lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <PH0PR21MB302520562EED77A587340D1DD7EE9@PH0PR21MB3025.namprd21.prod.outlook.com> Date: Fri, 15 Apr 2022 03:33:51 +0000 From: "Michael Kelley (LINUX)" <mikelley@...rosoft.com> To: "Andrea Parri (Microsoft)" <parri.andrea@...il.com>, KY Srinivasan <kys@...rosoft.com>, Haiyang Zhang <haiyangz@...rosoft.com>, Stephen Hemminger <sthemmin@...rosoft.com>, Wei Liu <wei.liu@...nel.org>, Dexuan Cui <decui@...rosoft.com>, Stefano Garzarella <sgarzare@...hat.com>, David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com> CC: "linux-hyperv@...r.kernel.org" <linux-hyperv@...r.kernel.org>, "virtualization@...ts.linux-foundation.org" <virtualization@...ts.linux-foundation.org>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: RE: [RFC PATCH 5/6] Drivers: hv: vmbus: Accept hv_sock offers in isolated guests From: Andrea Parri (Microsoft) <parri.andrea@...il.com> Sent: Wednesday, April 13, 2022 1:48 PM > > So that isolated guests can communicate with the host via hv_sock > channels. > > Signed-off-by: Andrea Parri (Microsoft) <parri.andrea@...il.com> > --- > drivers/hv/channel_mgmt.c | 9 +++++++-- > include/linux/hyperv.h | 8 ++++++-- > 2 files changed, 13 insertions(+), 4 deletions(-) > > diff --git a/drivers/hv/channel_mgmt.c b/drivers/hv/channel_mgmt.c > index 67be81208a2d9..83d7ab90b7305 100644 > --- a/drivers/hv/channel_mgmt.c > +++ b/drivers/hv/channel_mgmt.c > @@ -976,17 +976,22 @@ find_primary_channel_by_offer(const struct > vmbus_channel_offer_channel *offer) > return channel; > } > > -static bool vmbus_is_valid_device(const guid_t *guid) > +static bool vmbus_is_valid_offer(const struct vmbus_channel_offer_channel *offer) > { > + const guid_t *guid = &offer->offer.if_type; > u16 i; > > if (!hv_is_isolation_supported()) > return true; > > + if (is_hvsock_offer(offer)) > + return true; > + > for (i = 0; i < ARRAY_SIZE(vmbus_devs); i++) { > if (guid_equal(guid, &vmbus_devs[i].guid)) > return vmbus_devs[i].allowed_in_isolated; > } > + Spurious newline added? > return false; > } > > @@ -1004,7 +1009,7 @@ static void vmbus_onoffer(struct > vmbus_channel_message_header *hdr) > > trace_vmbus_onoffer(offer); > > - if (!vmbus_is_valid_device(&offer->offer.if_type)) { > + if (!vmbus_is_valid_offer(offer)) { > pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n", > offer->child_relid); > atomic_dec(&vmbus_connection.offer_in_progress); > diff --git a/include/linux/hyperv.h b/include/linux/hyperv.h > index 55478a6810b60..1112c5cf894e6 100644 > --- a/include/linux/hyperv.h > +++ b/include/linux/hyperv.h > @@ -1044,10 +1044,14 @@ struct vmbus_channel { > u64 vmbus_next_request_id(struct vmbus_channel *channel, u64 rqst_addr); > u64 vmbus_request_addr(struct vmbus_channel *channel, u64 trans_id); > > +static inline bool is_hvsock_offer(const struct vmbus_channel_offer_channel *o) > +{ > + return !!(o->offer.chn_flags & VMBUS_CHANNEL_TLNPI_PROVIDER_OFFER); > +} > + > static inline bool is_hvsock_channel(const struct vmbus_channel *c) > { > - return !!(c->offermsg.offer.chn_flags & > - VMBUS_CHANNEL_TLNPI_PROVIDER_OFFER); > + return is_hvsock_offer(&c->offermsg); > } > > static inline bool is_sub_channel(const struct vmbus_channel *c) > -- > 2.25.1
Powered by blists - more mailing lists