[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v5 07/18] s390x: protvirt: Inhibit balloon when switching to
From: |
Cornelia Huck |
Subject: |
Re: [PATCH v5 07/18] s390x: protvirt: Inhibit balloon when switching to protected mode |
Date: |
Wed, 26 Feb 2020 19:24:04 +0100 |
On Wed, 26 Feb 2020 16:30:32 +0100
Janosch Frank <address@hidden> wrote:
> On 2/26/20 4:16 PM, David Hildenbrand wrote:
> > On 26.02.20 16:06, Christian Borntraeger wrote:
> >>
> >>
> >> On 26.02.20 15:59, David Hildenbrand wrote:
> >>> On 26.02.20 13:20, Janosch Frank wrote:
> >>>> Ballooning in protected VMs can only be done when the guest shares the
> >>>> pages it gives to the host. Hence, until we have a solution for this
> >>>> in the guest kernel, we inhibit ballooning when switching into
> >>>> protected mode and reverse that once we move out of it.
> >>>
> >>> I don't understand what you mean here, sorry. zapping a page will mean
> >>> that a fresh one will be faulted in when accessed. And AFAIK, that means
> >>> it will be encrypted again when needed.
> >>>
> >>> Is that more like the UV will detect this as an integrity issue and
> >>> crash the VM?
> >>
> >> yes, the UV will detect a fresh page as an integrity issue.
> >> Only if the page was defined to be shared by the guest, we would avoid the
> >> integrity check.
> >>
> >
> > Please make that clearer in the patch description. With that
> >
> > Reviewed-by: David Hildenbrand <address@hidden>
> >
>
> How about:
> s390x: protvirt: Inhibit balloon when switching to protected mode
>
> Ballooning in protected VMs can only be done when the guest shares the
> pages it gives to the host. If pages are not shared, the integrity
> checks will fail once those pages have been altered and are given back
> to the guest.
This makes sense to me...
>
> Hence, until we have a solution for this in the guest kernel, we
> inhibit ballooning when switching into protected mode and reverse that
> once we move out of it.
...however, I'm scratching my head here.
If we have a future guest that knows how to handle this, how do we
know? We know that the current Linux driver clears
VIRTIO_F_IOMMU_PLATFORM during feature negotiation, and presumably a
guest that knows how to handle this will not do that. But it still
won't work as expected, as we inhibit ballooning...
So, either
- we don't inhibit ballooning now; any guest that clears the (required)
virtio feature bit won't be able to drive the virtio-balloon device
anyway, but a future guest that negotiates the bit would work; or
- we inhibit ballooning now; no guest can therefore use ballooning,
regardless what they are doing or not doing (this includes guests
that negotiate the feature bit, but fail to handle pages properly).
Or is there some other reason why we need to inhibit ballooning for
protected vms?
pgpIQBK_0syU5.pgp
Description: OpenPGP digital signature
- [PATCH v5 06/18] s390x: protvirt: Handle diag 308 subcodes 0,1,3,4, (continued)
- Re: [PATCH v5 07/18] s390x: protvirt: Inhibit balloon when switching to protected mode, Janosch Frank, 2020/02/26
- Re: [PATCH v5 07/18] s390x: protvirt: Inhibit balloon when switching to protected mode, Christian Borntraeger, 2020/02/26
- Re: [PATCH v5 07/18] s390x: protvirt: Inhibit balloon when switching to protected mode, David Hildenbrand, 2020/02/26
- Re: [PATCH v5 07/18] s390x: protvirt: Inhibit balloon when switching to protected mode, Halil Pasic, 2020/02/27
[PATCH v5 09/18] s390x: Add SIDA memory ops, Janosch Frank, 2020/02/26
[PATCH v5 13/18] s390x: protvirt: Move diag 308 data over SIDAD, Janosch Frank, 2020/02/26
[PATCH v5 12/18] s390x: protvirt: Set guest IPL PSW, Janosch Frank, 2020/02/26
[PATCH v5 11/18] s390x: protvirt: SCLP interpretation, Janosch Frank, 2020/02/26
[PATCH v5 08/18] s390x: protvirt: KVM intercept changes, Janosch Frank, 2020/02/26
[PATCH v5 10/18] s390x: protvirt: Move STSI data over SIDAD, Janosch Frank, 2020/02/26