[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [RFC] memory-backend-file/nvdimm: support read-only fil
From: |
Stefan Hajnoczi |
Subject: |
Re: [Qemu-devel] [RFC] memory-backend-file/nvdimm: support read-only files as memory-backends |
Date: |
Mon, 15 Jul 2019 10:08:12 +0100 |
User-agent: |
Mutt/1.12.0 (2019-05-25) |
On Tue, Jul 09, 2019 at 12:53:45PM +0200, Philippe Mathieu-Daudé wrote:
> Cc'ing Igor & Xiao.
>
> On 7/8/19 11:19 PM, Julio Montes wrote:
> > Currently is not possible to use a file that is part of a read-only
> > filesystem as memory backend for nvdimm devices, even if this is not
> > modified
> > in the guest. In order to improve the security of Virtual Machines that
> > share
> > and do not modify the memory-backend-file, QEMU should support
> > read-only memory-backeds.
> >
> > Use case:
> > * Kata Containers use a memory-backed-file as read-only rootfs, and this
> > file is used to start all the virtual machines in the node.
> > It would be really bad if somehow a malicious container modified it.
> >
> > Signed-off-by: Julio Montes <address@hidden>
> > ---
> > exec.c | 6 ++++++
> > 1 file changed, 6 insertions(+)
> >
> > diff --git a/exec.c b/exec.c
> > index 50ea9c5aaa..1eb170b55a 100644
> > --- a/exec.c
> > +++ b/exec.c
> > @@ -1852,6 +1852,12 @@ static int file_ram_open(const char *path,
> > break;
> > }
> > g_free(filename);
> > + } else if (errno == EROFS) {
> > + fd = open(path, O_RDONLY);
>
> While I can understand your use case, I'm not sure we want this silenced
> as default. I'd expect an explicit command line option for that backend,
> but I don't know well this area so let's wait for other to review.
I also wonder whether read-only should be exposed to the guest (e.g.
ACPI NFIT SPA EFI_MEMORY_WP Address Range Memory Mapping Attribute or
ACPI NFIT NVDIMM Region Mapping Structure NVDIMM State Flags Bit 3).
Stefan