All of lore.kernel.org
 help / color / mirror / Atom feed
From: Halil Pasic <pasic@linux.ibm.com>
To: "Daniel P. Berrangé" <berrange@redhat.com>
Cc: "Michael S. Tsirkin" <mst@redhat.com>,
	pair@us.ibm.com, brijesh.singh@amd.com, frankja@linux.ibm.com,
	kvm@vger.kernel.org, david@redhat.com, cohuck@redhat.com,
	qemu-devel@nongnu.org, dgilbert@redhat.com,
	qemu-s390x@nongnu.org, qemu-ppc@nongnu.org,
	David Gibson <david@gibson.dropbear.id.au>,
	pbonzini@redhat.com, Richard Henderson <rth@twiddle.net>,
	mdroth@linux.vnet.ibm.com, Eduardo Habkost <ehabkost@redhat.com>
Subject: Re: [PATCH v3 9/9] host trust limitation: Alter virtio default properties for protected guests
Date: Fri, 19 Jun 2020 22:04:31 +0200	[thread overview]
Message-ID: <20200619220431.54288e84.pasic@linux.ibm.com> (raw)
In-Reply-To: <20200619121638.GK700896@redhat.com>

On Fri, 19 Jun 2020 13:16:38 +0100
Daniel P. Berrangé <berrange@redhat.com> wrote:

[..]

> > > > > @@ -1165,6 +1167,15 @@ void machine_run_board_init(MachineState *machine)
> > > > >           * areas.
> > > > >           */
> > > > >          machine_set_mem_merge(OBJECT(machine), false, &error_abort);
> > > > > +
> > > > > +        /*
> > > > > +         * Virtio devices can't count on directly accessing guest
> > > > > +         * memory, so they need iommu_platform=on to use normal DMA
> > > > > +         * mechanisms.  That requires disabling legacy virtio support
> > > > > +         * for virtio pci devices
> > > > > +         */
> > > > > +        object_register_sugar_prop(TYPE_VIRTIO_PCI, "disable-legacy", "on");
> > > > > +        object_register_sugar_prop(TYPE_VIRTIO_DEVICE, "iommu_platform", "on");
> > > > >      }  
> > > > 
> > > > Silently changing the user's request configuration like this is a bad idea.
> > > > The "disable-legacy" option in particular is undesirable as that switches
> > > > the device to virtio-1.0 only mode, which exposes a different PCI ID to
> > > > the guest.
> > > > 
> > > > If some options are incompatible with encryption, then we should raise a
> > > > fatal error at startup, so applications/admins are aware that their requested
> > > > config is broken.  
> > >
> > > Agreed - my suggestion is an on/off/auto property, auto value
> > > changes automatically, on/off is validated.  
> > 
> > In fact should we extend all bit properties to allow an auto value?  
> 
> If "auto" was made the default that creates a similar headache, as to
> preserve existing configuration semantics we expose to apps, libvirt
> would need to find all the properties changed to use "auto" and manually
> set them back to on/off explicitly.

Hm, does that mean we can't change the default for any qemu property?

I would expect that the defaults most remain invariant for any
particular machine version. Conceptually, IMHO the default could change
with a new machine version, but we would need some mechanism to ensure
compatibility for old machine versions.

Regards,
Halil

WARNING: multiple messages have this Message-ID (diff)
From: Halil Pasic <pasic@linux.ibm.com>
To: "Daniel P. Berrangé" <berrange@redhat.com>
Cc: pair@us.ibm.com, cohuck@redhat.com, brijesh.singh@amd.com,
	frankja@linux.ibm.com, kvm@vger.kernel.org, david@redhat.com,
	"Michael S. Tsirkin" <mst@redhat.com>,
	qemu-devel@nongnu.org, Eduardo Habkost <ehabkost@redhat.com>,
	dgilbert@redhat.com, qemu-s390x@nongnu.org, qemu-ppc@nongnu.org,
	pbonzini@redhat.com, Richard Henderson <rth@twiddle.net>,
	mdroth@linux.vnet.ibm.com,
	David Gibson <david@gibson.dropbear.id.au>
Subject: Re: [PATCH v3 9/9] host trust limitation: Alter virtio default properties for protected guests
Date: Fri, 19 Jun 2020 22:04:31 +0200	[thread overview]
Message-ID: <20200619220431.54288e84.pasic@linux.ibm.com> (raw)
In-Reply-To: <20200619121638.GK700896@redhat.com>

On Fri, 19 Jun 2020 13:16:38 +0100
Daniel P. Berrangé <berrange@redhat.com> wrote:

[..]

