[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190114025054.GE4205@dastard>
Date: Mon, 14 Jan 2019 13:50:54 +1100
From: Dave Chinner <david@...morbit.com>
To: Matthew Wilcox <willy@...radead.org>
Cc: Pankaj Gupta <pagupta@...hat.com>, linux-kernel@...r.kernel.org,
kvm@...r.kernel.org, qemu-devel@...gnu.org,
linux-nvdimm@...1.01.org, linux-fsdevel@...r.kernel.org,
virtualization@...ts.linux-foundation.org,
linux-acpi@...r.kernel.org, linux-ext4@...r.kernel.org,
linux-xfs@...r.kernel.org, jack@...e.cz, stefanha@...hat.com,
dan j williams <dan.j.williams@...el.com>, riel@...riel.com,
nilal@...hat.com, kwolf@...hat.com, pbonzini@...hat.com,
zwisler@...nel.org, vishal l verma <vishal.l.verma@...el.com>,
dave jiang <dave.jiang@...el.com>, david@...hat.com,
jmoyer@...hat.com,
xiaoguangrong eric <xiaoguangrong.eric@...il.com>,
hch@...radead.org, mst@...hat.com, jasowang@...hat.com,
lcapitulino@...hat.com, imammedo@...hat.com, eblake@...hat.com,
tytso@....edu, adilger kernel <adilger.kernel@...ger.ca>,
darrick wong <darrick.wong@...cle.com>, rjw@...ysocki.net
Subject: Re: [PATCH v3 0/5] kvm "virtio pmem" device
On Sun, Jan 13, 2019 at 03:38:21PM -0800, Matthew Wilcox wrote:
> On Mon, Jan 14, 2019 at 10:29:02AM +1100, Dave Chinner wrote:
> > Until you have images (and hence host page cache) shared between
> > multiple guests. People will want to do this, because it means they
> > only need a single set of pages in host memory for executable
> > binaries rather than a set of pages per guest. Then you have
> > multiple guests being able to detect residency of the same set of
> > pages. If the guests can then, in any way, control eviction of the
> > pages from the host cache, then we have a guest-to-guest information
> > leak channel.
>
> I don't think we should ever be considering something that would allow a
> guest to evict page's from the host's pagecache [1]. The guest should
> be able to kick its own references to the host's pagecache out of its
> own pagecache, but not be able to influence whether the host or another
> guest has a read-only mapping cached.
>
> [1] Unless the guest is allowed to modify the host's file; obviously
> truncation, holepunching, etc are going to evict pages from the host's
> page cache.
Right, and that's exactly what I mean by "we need to be real careful
with functionality like this".
To be honest, I really don't think I've even touched the surface
here.
e.g. Filesystems and storage can share logical and physical extents.
Which means that image files that share storage (e.g. because they
are all cloned from the same master image and/or there's in-line
deduplication running on the storage) and can be directly accessed
by guests may very well be susceptible to detection of host side
deduplication and subsequent copy-on-write operations.
This really doesn't seem much different to me from the guest being
able to infer host side KSM page deduplication and COW operation in
the guest side page cache. The only difference is that DAX is being
used to probe the host side page cache and storage rather than the
guest side.
IOWs, I suspect there's a world of pain waiting for us if we punch
huge holes through the virtual machine abstractions like this.
Improving performance is a laudible goal, but at what price?
Cheers,
Dave.
--
Dave Chinner
david@...morbit.com
Powered by blists - more mailing lists