thebeanogamer / rpms / qemu-kvm

Forked from rpms/qemu-kvm 5 months ago
Clone

Blame SOURCES/kvm-virtio-fix-feature-negotiation-for-ACCESS_PLATFORM.patch

62547e
From 56e2aef97e750ffdc572dcecbfc31314728d37a9 Mon Sep 17 00:00:00 2001
62547e
From: Halil Pasic <pasic@linux.ibm.com>
62547e
Date: Mon, 7 Mar 2022 12:29:39 +0100
62547e
Subject: [PATCH 2/2] virtio: fix feature negotiation for ACCESS_PLATFORM
62547e
MIME-Version: 1.0
62547e
Content-Type: text/plain; charset=UTF-8
62547e
Content-Transfer-Encoding: 8bit
62547e
62547e
RH-Author: Dr. David Alan Gilbert <dgilbert@redhat.com>
62547e
RH-MergeRequest: 224: virtiofs on s390 secure execution
62547e
RH-Bugzilla: 2116302
62547e
RH-Acked-by: Thomas Huth <thuth@redhat.com>
62547e
RH-Acked-by: Cornelia Huck <cohuck@redhat.com>
62547e
RH-Acked-by: Cédric Le Goater <None>
62547e
RH-Commit: [2/2] 264d3bdbbde985f16ed6f5a1786547c25fb8cc04
62547e
62547e
Unlike most virtio features ACCESS_PLATFORM is considered mandatory by
62547e
QEMU, i.e. the driver must accept it if offered by the device. The
62547e
virtio specification says that the driver SHOULD accept the
62547e
ACCESS_PLATFORM feature if offered, and that the device MAY fail to
62547e
operate if ACCESS_PLATFORM was offered but not negotiated.
62547e
62547e
While a SHOULD ain't exactly a MUST, we are certainly allowed to fail
62547e
the device when the driver fences ACCESS_PLATFORM. With commit
62547e
2943b53f68 ("virtio: force VIRTIO_F_IOMMU_PLATFORM") we already made the
62547e
decision to do so whenever the get_dma_as() callback is implemented (by
62547e
the bus), which in practice means for the entirety of virtio-pci.
62547e
62547e
That means, if the device needs to translate I/O addresses, then
62547e
ACCESS_PLATFORM is mandatory. The aforementioned commit tells us in the
62547e
commit message that this is for security reasons. More precisely if we
62547e
were to allow a less then trusted driver (e.g. an user-space driver, or
62547e
a nested guest) to make the device bypass the IOMMU by not negotiating
62547e
ACCESS_PLATFORM, then the guest kernel would have no ability to
62547e
control/police (by programming the IOMMU) what pieces of guest memory
62547e
the driver may manipulate using the device. Which would break security
62547e
assumptions within the guest.
62547e
62547e
If ACCESS_PLATFORM is offered not because we want the device to utilize
62547e
an IOMMU and do address translation, but because the device does not
62547e
have access to the entire guest RAM, and needs the driver to grant
62547e
access to the bits it needs access to (e.g. confidential guest support),
62547e
we still require the guest to have the corresponding logic and to accept
62547e
ACCESS_PLATFORM. If the driver does not accept ACCESS_PLATFORM, then
62547e
things are bound to go wrong, and we may see failures much less graceful
62547e
than failing the device because the driver didn't negotiate
62547e
ACCESS_PLATFORM.
62547e
62547e
So let us make ACCESS_PLATFORM mandatory for the driver regardless
62547e
of whether the get_dma_as() callback is implemented or not.
62547e
62547e
Signed-off-by: Halil Pasic <pasic@linux.ibm.com>
62547e
Fixes: 2943b53f68 ("virtio: force VIRTIO_F_IOMMU_PLATFORM")
62547e
62547e
Message-Id: <20220307112939.2780117-1-pasic@linux.ibm.com>
62547e
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
62547e
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
62547e
Reviewed-by: Cornelia Huck <cohuck@redhat.com>
62547e
(cherry picked from commit 06134e2bc35dc21543d4cbcf31f858c03d383442)
62547e
---
62547e
 hw/virtio/virtio-bus.c | 22 ++++++++++++++--------
62547e
 1 file changed, 14 insertions(+), 8 deletions(-)
62547e
62547e
diff --git a/hw/virtio/virtio-bus.c b/hw/virtio/virtio-bus.c
62547e
index 0f69d1c742..d7ec023adf 100644
62547e
--- a/hw/virtio/virtio-bus.c
62547e
+++ b/hw/virtio/virtio-bus.c
62547e
@@ -78,17 +78,23 @@ void virtio_bus_device_plugged(VirtIODevice *vdev, Error **errp)
62547e
         return;
62547e
     }
62547e
 
62547e
-    vdev_has_iommu = virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM);
62547e
-    if (klass->get_dma_as != NULL && has_iommu) {
62547e
+    vdev->dma_as = &address_space_memory;
62547e
+    if (has_iommu) {
62547e
+        vdev_has_iommu = virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM);
62547e
+        /*
62547e
+         * Present IOMMU_PLATFORM to the driver iff iommu_plattform=on and
62547e
+         * device operational. If the driver does not accept IOMMU_PLATFORM
62547e
+         * we fail the device.
62547e
+         */
62547e
         virtio_add_feature(&vdev->host_features, VIRTIO_F_IOMMU_PLATFORM);
62547e
-        vdev->dma_as = klass->get_dma_as(qbus->parent);
62547e
-        if (!vdev_has_iommu && vdev->dma_as != &address_space_memory) {
62547e
-            error_setg(errp,
62547e
+        if (klass->get_dma_as) {
62547e
+            vdev->dma_as = klass->get_dma_as(qbus->parent);
62547e
+            if (!vdev_has_iommu && vdev->dma_as != &address_space_memory) {
62547e
+                error_setg(errp,
62547e
                        "iommu_platform=true is not supported by the device");
62547e
-            return;
62547e
+                return;
62547e
+            }
62547e
         }
62547e
-    } else {
62547e
-        vdev->dma_as = &address_space_memory;
62547e
     }
62547e
 }
62547e
 
62547e
-- 
62547e
2.37.3
62547e