Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3753583pxb; Tue, 26 Jan 2021 04:01:19 -0800 (PST) X-Google-Smtp-Source: ABdhPJw6lSgsKu9NSfsN4ttooRMhKrnX28oLuy/xUrtmlLm6yl1u35yno/Y4KrcKqsAtFGmOAK/B X-Received: by 2002:a05:6402:318e:: with SMTP id di14mr4310481edb.223.1611662479682; Tue, 26 Jan 2021 04:01:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611662479; cv=none; d=google.com; s=arc-20160816; b=ezcHF90cIhTOA9MqyTevw5ZAHfQElt2wMLQzyuyNuB36rvETETSdNBMeU0DKGGWBzv wBJylWAoLNDD+0nIaPX6DFqY2eIO5vroap35VfOM6+AjrLdud9JuID6cJ9jTwL9s18YS wumEeVLoJDaFmqw/RYUm16RVm50OpvXIzjlBszREaeLtZESIw/ZSWPe0ITnaz7EQbZkT Nx+exBonjvTWHAaFVY2VWAN6ozTzHClH6ci2hT/ubyGlccfzQlOGrOK7BOIF0t9JZsrz grXwrBNbeKk49kaMxFIOcAs/rkMuaEvkS4oYRlIkpShs8iV0pxeXlurO6u2elNnnN6Mg 99Mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=JNyhayEQUd/VOdsUxEkVRqD5at4MpPP2YgdbCdDLx9U=; b=jjhtIgRauwHKU/EyprpMjpeB4QFNekbdDTqcPDzJKuIlwI9j5BQtoriD4IMKLxfwQd MslXY6dMK3CriNXnn8mQQ6lvp1Whdqo0DfcVqjoBjIwB3TymhwD6d1caYknFD9Hp+lDI 0KqR0LLOPn2VjjWpzFnTILbeoMhTGQtIAzO1mp9oRMTQNI0HolcQWE1nbHxdUjzx/fyF A9rBHC+Ghka9XEw0MQqKbnk1oz5PK1g7UsW7T4sMTqGuYXt1t9JZktT2cz32Z4W2RcvZ weEg4Iw/Dvn5rn2KWeyP6XKK9Oh6Ekkxaic2iBFtiz7XP/KbJyvFUf2/YRb9dkzEdTgo ROjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Kb5fR7v/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bi28si7866873edb.493.2021.01.26.04.00.55; Tue, 26 Jan 2021 04:01:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Kb5fR7v/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405286AbhAZL6R (ORCPT + 99 others); Tue, 26 Jan 2021 06:58:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40324 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405106AbhAZL6G (ORCPT ); Tue, 26 Jan 2021 06:58:06 -0500 Received: from mail-wr1-x431.google.com (mail-wr1-x431.google.com [IPv6:2a00:1450:4864:20::431]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BB13BC061786; Tue, 26 Jan 2021 03:57:24 -0800 (PST) Received: by mail-wr1-x431.google.com with SMTP id a9so16152046wrt.5; Tue, 26 Jan 2021 03:57:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=JNyhayEQUd/VOdsUxEkVRqD5at4MpPP2YgdbCdDLx9U=; b=Kb5fR7v/Y+AH1NNFt2aoAEOLTcYZHOaun+NwA7MK1HhEtOvG/JprTa+uWtFuKAaoZq Y/Syws8KtWKcUa5okNXDSuug0ypcPUSS8A7YaloxHFg3lMgDfkcUXjfmDn20/U5S3xHf +sBSrcuySB5UG6/rAuH/7l2sX/Qr0QMfC58vnLVIKDKt2GvjV81x/rjM+p55pOe8CslA Zo3WUs/Sa3JsT829YIwiHUPeTN47NP8xJjp6KiRrCrW9eu+bhp4h+tfyO1TB61wvcCRl uvE9s+Kwna649KKznGNAV1PawEBybItUK81XZUzFUuVw2SAbT8LxwcGiL3f44G61OvnP UCmg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=JNyhayEQUd/VOdsUxEkVRqD5at4MpPP2YgdbCdDLx9U=; b=Ad0/Ki4SjvXKXBpIznktGH7VZxoe3myH4JwUlcVENssSSFIEvrI1lm04xAmD9pUthk MSZOZJ/e+gU+RhkG+eoS+81dCDtTL3RMI9882I2YcV9Bn70psZ/XOYnOenXwAt3wnqPl KF1VZzjKd404vlIeqQnUkPES4eJjUBkzAlQIG/eS3hwdEDs2r/tmzOutJdgbZAPFttGG wnuVvy1yHNq7u9/1S1dAaI2Qrn8pX6Wcqm+Uzd1AjBhkBoiv7ZiqFRvmKuPjNdPYjvMs GElQCh9rZvYz22N1+y5nrpjihOyIwEX0l0q5Mt6Qq9751FstuNqyDSMWh/+vcLtF75hB hCuA== X-Gm-Message-State: AOAM533VICw2DGffdqMRfmu5CszddvbMNBIs/HOzvo8e5C2157+p2aNp haUr6W8qmUirlB1JWyTFcWc2b6mfGhARTUvJ X-Received: by 2002:a5d:60d0:: with SMTP id x16mr5711371wrt.269.1611662243171; Tue, 26 Jan 2021 03:57:23 -0800 (PST) Received: from anparri.mshome.net (host-95-238-70-33.retail.telecomitalia.it. [95.238.70.33]) by smtp.gmail.com with ESMTPSA id z185sm3330283wmb.0.2021.01.26.03.57.