> > > > > @@ -1165,6 +1167,15 @@ void machine_run_board_init(MachineState *machine)
> > > > >           * areas.
> > > > >           */
> > > > >          machine_set_mem_merge(OBJECT(machine), false, &error_abort);
> > > > > +
> > > > > +        /*
> > > > > +         * Virtio devices can't count on directly accessing guest
> > > > > +         * memory, so they need iommu_platform=on to use normal DMA
> > > > > +         * mechanisms.  That requires disabling legacy virtio support
> > > > > +         * for virtio pci devices
> > > > > +         */
> > > > > +        object_register_sugar_prop(TYPE_VIRTIO_PCI, "disable-legacy", "on");
> > > > > +        object_register_sugar_prop(TYPE_VIRTIO_DEVICE, "iommu_platform", "on");
> > > > >      }  
> > > > 
> > > > Silently changing the user's request configuration like this is a bad idea.
> > > > The "disable-legacy" option in particular is undesirable as that switches
> > > > the device to virtio-1.0 only mode, which exposes a different PCI ID to
> > > > the guest.
> > > > 
> > > > If some options are incompatible with encryption, then we should raise a
> > > > fatal error at startup, so applications/admins are aware that their requested
> > > > config is broken.  
> > >
> > > Agreed - my suggestion is an on/off/auto property, auto value
> > > changes automatically, on/off is validated.  
> > 
> > In fact should we extend all bit properties to allow an auto value?  
> 
> If "auto" was made the default that creates a similar headache, as to
> preserve existing configuration semantics we expose to apps, libvirt
> would need to find all the properties changed to use "auto" and manually
> set them back to on/off explicitly.

Hm, does that mean we can't change the default for any qemu property?

I would expect that the defaults most remain invariant for any
particular machine version. Conceptually, IMHO the default could change
with a new machine version, but we would need some mechanism to ensure
compatibility for old machine versions.

Regards,
Halil


  reply	other threads:[~2020-06-19 20:05 UTC|newest]

