From patchwork Thu Apr 9 15:09:37 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Julien Grall X-Patchwork-Id: 46974 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-wg0-f71.google.com (mail-wg0-f71.google.com [74.125.82.71]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id D6BD721416 for ; Thu, 9 Apr 2015 15:22:42 +0000 (UTC) Received: by wgtl5 with SMTP id l5sf13046151wgt.1 for ; Thu, 09 Apr 2015 08:22:42 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:date:message-id:in-reply-to :references:mime-version:cc:subject:precedence:list-id :list-unsubscribe:list-post:list-help:list-subscribe:content-type :content-transfer-encoding:sender:errors-to:x-original-sender :x-original-authentication-results:mailing-list:list-archive; bh=8MtPlcN7t5TgKZVDCI1slGFnuZPtL/ilSHpXwdWkY/Q=; b=H04jJqmidOy0nM1MD9ArVr02M7WGT8+/2flh8sradmCsmYtb7tkiaoAxuqU2mErJgM t559j4HRZj31PKXM6nI4xpSWNOb+Eg4W9PTl/PvGsxKr8WLlP2zc8a3r1xuTzcFTSfjJ EjXsW0jDTQ+aQGiHFKj2VVhVu5Gunh+7d/qfp/+POSyoly54kYMMWxJzmru0tZY3KKh7 elBlOtp4x0zUmDdzL8lBcwGujoMjPJha29ckpGbeOHnqCI93XYNaFpXWCuJhwLQVSeIo 1+9CR7YQSimGADju10XAEicUyDHC4IR0ildK12ntVPgAdPWOSpI3H03YCkd7w0gAhoeh w5Jg== X-Gm-Message-State: ALoCoQkDw/fYflmTiwYX/IptOXniWOhq+AtLxQQmlNgNVj7A4maudBtlIrj9/6lAGmejrv8u65uD X-Received: by 10.112.118.162 with SMTP id kn2mr6191320lbb.22.1428592962200; Thu, 09 Apr 2015 08:22:42 -0700 (PDT) X-BeenThere: patchwork-forward@linaro.org Received: by 10.153.6.35 with SMTP id cr3ls281932lad.47.gmail; Thu, 09 Apr 2015 08:22:42 -0700 (PDT) X-Received: by 10.152.27.35 with SMTP id q3mr4842783lag.24.1428592962089; Thu, 09 Apr 2015 08:22:42 -0700 (PDT) Received: from mail-la0-f46.google.com (mail-la0-f46.google.com. [209.85.215.46]) by mx.google.com with ESMTPS id pp6si11681143lbb.143.2015.04.09.08.22.42 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 09 Apr 2015 08:22:42 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.215.46 as permitted sender) client-ip=209.85.215.46; Received: by lagv1 with SMTP id v1so92186661lag.3 for ; Thu, 09 Apr 2015 08:22:42 -0700 (PDT) X-Received: by 10.152.163.35 with SMTP id yf3mr4941530lab.86.1428592961973; Thu, 09 Apr 2015 08:22:41 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.112.67.65 with SMTP id l1csp537799lbt; Thu, 9 Apr 2015 08:22:40 -0700 (PDT) X-Received: by 10.52.138.206 with SMTP id qs14mr15624929vdb.38.1428592950498; Thu, 09 Apr 2015 08:22:30 -0700 (PDT) Received: from lists.xen.org (lists.xen.org. [50.57.142.19]) by mx.google.com with ESMTPS id f4si13310020vdf.7.2015.04.09.08.22.29 (version=TLSv1 cipher=RC4-SHA bits=128/128); Thu, 09 Apr 2015 08:22:30 -0700 (PDT) Received-SPF: none (google.com: xen-devel-bounces@lists.xen.org does not designate permitted sender hosts) client-ip=50.57.142.19; Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YgEH1-0003Ov-1n; Thu, 09 Apr 2015 15:21:43 +0000 Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YgEGz-0003NL-S2 for xen-devel@lists.xenproject.org; Thu, 09 Apr 2015 15:21:42 +0000 Received: from [193.109.254.147] by server-5.bemta-14.messagelabs.com id 35/16-05046-50996255; Thu, 09 Apr 2015 15:21:41 +0000 