From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:36308) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1R4bZW-000699-2e for qemu-devel@nongnu.org; Fri, 16 Sep 2011 12:47:27 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1R4bZU-0004hA-9t for qemu-devel@nongnu.org; Fri, 16 Sep 2011 12:47:26 -0400 Received: from e1.ny.us.ibm.com ([32.97.182.141]:52561) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1R4bZU-0004gx-1V for qemu-devel@nongnu.org; Fri, 16 Sep 2011 12:47:24 -0400 Received: from /spool/local by us.ibm.com with XMail ESMTP for from ; Fri, 16 Sep 2011 12:47:20 -0400 Received: from d01av04.pok.ibm.com (d01av04.pok.ibm.com [9.56.224.64]) by d01relay04.pok.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p8GGkhPP257348 for ; Fri, 16 Sep 2011 12:46:43 -0400 Received: from d01av04.pok.ibm.com (loopback [127.0.0.1]) by d01av04.pok.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p8GGkfoX030120 for ; Fri, 16 Sep 2011 12:46:42 -0400 Message-ID: <4E737D70.8030801@linux.vnet.ibm.com> Date: Fri, 16 Sep 2011 12:46:40 -0400 From: Stefan Berger MIME-Version: 1.0 References: <20110915122842.GA6302@redhat.com> <4E720CA9.9050208@linux.vnet.ibm.com> <20110916144443.GB20933@redhat.com> In-Reply-To: <20110916144443.GB20933@redhat.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] blobstore disk format (was Re: Design of the blobstore) List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Michael S. Tsirkin" Cc: Anthony Liguori , qemu-devel@nongnu.org, Markus Armbruster On 09/16/2011 10:44 AM, Michael S. Tsirkin wrote: > On Thu, Sep 15, 2011 at 10:33:13AM -0400, Stefan Berger wrote: >> On 09/15/2011 08:28 AM, Michael S. Tsirkin wrote: >>> So the below is a proposal for a directory scheme >>> for storing (optionally multiple) nvram images, >>> along with any metadata. >>> Data is encoded using BER: >>> http://en.wikipedia.org/wiki/Basic_Encoding_Rules >>> Specifically, we mostly use the subsets. >>> >> Would it change anything if we were to think of the NVRAM image as >> another piece of metadata? > Yes, we can do that, sure. I had the feeling that it will help to lay > out the image at the end, to make directory listing > more efficient - the rest of metadata is usually small, > image might be somewhat large. > Why not let a convenience library handle the metadata on the device level, having it create the blob that the NVRAM layer ends up writing and parsing before the device uses it? Otherwise I should maybe rename the nvram to meatdata_store :-/ >> I am also wondering whether each device shouldn't just handle the >> metadata itself, > It could be that just means we will have custom code with > different bugs in each device. > Note that from experience with formats, the problem with > time becomes less trivial than it seems as we > need to provide forward and backward compatibility > guarantees. > Is that guaranteed just by using ASN.1 ? Do we need to add a revision to the metadata? How do we handle metadata that was to change over time, i.e., new attribute/values being added into a finite store? >> so generate a blob from data structures containing >> all the metadata it needs, arranging attribute and value pairs >> itself (maybe using some convenience function for >> serialization/deserialization) and let the NVRAM layer not handle >> the metadata at all but only blobs, their maximum sizes, actual >> sizes > Actual size seems to be a TPM specific thing. > Yes, it could also be metadata. One should probably always be allowed to write a shorter blob than registered, but not a longer one. If the device did that, maybe it should assume it needs to prepend a header to the actual blob indicating the actual size of the following blob so trailing garbage can be ignored. >> encryption, integrity value (crc32 or sha1) and so on. What >> metadata should there be that really need to be handled on the NVRAM >> API and below level rather than on the device-specific code level? > So checksum (checksum value and type) 'and so on' are what I call > metadata :) Doing it at device level seems wrong. > You mean doing it at the NVRAM level seems wrong. Of course, again something a device could write into a header prepended to the actual blob. Maybe every device that needs it should do that so that if we were to support encryption of blobs and the key for decryption was wrong one could detect it early without feeding badly decrypted / corrupted state into the device and see what happens. >>> We use a directory as a SET in a CER format. >>> This allows generating directory online without scanning >>> the entries beforehand. >>> >> I guess it is the 'unknown' for me... but what is the advantage of >> using ASN1 for this rather than just writing out packed and >> endianess-normalized data structures (with revision value), > If you want an example of where this 'custom formats are easy > so let us write one' leads to in the end, > look no further than live migration code. > It's a mess of hacks that does not even work across > upstream qemu versions, leave alone across > downstreams (different linux distros). > So is ASN1 the answer or does one still need to add a revision tag to each blob putting in custom code for parsing the different revisions of data structures (I guess) that may be extended/changed over time? Stefan >> having >> them crc32-protected to have some sanity checking in place? >> >> Stefan > I'm not sure why we want crc specifically in TPM. > If it is 'just because we can' then it probably > applies to other non-volatile storage? > Storage generally? > >>> The rest of the encoding uses a DER format. >>> This makes for fast parsing as entries are easy to skip. >>> >>> Each entry is encoded in DER format. >>> Each entry is a SEQUENCE with two objects: >>> 1. nvram >>> 2. optional name - a UTF8String >>> >>> Binary data is stored as OCTET-STRING values on disk. >>> Any RW metadata is stored as OCTET-STRING value as well. >>> Any RO metadata is stored in appropriate universal encoding, >>> by type. >>> >>> On the context below, an attribute is either a IA5String or a SEQUENCE. >>> If IA5String, this is the attribute name, and it has no value. >>> If SEQUENCE, the first entry in the sequence is an >>> IA5String, it is the attribute name. The rest of the entries >>> represent the attribute value. >>> >>> Mandatory/optional attributes: depends on type. >>> tpm will have realsize as RW mandatory attribute. >>> >>> Each nvram is built as a SEQUENCE including 4 objects >>> 1. type - an IA5String. downstreams can use other types such as >>> UUIDs instead to ensure no conflicts with upstream >>> 2. SET of mandatory attributes >>> 3. SET of optional attributes >>> 4. data - a RW OCTET-STRING >>> >>> It is envisioned that attributes won't be too large, >>> so they can easily be kept in memory. >>> >>>