauses due to ENOMEDIUM.  But it is not
> possible to resolve this situation - the drive has become anonymous.
> 
> With this patch the guest the guest gets the ENOMEDIUM error.
s/the guest the guest/the guest/
diff mbox

Patch

diff --git a/blockdev.c b/blockdev.c
index d1ec99a..6eb81a3 100644
--- a/blockdev.c
+++ b/blockdev.c
@@ -1180,6 +1180,10 @@  int do_drive_del(Monitor *mon, const QDict *qdict, QObject **ret_data)
      */
     if (bdrv_get_attached_dev(bs)) {
         bdrv_make_anon(bs);
+
+        /* Further I/O must not pause the guest */
+        bdrv_set_on_error(bs, BLOCKDEV_ON_ERROR_REPORT,
+                          BLOCKDEV_ON_ERROR_REPORT);
     } else {
         drive_uninit(drive_get_by_blockdev(bs));
     }