X-Env-Sender: julien.grall@citrix.com X-Msg-Ref: server-7.tower-27.messagelabs.com!1428592892!16715287!4 X-Originating-IP: [66.165.176.63] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n, received_headers: No Received headers X-StarScan-Received: X-StarScan-Version: 6.13.6; banners=-,-,- X-VirusChecked: Checked Received: (qmail 8371 invoked from network); 9 Apr 2015 15:21:40 -0000 Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63) by server-7.tower-27.messagelabs.com with RC4-SHA encrypted SMTP; 9 Apr 2015 15:21:40 -0000 X-IronPort-AV: E=Sophos;i="5.11,550,1422921600"; d="scan'208";a="253569372" From: Julien Grall To: Date: Thu, 9 Apr 2015 16:09:37 +0100 Message-ID: <1428592185-18581-12-git-send-email-julien.grall@citrix.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1428592185-18581-1-git-send-email-julien.grall@citrix.com> References: <1428592185-18581-1-git-send-email-julien.grall@citrix.com> MIME-Version: 1.0 X-DLP: MIA1 Cc: stefano.stabellini@citrix.com, Daniel De Graaf , Julien Grall , tim@xen.org, ian.campbell@citrix.com Subject: [Xen-devel] [PATCH v5 p2 11/19] xen/xsm: Add helpers to check permission for device tree passthrough X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: List-Unsubscribe: , List-Post: , List-Help: , List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: patch@linaro.org X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.215.46 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 List-Archive: From: Julien Grall This is a follow-up of commit 525ee49 "xsm: add device tree labeling support" which add support for device tree labelling in flask. Those helpers will be use latter when non-pci passthrough (i.e device tree) will be added. Signed-off-by: Julien Grall Acked-by: Daniel De Graaf Acked-by: Ian Campbell --- Changes in v5: - Add Ian and Daniel's ack Changes in v4: - Patch added --- xen/include/xsm/dummy.h | 23 +++++++++++++ xen/include/xsm/xsm.h | 27 +++++++++++++++ xen/xsm/dummy.c | 6 ++++ xen/xsm/flask/avc.c | 3 ++ xen/xsm/flask/hooks.c | 69 ++++++++++++++++++++++++++++++++++++- xen/xsm/flask/include/avc.h | 2 ++ xen/xsm/flask/policy/access_vectors | 2 +- 7 files changed, 130 insertions(+), 2 deletions(-) diff --git a/xen/include/xsm/dummy.h b/xen/include/xsm/dummy.h index c36e05f..05641f9 100644 --- a/xen/include/xsm/dummy.h +++ b/xen/include/xsm/dummy.h @@ -350,6 +350,29 @@ static XSM_INLINE int xsm_deassign_device(XSM_DEFAULT_ARG struct domain *d, uint #endif /* HAS_PASSTHROUGH && HAS_PCI */ +#if defined(HAS_PASSTHROUGH) && defined(HAS_DEVICE_TREE) +static XSM_INLINE int xsm_test_assign_dtdevice(XSM_DEFAULT_ARG const char *dtpath) +{ + XSM_ASSERT_ACTION(XSM_HOOK); + return xsm_default_action(action, current->domain, NULL); +} + +static XSM_INLINE int xsm_assign_dtdevice(XSM_DEFAULT_ARG struct domain *d, + const char *dtpath) +{ + XSM_ASSERT_ACTION(XSM_HOOK); + return xsm_default_action(action, current->domain, d); +} + +static XSM_INLINE int xsm_deassign_dtdevice(XSM_DEFAULT_ARG struct domain *d, + const char *dtpath) +{ + XSM_ASSERT_ACTION(XSM_HOOK); + return xsm_default_action(action, current->domain, d); +} + +#endif /* HAS_PASSTHROUGH && HAS_DEVICE_TREE */ + static XSM_INLINE int xsm_resource_plug_core(XSM_DEFAULT_VOID) { XSM_ASSERT_ACTION(XSM_HOOK); diff --git a/xen/include/xsm/xsm.h b/xen/include/xsm/xsm.h index b7446be..c830b47 100644 --- a/xen/include/xsm/xsm.h +++ b/xen/include/xsm/xsm.h @@ -121,6 +121,12 @@ struct xsm_operations { int (*deassign_device) (struct domain *d, uint32_t machine_bdf); #endif +#if defined(HAS_PASSTHROUGH) && defined(HAS_DEVICE_TREE) + int (*test_assign_dtdevice) (const char *dtpath); + int (*assign_dtdevice) (struct domain *d, const char *dtpath); + int (*deassign_dtdevice) (struct domain *d, const char *dtpath); +#endif + int (*resource_plug_core) (void); int (*resource_unplug_core) (void); int (*resource_plug_pci) (uint32_t machine_bdf); @@ -473,6 +479,27 @@ static inline int xsm_deassign_device(xsm_default_t def, struct domain *d, uint3 } #endif /* HAS_PASSTHROUGH && HAS_PCI) */ +#if defined(HAS_PASSTHROUGH) && defined(HAS_DEVICE_TREE) +static inline int xsm_assign_dtdevice(xsm_default_t def, struct domain *d, + const char *dtpath) +{ + return xsm_ops->assign_dtdevice(d, dtpath); +} + +static inline int xsm_test_assign_dtdevice(xsm_default_t def, + const char *dtpath) +{ + return xsm_ops->test_assign_dtdevice(dtpath); +} + +static inline int xsm_deassign_dtdevice(xsm_default_t def, struct domain *d, + const char *dtpath) +{ + return xsm_ops->deassign_dtdevice(d, dtpath); +} + +#endif /* HAS_PASSTHROUGH && HAS_DEVICE_TREE */ + static inline int xsm_resource_plug_pci (xsm_default_t def, uint32_t machine_bdf) { return xsm_ops->resource_plug_pci(machine_bdf); diff --git a/xen/xsm/dummy.c b/xen/xsm/dummy.c index a3b8aab..ef856dc 100644 --- a/xen/xsm/dummy.c +++ b/xen/xsm/dummy.c @@ -96,6 +96,12 @@ void xsm_fixup_ops (struct xsm_operations *ops) set_to_dummy_if_null(ops, deassign_device); #endif +#if defined(HAS_PASSTHROUGH) && defined(HAS_DEVICE_TREE) + set_to_dummy_if_null(ops, test_assign_dtdevice); + set_to_dummy_if_null(ops, assign_dtdevice); + set_to_dummy_if_null(ops, deassign_dtdevice); +#endif + set_to_dummy_if_null(ops, resource_plug_core); set_to_dummy_if_null(ops, resource_unplug_core); set_to_dummy_if_null(ops, resource_plug_pci); diff --git a/xen/xsm/flask/avc.c b/xen/xsm/flask/avc.c index b1a4f8a..31bc702 100644 --- a/xen/xsm/flask/avc.c +++ b/xen/xsm/flask/avc.c @@ -600,6 +600,9 @@ void avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, case AVC_AUDIT_DATA_MEMORY: avc_printk(&buf, "pte=%#lx mfn=%#lx ", a->memory.pte, a->memory.mfn); break; + case AVC_AUDIT_DATA_DTDEV: + avc_printk(&buf, "dtdevice=%s ", a->dtdev); + break; } avc_dump_query(&buf, ssid, tsid, tclass); diff --git a/xen/xsm/flask/hooks.c b/xen/xsm/flask/hooks.c index 688ba2a..074eb81 100644 --- a/xen/xsm/flask/hooks.c +++ b/xen/xsm/flask/hooks.c @@ -589,7 +589,12 @@ static int flask_domctl(struct domain *d, int cmd) case XEN_DOMCTL_shadow_op: case XEN_DOMCTL_ioport_permission: case XEN_DOMCTL_ioport_mapping: - /* These have individual XSM hooks (drivers/passthrough/iommu.c) */ +#endif +#ifdef HAS_PASSTHROUGH + /* + * These have