Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4402042imu; Mon, 14 Jan 2019 22:31:03 -0800 (PST) X-Google-Smtp-Source: ALg8bN6hike0X/3m05BXmaDrH4jnpPbQkQqwJeIn8CEyjCdujJ5hV4C4NUgIipHUfo9UOaoTGzkE X-Received: by 2002:a17:902:4:: with SMTP id 4mr2543152pla.20.1547533863437; Mon, 14 Jan 2019 22:31:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547533863; cv=none; d=google.com; s=arc-20160816; b=zG4nLRRc5dzliFjzkl9fmefES9mZezoOjx0nrdlZtZHaPSW1+QI2gtCO5WkAB9w7J/ G1skrJyCMdJKoSurp6WgOq9Lmuu3KLIq8W64i1Y9LUuCLr8FB0yL2XB8CRjWPPUJ3W6f 3i37jH4JVGXYIoSadjjBoJKfcndvGa6E+CJJL3eQgQgiZiVPzGeUj+SR0ys1q6YFkb4D lkbZIRkYhD9AzAGyCBOk5h+Pp6PgPbrHybptDyjAwxi1WE5kQlsiu0eUlBbipa3ViRej zl20FegCxsYOfWfLQjArDVIXrzcnJmtJpeRiEP6Rhzqyc+c8u3g0VwPnVmgVp5quFCyE 6vNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date; bh=CyyasHuKQbx0jdSDEwxSNTGdgqs5nH/CdE/jP/GZjbI=; b=ih7Uw5TydSK5/BI9YAgN3Q2F9tzLHgpSfiwryFrlNo4nz0ZS+J47Zrqo92mCGdFHZS /LKvDLzHEH+40d3+wHvAFiRuqTt5mj413RBFloPVQ2suITDSDSzrXWZCOB4jdgrDuMBm A0VhQJmkmMUOXXFX7UpHlnFeWGVPuRc4QFMmB8nC68caoPpdfQN7KHIpzFzucfRk+5eg 6sPRXN5MWM1GYn0Wd5ilIxiwqP8vxhh/9oxyKlF7yW4wj3Ab9XS4FOE+R9AKPlkr6oF2 9J5QZfymUDTARwwCUMR4hU/rHm+7fUAZbv5SAdSEGEW8JibTY8C9kM2AM6v0+r/aS1Ai xwBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 21si2415539pge.374.2019.01.14.22.30.48; Mon, 14 Jan 2019 22:31:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728053AbfAOFfL (ORCPT + 99 others); Tue, 15 Jan 2019 00:35:11 -0500 Received: from mx1.redhat.com ([209.132.183.28]:45264 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725929AbfAOFfL (ORCPT ); Tue, 15 Jan 2019 00:35:11 -0500 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A3A4F7F6A7; Tue, 15 Jan 2019 05:35:09 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 192221048100; Tue, 15 Jan 2019 05:35:08 +0000 (UTC) Received: from zmail21.collab.prod.int.phx2.redhat.com (zmail21.collab.prod.int.phx2.redhat.com [10.5.83.24]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 3DCC0181A968; Tue, 15 Jan 2019 05:35:07 +0000 (UTC) Date: Tue, 15 Jan 2019 00:35:06 -0500 (EST) From: Pankaj Gupta To: Dave Chinner Cc: Dan Williams , Matthew Wilcox , Linux Kernel Mailing List , KVM list , Qemu Developers , linux-nvdimm , linux-fsdevel , virtualization@lists.linux-foundation.org, Linux ACPI , linux-ext4 , linux-xfs , Jan Kara , Stefan Hajnoczi , Rik van Riel , Nitesh Narayan Lal , Kevin Wolf , Paolo Bonzini , Ross Zwisler , vishal l verma , dave jiang , David Hildenbrand , jmoyer , xiaoguangrong eric , Christoph Hellwig , "Michael S. Tsirkin" , Jason Wang , lcapitulino@redhat.com, Igor Mammedov , Eric Blake , Theodore Ts'o , adilger kernel , darrick wong , "Rafael J. Wysocki" Message-ID: <1684638419.64320214.1547530506805.JavaMail.zimbra@redhat.com> In-Reply-To: <20190114222132.GH4205@dastard> References: <20190109144736.17452-1-pagupta@redhat.com> <1326478078.61913951.1547192704870.JavaMail.zimbra@redhat.com> <20190113232902.GD4205@dastard> <20190113233820.GX6310@bombadil.infradead.org> <942065073.64011540.1547450140670.JavaMail.zimbra@redhat.com> <20190114212501.GG4205@dastard> <20190114222132.GH4205@dastard> Subject: Re: [PATCH v3 0/5] kvm "virtio pmem" device MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.116.141, 10.4.195.25] Thread-Topic: kvm "virtio pmem" device Thread-Index: aJJi+yj9ZhvXNXMyyluM05prm2mSkQ== X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Tue, 15 Jan 2019 05:35:10 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > > > On Mon, Jan 14, 2019 at 02:15:40AM -0500, Pankaj Gupta wrote: > > > > > > > > > > Until you have images (and hence host page cache) shared between > > > > > > multiple guests. People will want to do this, because it means they > > > > > > only need a single set of pages in host memory for executable > > > > > > binaries rather than a set of pages per guest. Then you have > > > > > > multiple guests being able to detect residency of the same set of > > > > > > pages. If the guests can then, in any way, control eviction of the > > > > > > pages