Thread overview: 112+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-06-19  2:05 [PATCH v3 0/9] Generalize memory encryption models David Gibson
2020-06-19  2:05 ` David Gibson
2020-06-19  2:05 ` [PATCH v3 1/9] host trust limitation: Introduce new host trust limitation interface David Gibson
2020-06-19  2:05   ` David Gibson
2020-06-26 11:01   ` Dr. David Alan Gilbert
2020-06-26 11:01     ` Dr. David Alan Gilbert
2020-07-14 19:26   ` Richard Henderson
2020-07-14 19:26     ` Richard Henderson
2020-06-19  2:05 ` [PATCH v3 2/9] host trust limitation: Handle memory encryption via interface David Gibson
2020-06-19  2:05   ` David Gibson
2020-06-19  2:05 ` [PATCH v3 3/9] host trust limitation: Move side effect out of machine_set_memory_encryption() David Gibson
2020-06-19  2:05   ` David Gibson
2020-06-19  2:05 ` [PATCH v3 4/9] host trust limitation: Rework the "memory-encryption" property David Gibson
2020-06-19  2:05   ` David Gibson
2020-07-14 19:36   ` Richard Henderson
2020-07-14 19:36     ` Richard Henderson
2020-06-19  2:05 ` [PATCH v3 5/9] host trust limitation: Decouple kvm_memcrypt_*() helpers from KVM David Gibson
2020-06-19  2:05   ` David Gibson
2020-06-19  2:05 ` [PATCH v3 6/9] host trust limitation: Add Error ** to HostTrustLimitation::kvm_init David Gibson
2020-06-19  2:05   ` David Gibson
2020-06-19  2:06 ` [PATCH v3 7/9] spapr: Add PEF based host trust limitation David Gibson
2020-06-19  2:06   ` David Gibson
2020-06-19  2:06 ` [PATCH v3 8/9] spapr: PEF: block migration David Gibson
2020-06-19  2:06   ` David Gibson
2020-06-26 10:33   ` Dr. David Alan Gilbert
2020-06-26 10:33     ` Dr. David Alan Gilbert
2020-07-05  7:38     ` David Gibson
2020-07-05  7:38       ` David Gibson
2020-06-19  2:06 ` [PATCH v3 9/9] host trust limitation: Alter virtio default properties for protected guests David Gibson
2020-06-19  2:06   ` David Gibson
2020-06-19 10:12   ` Daniel P. Berrangé
2020-06-19 10:12     ` Daniel P. Berrangé
2020-06-19 11:46     ` Michael S. Tsirkin
2020-06-19 11:46       ` Michael S. Tsirkin
2020-06-19 11:47       ` Michael S. Tsirkin
2020-06-19 11:47         ` Michael S. Tsirkin
2020-06-19 12:16         ` Daniel P. Berrangé
2020-06-19 12:16           ` Daniel P. Berrangé
2020-06-19 20:04           ` Halil Pasic [this message]
2020-06-19 20:04             ` Halil Pasic
2020-06-24  7:55           ` Michael S. Tsirkin
2020-06-24  7:55             ` Michael S. Tsirkin
2020-06-25  4:57             ` David Gibson
2020-06-25  4:57               ` David Gibson
2020-06-25  5:02       ` David Gibson
2020-06-25  5:02         ` David Gibson
2020-06-19 14:45     ` David Gibson
2020-06-19 14:45       ` David Gibson
2020-06-19 15:05       ` Daniel P. Berrangé
2020-06-19 15:05         ` Daniel P. Berrangé
2020-06-20  8:24         ` David Gibson
2020-06-20  8:24           ` David Gibson
2020-06-22  9:09           ` Daniel P. Berrangé
2020-06-22  9:09             ` Daniel P. Berrangé
2020-06-25  5:06             ` David Gibson
2020-06-25  5:06               ` David Gibson
2020-06-19  2:42 ` [PATCH v3 0/9] Generalize memory encryption models no-reply
2020-06-19  2:42   ` no-reply
2020-06-19  8:28 ` David Hildenbrand
2020-06-19  8:28   ` David Hildenbrand
2020-06-19  9:45   ` Cornelia Huck
2020-06-19  9:45     ` Cornelia Huck
2020-06-19  9:56     ` David Hildenbrand
2020-06-19  9:56       ` David Hildenbrand
2020-06-19 10:05       ` Cornelia Huck
2020-06-19 10:05         ` Cornelia Huck
2020-06-19 10:10         ` David Hildenbrand
2020-06-19 10:10           ` David Hildenbrand
2020-06-22 12:02           ` Cornelia Huck
2020-06-22 12:02             ` Cornelia Huck
2020-06-25  5:25             ` David Gibson
2020-06-25  5:25               ` David Gibson
2020-06-25  7:06               ` David Hildenbrand
2020-06-25  7:06                 ` David Hildenbrand
2020-06-26  4:42                 ` David Gibson
2020-06-26  4:42                   ` David Gibson
2020-06-26  6:53                   ` David Hildenbrand
2020-06-26  6:53                     ` David Hildenbrand
2020-06-26  9:01                     ` Janosch Frank
2020-06-26  9:01                       ` Janosch Frank
2020-06-26  9:32                       ` Daniel P. Berrangé
2020-06-26  9:32                         ` Daniel P. Berrangé
2020-06-26  9:49                         ` Janosch Frank
2020-06-26  9:49                           ` Janosch Frank
2020-06-26 10:29                           ` Dr. David Alan Gilbert
2020-06-26 10:29                             ` Dr. David Alan Gilbert
2020-06-26 10:58                             ` Daniel P. Berrangé
2020-06-26 10:58                               ` Daniel P. Berrangé
2020-06-26 12:49                               ` Janosch Frank
2020-06-26 12:49                                 ` Janosch Frank
2020-07-01 11:59                                 ` Halil Pasic
2020-07-01 11:59                                   ` Halil Pasic
2020-06-19  9:48   ` David Gibson
2020-06-19  9:48     ` David Gibson
2020-06-19 10:04     ` David Hildenbrand
2020-06-19 10:04       ` David Hildenbrand
2020-06-25  5:42       ` David Gibson
2020-06-25  5:42         ` David Gibson
2020-06-25  6:59         ` David Hildenbrand
2020-06-25  6:59           ` David Hildenbrand
2020-06-25  9:49           ` Cornelia Huck
2020-06-25  9:49             ` Cornelia Huck
2020-06-22 14:27 ` Christian Borntraeger
2020-06-22 14:27   ` Christian Borntraeger
2020-06-24  7:06   ` Cornelia Huck
2020-06-24  7:06     ` Cornelia Huck
2020-06-25  5:47     ` David Gibson
2020-06-25  5:47       ` David Gibson
2020-06-25  5:48       ` David Gibson
2020-06-25  5:48         ` David Gibson
2020-06-25  5:44   ` David Gibson
2020-06-25  5:44     ` David Gibson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200619220431.54288e84.pasic@linux.ibm.com \
    --to=pasic@linux.ibm.com \
    --cc=berrange@redhat.com \
    --cc=brijesh.singh@amd.com \
    --cc=cohuck@redhat.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=david@redhat.com \
    --cc=dgilbert@redhat.com \
    --cc=ehabkost@redhat.com \
    --cc=frankja@linux.ibm.com \
    --cc=kvm@vger.kernel.org \
    --cc=mdroth@linux.vnet.ibm.com \
    --cc=mst@redhat.com \
    --cc=pair@us.ibm.com \
    --cc=pbonzini@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-ppc@nongnu.org \
    --cc=qemu-s390x@nongnu.org \
    --cc=rth@twiddle.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.