lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 20 Jan 2021 17:26:44 -0800 From: Jakub Kicinski <kuba@...nel.org> To: "Andrea Parri (Microsoft)" <parri.andrea@...il.com> Cc: linux-kernel@...r.kernel.org, "K . Y . Srinivasan" <kys@...rosoft.com>, Haiyang Zhang <haiyangz@...rosoft.com>, Stephen Hemminger <sthemmin@...rosoft.com>, Wei Liu <wei.liu@...nel.org>, Michael Kelley <mikelley@...rosoft.com>, Tianyu Lan <Tianyu.Lan@...rosoft.com>, Saruhan Karademir <skarade@...rosoft.com>, Juan Vazquez <juvazq@...rosoft.com>, linux-hyperv@...r.kernel.org, "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org Subject: Re: [PATCH 4/4] hv_netvsc: Restrict configurations on isolated guests On Tue, 19 Jan 2021 18:58:41 +0100 Andrea Parri (Microsoft) wrote: > Restrict the NVSP protocol version(s) that will be negotiated with the > host to be NVSP_PROTOCOL_VERSION_61 or greater if the guest is running > isolated. Moreover, do not advertise the SR-IOV capability and ignore > NVSP_MSG_4_TYPE_SEND_VF_ASSOCIATION messages in isolated guests, which > are not supposed to support SR-IOV. This reduces the footprint of the > code that will be exercised by Confidential VMs and hence the exposure > to bugs and vulnerabilities. > > Signed-off-by: Andrea Parri (Microsoft) <parri.andrea@...il.com> > Cc: "David S. Miller" <davem@...emloft.net> > Cc: Jakub Kicinski <kuba@...nel.org> > Cc: netdev@...r.kernel.org Nothing exciting here from networking perspective, so: Acked-by: Jakub Kicinski <kuba@...nel.org>
Powered by blists - more mailing lists