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Jan 2021 03:57:22 -0800 (PST) From: "Andrea Parri (Microsoft)" To: linux-kernel@vger.kernel.org Cc: "K . Y . Srinivasan" , Haiyang Zhang , Stephen Hemminger , Wei Liu , Michael Kelley , linux-hyperv@vger.kernel.org, Tianyu Lan , Saruhan Karademir , Juan Vazquez , "Andrea Parri (Microsoft)" , Jakub Kicinski , "David S. Miller" , netdev@vger.kernel.org Subject: [PATCH v2 4/4] hv_netvsc: Restrict configurations on isolated guests Date: Tue, 26 Jan 2021 12:56:41 +0100 Message-Id: <20210126115641.2527-5-parri.andrea@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210126115641.2527-1-parri.andrea@gmail.com> References: <20210126115641.2527-1-parri.andrea@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Restrict the NVSP protocol version(s) that will be negotiated with the host to be NVSP_PROTOCOL_VERSION_61 or greater if the guest is running isolated. Moreover, do not advertise the SR-IOV capability and ignore NVSP_MSG_4_TYPE_SEND_VF_ASSOCIATION messages in isolated guests, which are not supposed to support SR-IOV. This reduces the footprint of the code that will be exercised by Confidential VMs and hence the exposure to bugs and vulnerabilities. Signed-off-by: Andrea Parri (Microsoft) Acked-by: Jakub Kicinski Cc: "David S. Miller" Cc: Jakub Kicinski Cc: netdev@vger.kernel.org --- drivers/net/hyperv/netvsc.c | 27 ++++++++++++++++++++++++--- 1 file changed, 24 insertions(+), 3 deletions(-) diff --git a/drivers/net/hyperv/netvsc.c b/drivers/net/hyperv/netvsc.c index 1510a236aa341..afd92b4aa21fe 100644 --- a/drivers/net/hyperv/netvsc.c +++ b/drivers/net/hyperv/netvsc.c @@ -22,6 +22,7 @@ #include #include +#include #include "hyperv_net.h" #include "netvsc_trace.h" @@ -544,7 +545,10 @@ static int negotiate_nvsp_ver(struct hv_device *device, init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1; if (nvsp_ver >= NVSP_PROTOCOL_VERSION_5) { - init_packet->msg.v2_msg.send_ndis_config.capability.sriov = 1; + if (!hv_is_isolation_supported()) + init_packet->msg.v2_msg.send_ndis_config.capability.sriov = 1; + else + netdev_info(ndev, "SR-IOV not advertised by guests on the host supporting isolation\n"); /* Teaming bit is needed to receive link speed updates */ init_packet->msg.v2_msg.send_ndis_config.capability.teaming = 1; @@ -563,6 +567,13 @@ static int negotiate_nvsp_ver(struct hv_device *device, return ret; } +static bool nvsp_is_valid_version(u32 version) +{ + if (hv_is_isolation_supported()) + return version >= NVSP_PROTOCOL_VERSION_61; + return true; +} + static int netvsc_connect_vsp(struct hv_device *device, struct netvsc_device *net_device, const struct netvsc_device_info *device_info) @@ -579,12 +590,19 @@ static int netvsc_connect_vsp(struct hv_device *device, init_packet = &net_device->channel_init_pkt; /* Negotiate the latest NVSP protocol supported */ - for (i = ARRAY_SIZE(ver_list) - 1; i >= 0; i--) + for (i = ARRAY_SIZE(ver_list) - 1; i >= 0; i--) { if (negotiate_nvsp_ver(device, net_device, init_packet, ver_list[i]) == 0) { + if (!nvsp_is_valid_version(ver_list[i])) { + netdev_err(ndev, "Invalid NVSP version 0x%x (expected >= 0x%x) from the host with isolation supported\n", + ver_list[i], NVSP_PROTOCOL_VERSION_61); + ret = -EPROTO; + goto cleanup; + } net_device->nvsp_version = ver_list[i]; break; } + } if (i < 0) { ret = -EPROTO; @@ -1357,7 +1375,10 @@ static void netvsc_receive_inband(struct net_device *ndev, break; case NVSP_MSG4_TYPE_SEND_VF_ASSOCIATION: - netvsc_send_vf(ndev, nvmsg, msglen); + if (!hv_is_isolation_supported()) + netvsc_send_vf(ndev, nvmsg, msglen); + else + netdev_err(ndev, "Ignore VF_ASSOCIATION msg from the host supporting isolation\n"); break; } } -- 2.25.1