individual XSM hooks + * (drivers/passthrough/{pci,device_tree.c) + */ case XEN_DOMCTL_get_device_group: case XEN_DOMCTL_test_assign_device: case XEN_DOMCTL_assign_device: @@ -1231,6 +1236,62 @@ static int flask_deassign_device(struct domain *d, uint32_t machine_bdf) } #endif /* HAS_PASSTHROUGH && HAS_PCI */ +#if defined(HAS_PASSTHROUGH) && defined(HAS_DEVICE_TREE) +static int flask_test_assign_dtdevice(const char *dtpath) +{ + u32 rsid; + int rc = -EPERM; + + rc = security_devicetree_sid(dtpath, &rsid); + if ( rc ) + return rc; + + return avc_current_has_perm(rsid, SECCLASS_RESOURCE, RESOURCE__STAT_DEVICE, + NULL); +} + +static int flask_assign_dtdevice(struct domain *d, const char *dtpath) +{ + u32 dsid, rsid; + int rc = -EPERM; + struct avc_audit_data ad; + + rc = current_has_perm(d, SECCLASS_RESOURCE, RESOURCE__ADD); + if ( rc ) + return rc; + + rc = security_devicetree_sid(dtpath, &rsid); + if ( rc ) + return rc; + + AVC_AUDIT_DATA_INIT(&ad, DTDEV); + ad.dtdev = dtpath; + rc = avc_current_has_perm(rsid, SECCLASS_RESOURCE, RESOURCE__ADD_DEVICE, &ad); + if ( rc ) + return rc; + + dsid = domain_sid(d); + return avc_has_perm(dsid, rsid, SECCLASS_RESOURCE, RESOURCE__USE, &ad); +} + +static int flask_deassign_dtdevice(struct domain *d, const char *dtpath) +{ + u32 rsid; + int rc = -EPERM; + + rc = current_has_perm(d, SECCLASS_RESOURCE, RESOURCE__REMOVE); + if ( rc ) + return rc; + + rc = security_devicetree_sid(dtpath, &rsid); + if ( rc ) + return rc; + + return avc_current_has_perm(rsid, SECCLASS_RESOURCE, RESOURCE__REMOVE_DEVICE, + NULL); +} +#endif /* HAS_PASSTHROUGH && HAS_DEVICE_TREE */ + #ifdef HAS_MEM_ACCESS static int flask_vm_event_control(struct domain *d, int mode, int op) { @@ -1598,6 +1659,12 @@ static struct xsm_operations flask_ops = { .deassign_device = flask_deassign_device, #endif +#if defined(HAS_PASSTHROUGH) && defined(HAS_DEVICE_TREE) + .test_assign_dtdevice = flask_test_assign_dtdevice, + .assign_dtdevice = flask_assign_dtdevice, + .deassign_dtdevice = flask_deassign_dtdevice, +#endif + #ifdef HAS_MEM_ACCESS .vm_event_control = flask_vm_event_control, .vm_event_op = flask_vm_event_op, diff --git a/xen/xsm/flask/include/avc.h b/xen/xsm/flask/include/avc.h index c7a99fc..4283562 100644 --- a/xen/xsm/flask/include/avc.h +++ b/xen/xsm/flask/include/avc.h @@ -39,6 +39,7 @@ struct avc_audit_data { #define AVC_AUDIT_DATA_IRQ 2 #define AVC_AUDIT_DATA_RANGE 3 #define AVC_AUDIT_DATA_MEMORY 4 +#define AVC_AUDIT_DATA_DTDEV 5 struct domain *sdom; struct domain *tdom; union { @@ -52,6 +53,7 @@ struct avc_audit_data { unsigned long pte; unsigned long mfn; } memory; + const char *dtdev; }; }; diff --git a/xen/xsm/flask/policy/access_vectors b/xen/xsm/flask/policy/access_vectors index 128250e..5a760c5 100644 --- a/xen/xsm/flask/policy/access_vectors +++ b/xen/xsm/flask/policy/access_vectors @@ -416,7 +416,7 @@ class resource remove_iomem # XEN_DOMCTL_get_device_group, XEN_DOMCTL_test_assign_device: # source = domain making the hypercall -# target = PCI device being queried +# target = device being queried stat_device # XEN_DOMCTL_assign_device add_device