From: Andrea Bolognani <abologna@redhat.com> To: David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org> Cc: "Maxiwell S. Garcia" <maxiwell@linux.ibm.com>, qemu-ppc@nongnu.org, qemu-devel@nongnu.org Subject: Re: [Qemu-devel] [Qemu-ppc] [PATCH v7 0/2] spapr-rtas: add ibm, get-vpd RTAS interface Date: Tue, 09 Apr 2019 18:24:07 +0200 [thread overview] Message-ID: <fb1fe659eb80b99b9696ff4b128cd070c4e0dabc.camel@redhat.com> (raw) In-Reply-To: <20190408042747.GI16627@umbus.fritz.box> Apologies for taking this long to respond. On Mon, 2019-04-08 at 14:27 +1000, David Gibson wrote: > On Tue, Apr 02, 2019 at 12:28:07PM +0200, Greg Kurz wrote: > > The recent fixes around "host-serial" and "host-model" simply moved > > the decision to expose host data to the upper layer, ie. libvirt > > which should be involved in this discussion. > > Right, that's deliberate. Note that roughly-equivalent information on > x86 is currently supplied via the SMBIOS. OpenStack Nova sets that, > rather than qemu, and I'd like to move towards a common configuration > model with x86, though it's a fairly long path to there. > > OpenStack had an equivalent security problem to our one, which it > addressed by taking the host serial from /etc/machine-id if present > rather than the real host info. IIUC the situation is a bit different between x86 and ppc64, because while for the latter SPAPR defines a way for the guest to access information about the host it's running on, that's not the case for the former, at least to the best of my knowledge. What OpenStack is doing is reading the machine-id (if explicitly configured to do so: the default is to use the guest's own UUID[1]) and exposing that as the *guest* serial, not as the *host* serial. >From libvirt's point of view, the entire mechanism is entirely optional, so unless the management layer explicitly asks it to set a certain value for the serial, libvirt will simply pass no information down to QEMU. The relevant XML elements[2] are clearly modeled after x86, so I wonder if Nova is setting them also on ppc64 and if so, what the guest will ultimately see... > > Cc'ing Andrea for expertise. Problem exposed below. > > > > The pseries machine used to expose the content of the host's > > /proc/device-tree/system-id and /proc/device-tree/model in the guest > > DT. This led to a CVE and QEMU doesn't do that anymore for new machine > > types. Instead, two new properties where added to the pseries machine: > > > > pseries-4.0.host-serial=string (Host serial number to advertise in guest device tree) > > pseries-4.0.host-model=string (Host model to advertise in guest device tree) > > > > It is up to the caller to pass something... which may be anything, > > including something like $(cat /proc/device-tree/system-id) or > > randomly generated. What happens if the caller doesn't provide any value? Will QEMU come up with something itself? Adding a few extra knobs in the vein as the existing ones sounds like a fairly reasonable idea. It will still be up to the management layer to actually provide the values. > > Is there a chance libvirt can be taught to pass a different string > > to the target QEMU in case of migration ? libvirt already supports providing a different XML to the target host, so changing a couple values should be no big deal. As a final note, unless I've gotten it wrong and x86 actually *does* provide a way for the guest to figure out its host's serial, then any software relying on the attributes defined by SPAPR is ultimately not portable to non-ppc64 hardware and should probably be rearchitected to go through the management layer, as Daniel was also suggesting earlier in the thread. [1] https://github.com/openstack/nova/blob/master/nova/virt/libvirt/driver.py#L364-L372 [2] https://libvirt.org/formatdomain.html#elementsSysinfo -- Andrea Bolognani / Red Hat / Virtualization
WARNING: multiple messages have this Message-ID (diff)
From: Andrea Bolognani <abologna@redhat.com> To: David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org> Cc: qemu-ppc@nongnu.org, qemu-devel@nongnu.org, "Maxiwell S. Garcia" <maxiwell@linux.ibm.com> Subject: Re: [Qemu-devel] [Qemu-ppc] [PATCH v7 0/2] spapr-rtas: add ibm, get-vpd RTAS interface Date: Tue, 09 Apr 2019 18:24:07 +0200 [thread overview] Message-ID: <fb1fe659eb80b99b9696ff4b128cd070c4e0dabc.camel@redhat.com> (raw) Message-ID: <20190409162407.D5RZgCNXANuT8fbev2ev_KdWCAzHlnUNxhoxCx5Pv3Y@z> (raw) In-Reply-To: <20190408042747.GI16627@umbus.fritz.box> Apologies for taking this long to respond. On Mon, 2019-04-08 at 14:27 +1000, David Gibson wrote: > On Tue, Apr 02, 2019 at 12:28:07PM +0200, Greg Kurz wrote: > > The recent fixes