From: Janosch Frank <frankja@linux.ibm.com>
To: "Cédric Le Goater" <clg@kaod.org>, qemu-s390x@nongnu.org
Cc: qemu-devel@nongnu.org, "Thomas Huth" <thuth@redhat.com>,
"Halil Pasic" <pasic@linux.ibm.com>,
"Christian Borntraeger" <borntraeger@linux.ibm.com>,
"Claudio Imbrenda" <imbrenda@linux.ibm.com>,
"David Hildenbrand" <david@redhat.com>,
"Ilya Leoshkevich" <iii@linux.ibm.com>,
"Eric Farman" <farman@linux.ibm.com>,
"Sebastian Mitterle" <smitterl@redhat.com>,
"Cédric Le Goater" <clg@redhat.com>
Subject: Re: [PATCH v3 2/3] s390x/pv: Introduce a s390_pv_check() helper for runtime
Date: Tue, 17 Jan 2023 09:40:09 +0100 [thread overview]
Message-ID: <a386bb49-72de-6edc-9873-70ec59e475ab@linux.ibm.com> (raw)
In-Reply-To: <20230116174607.2459498-3-clg@kaod.org>
On 1/16/23 18:46, Cédric Le Goater wrote:
> From: Cédric Le Goater <clg@redhat.com>
>
> If a secure kernel is started in a non-protected VM, the OS will hang
> during boot without giving a proper error message to the user.
Didn't we establish that you were missing the IOMMU flag so this
statement isn't correct anymore?
I haven't yet fully ingested my coffee, but from what I understand you
would block a switch into PV mode if cgs is not set. Which would mean
that PV KVM unit tests wouldn't start anymore as well as any VMs that
have the unpack feature but not cgs.
And that's not something that we want.
You can start a PV VM without cgs if unpack is in the CPU model. The
ONLY requirement that we should fail on is unpack.
Have a look at what David Gibson put in the commit message when he
introduced that in 651615d9:
"""
To integrate this with the option used by other platforms, we
implement the following compromise:
- When the confidential-guest-support option is set, s390 will
recognize it, verify that the CPU can support PV (failing if not)
and set virtio default options necessary for encrypted or protected
guests, as on other platforms. i.e. if confidential-guest-support
is set, we will either create a guest capable of entering PV mode,
or fail outright.
- If confidential-guest-support is not set, guests might still be
able to enter PV mode, if the CPU has the right model. This may be
a little surprising, but shouldn't actually be harmful.
"""
next prev parent reply other threads:[~2023-01-17 8:41 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-16 17:46 [PATCH v3 0/3]s390x/pv: Improve error reporting of protected VMs Cédric Le Goater
2023-01-16 17:46 ` [PATCH v3 1/3] s390x/pv: Implement a CGS check helper Cédric Le Goater
2023-01-16 17:46 ` [PATCH v3 2/3] s390x/pv: Introduce a s390_pv_check() helper for runtime Cédric Le Goater
2023-01-17 7:59 ` Thomas Huth
2023-01-17 8:40 ` Janosch Frank [this message]
2023-01-17 8:56 ` Cédric Le Goater
2023-01-17 9:09 ` Thomas Huth
2023-01-17 9:28 ` Janosch Frank
2023-01-16 17:46 ` [PATCH v3 3/3] s390x/pv: Move check on hugepage under s390_pv_guest_check() Cédric Le Goater
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=a386bb49-72de-6edc-9873-70ec59e475ab@linux.ibm.com \
--to=frankja@linux.ibm.com \
--cc=borntraeger@linux.ibm.com \
--cc=clg@kaod.org \
--cc=clg@redhat.com \
--cc=david@redhat.com \
--cc=farman@linux.ibm.com \
--cc=iii@linux.ibm.com \
--cc=imbrenda@linux.ibm.com \
--cc=pasic@linux.ibm.com \
--cc=qemu-devel@nongnu.org \
--cc=qemu-s390x@nongnu.org \
--cc=smitterl@redhat.com \
--cc=thuth@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).