from the host cache, then we have a guest-to-guest > > > > > > information > > > > > > leak channel. > > > > > > > > > > I don't think we should ever be considering something that would > > > > > allow a > > > > > guest to evict page's from the host's pagecache [1]. The guest > > > > > should > > > > > be able to kick its own references to the host's pagecache out of its > > > > > own pagecache, but not be able to influence whether the host or > > > > > another > > > > > guest has a read-only mapping cached. > > > > > > > > > > [1] Unless the guest is allowed to modify the host's file; obviously > > > > > truncation, holepunching, etc are going to evict pages from the > > > > > host's > > > > > page cache. > > > > > > > > This is so correct. Guest does not not evict host page cache pages > > > > directly. > > > > > > They don't right now. > > > > > > But someone is going to end up asking for discard to work so that > > > the guest can free unused space in the underlying spares image (i.e. > > > make use of fstrim or mount -o discard) because they have workloads > > > that have bursts of space usage and they need to trim the image > > > files afterwards to keep their overall space usage under control. > > > > > > And then.... > > > > ...we reject / push back on that patch citing the above concern. > > So at what point do we draw the line? > > We're allowing writable DAX mappings, but as I've pointed out that > means we are going to be allowing a potential information leak via > files with shared extents to be directly mapped and written to. > > But we won't allow useful admin operations that allow better > management of host side storage space similar to how normal image > files are used by guests because it's an information leak vector? First of all Thank you for all the useful discussions. I am summarizing here: - We have to live with the limitation to not support fstrim and mount -o discard options with virtio-pmem as they will evict host page cache pages. We cannot allow this for virtio-pmem for security reasons. These filesystem commands will just zero out unused pages currently. - If alot of space is unused and not freed guest can request host Administrator for truncating the host backing image. We are also planning to support qcow2 sparse image format at host side with virtio-pmem. - There is no existing solution for Qemu persistent memory emulation with write support currently. This solution provides us the paravartualized way of emulating persistent memory. It does not emulate of ACPI structures instead it just uses VIRTIO for communication between guest & host. It is fast because of its asynchronous nature and it works well. This makes use of at guest side libnvdimm API's - If disk size freeing problem with guest files trim truncate is very important for users, they can still use real hardware which will provide them both (advance disk features & page cache by pass). Considering all the above reasons I think this feature is useful from virtualization point of view. As Dave rightly said we should be careful and I think now we are careful with the security implications of this device. Thanks again for all the inputs. Best regards, Pankaj > > That's splitting some really fine hairs there... > > > > > In case of virtio-pmem & DAX, guest clears guest page cache exceptional > > > > entries. > > > > Its solely decision of host to take action on the host page cache > > > > pages. > > > > > > > > In case of virtio-pmem, guest does not modify host file directly i.e > > > > don't > > > > perform hole punch & truncation operation directly on host file. > > > > > > ... this will no longer be true, and the nuclear landmine in this > > > driver interface will have been armed.... > > > > I agree with the need to be careful when / if explicit cache control > > is added, but that's not the case today. > > "if"? > > I expect it to be "when", not if. Expect the worst, plan for it now. > > Cheers, > > Dave. > -- > Dave Chinner > david@fromorbit.com >