around "host-serial" and "host-model" simply moved > > the decision to expose host data to the upper layer, ie. libvirt > > which should be involved in this discussion. > > Right, that's deliberate. Note that roughly-equivalent information on > x86 is currently supplied via the SMBIOS. OpenStack Nova sets that, > rather than qemu, and I'd like to move towards a common configuration > model with x86, though it's a fairly long path to there. > > OpenStack had an equivalent security problem to our one, which it > addressed by taking the host serial from /etc/machine-id if present > rather than the real host info. IIUC the situation is a bit different between x86 and ppc64, because while for the latter SPAPR defines a way for the guest to access information about the host it's running on, that's not the case for the former, at least to the best of my knowledge. What OpenStack is doing is reading the machine-id (if explicitly configured to do so: the default is to use the guest's own UUID[1]) and exposing that as the *guest* serial, not as the *host* serial. From libvirt's point of view, the entire mechanism is entirely optional, so unless the management layer explicitly asks it to set a certain value for the serial, libvirt will simply pass no information down to QEMU. The relevant XML elements[2] are clearly modeled after x86, so I wonder if Nova is setting them also on ppc64 and if so, what the guest will ultimately see... > > Cc'ing Andrea for expertise. Problem exposed below. > > > > The pseries machine used to expose the content of the host's > > /proc/device-tree/system-id and /proc/device-tree/model in the guest > > DT. This led to a CVE and QEMU doesn't do that anymore for new machine > > types. Instead, two new properties where added to the pseries machine: > > > > pseries-4.0.host-serial=string (Host serial number to advertise in guest device tree) > > pseries-4.0.host-model=string (Host model to advertise in guest device tree) > > > > It is up to the caller to pass something... which may be anything, > > including something like $(cat /proc/device-tree/system-id) or > > randomly generated. What happens if the caller doesn't provide any value? Will QEMU come up with something itself? Adding a few extra knobs in the vein as the existing ones sounds like a fairly reasonable idea. It will still be up to the management layer to actually provide the values. > > Is there a chance libvirt can be taught to pass a different string > > to the target QEMU in case of migration ? libvirt already supports providing a different XML to the target host, so changing a couple values should be no big deal. As a final note, unless I've gotten it wrong and x86 actually *does* provide a way for the guest to figure out its host's serial, then any software relying on the attributes defined by SPAPR is ultimately not portable to non-ppc64 hardware and should probably be rearchitected to go through the management layer, as Daniel was also suggesting earlier in the thread. [1] https://github.com/openstack/nova/blob/master/nova/virt/libvirt/driver.py#L364-L372 [2] https://libvirt.org/formatdomain.html#elementsSysinfo -- Andrea Bolognani / Red Hat / Virtualization
next prev parent reply other threads:[~2019-04-09 16:24 UTC|newest] Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top [not found] <20190327204102.20925-1-maxiwell@linux.ibm.com> [not found] ` <20190328142151.7b0e00dd@bahia.lab.toulouse-stg.fr.ibm.com> [not found] ` <20190328183923.lcd3p6fpy4qvvxoo@maxibm> [not found] ` <20190329132951.451d4ef0@bahia.lan> 2019-04-01 15:01 ` [Qemu-devel] [Qemu-ppc] [PATCH v7 0/2] spapr-rtas: add ibm, get-vpd RTAS interface Maxiwell S. Garcia 2019-04-02 10:28 ` Greg Kurz 2019-04-03 21:07 ` Daniel Henrique Barboza 2019-04-04 8:45 ` Greg Kurz 2019-04-08 4:27 ` David Gibson 2019-04-08 4:27 ` David Gibson 2019-04-09 16:24 ` Andrea Bolognani [this message] 2019-04-09 16:24 ` Andrea Bolognani 2019-04-12 14:57 ` Greg Kurz 2019-04-12 14:57 ` Greg Kurz 2019-04-12 15:07 ` Daniel P. Berrangé 2019-04-12 15:07 ` Daniel P. Berrangé 2019-07-03 6:53 ` David Gibson 2019-04-08 4:21 ` David Gibson 2019-04-08 4:21 ` David Gibson 2019-04-08 16:31 ` Greg Kurz 2019-04-08 16:31 ` Greg Kurz 2019-04-08 22:34 ` Michael Roth 2019-04-08 22:34 ` Michael Roth 2019-07-03 6:49 ` David Gibson 2019-07-03 6:39 ` David Gibson
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=fb1fe659eb80b99b9696ff4b128cd070c4e0dabc.camel@redhat.com \ --to=abologna@redhat.com \ --cc=david@gibson.dropbear.id.au \ --cc=groug@kaod.org \ --cc=maxiwell@linux.ibm.com \ --cc=qemu-devel@nongnu.org \ --cc=qemu-ppc@nongnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).