[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 02/10] xsm: Add security label to IRQ debug output
Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> --- xen/arch/x86/irq.c | 8 ++++++++ xen/include/xsm/xsm.h | 7 +++++++ xen/xsm/dummy.c | 7 ++++++- xen/xsm/flask/hooks.c | 16 ++++++++++++++++ 4 files changed, 37 insertions(+), 1 deletions(-) diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c index 058f89d..6d17ec0 100644 --- a/xen/arch/x86/irq.c +++ b/xen/arch/x86/irq.c @@ -2001,6 +2001,7 @@ static void dump_irqs(unsigned char key) struct domain *d; const struct pirq *info; unsigned long flags; + char *ssid; printk("Guest interrupt information:\n"); @@ -2012,6 +2013,8 @@ static void dump_irqs(unsigned char key) if ( !irq_desc_initialized(desc) || desc->handler == &no_irq_type ) continue; + ssid = xsm_show_irq_sid(irq); + spin_lock_irqsave(&desc->lock, flags); cpumask_scnprintf(keyhandler_scratch, sizeof(keyhandler_scratch), @@ -2021,6 +2024,9 @@ static void dump_irqs(unsigned char key) irq, keyhandler_scratch, desc->arch.vector, desc->handler->typename, desc->status); + if ( ssid ) + printk("Z=%-25s ", ssid); + if ( !(desc->status & IRQ_GUEST) ) printk("mapped, unbound\n"); else @@ -2053,6 +2059,8 @@ static void dump_irqs(unsigned char key) } spin_unlock_irqrestore(&desc->lock, flags); + + xfree(ssid); } dump_ioapic_irq_info(); diff --git a/xen/include/xsm/xsm.h b/xen/include/xsm/xsm.h index 92204b3..6e3a8f0 100644 --- a/xen/include/xsm/xsm.h +++ b/xen/include/xsm/xsm.h @@ -113,6 +113,8 @@ struct xsm_operations { int (*kexec) (void); int (*schedop_shutdown) (struct domain *d1, struct domain *d2); + + char *(*show_irq_sid) (int irq); int (*irq_permission) (struct domain *d, int pirq, uint8_t allow); int (*iomem_permission) (struct domain *d, uint64_t s, uint64_t e, uint8_t allow); int (*pci_config_permission) (struct domain *d, uint32_t machine_bdf, uint16_t start, uint16_t end, uint8_t access); @@ -477,6 +479,11 @@ static inline int xsm_schedop_shutdown (struct domain *d1, struct domain *d2) return xsm_call(schedop_shutdown(d1, d2)); } +static inline char *xsm_show_irq_sid (int irq) +{ + return xsm_call(show_irq_sid(irq)); +} + static inline int xsm_irq_permission (struct domain *d, int pirq, uint8_t allow) { return xsm_call(irq_permission(d, pirq, allow)); diff --git a/xen/xsm/dummy.c b/xen/xsm/dummy.c index fca9d7b..83e5dba 100644 --- a/xen/xsm/dummy.c +++ b/xen/xsm/dummy.c @@ -365,12 +365,16 @@ static int dummy_sched_op (void) return 0; } - static long dummy___do_xsm_op(XEN_GUEST_HANDLE(xsm_op_t) op) { return -ENOSYS; } +static char *dummy_show_irq_sid (int irq) +{ + return NULL; +} + static int dummy_irq_permission (struct domain *d, int pirq, uint8_t allow) { return 0; @@ -655,6 +659,7 @@ void xsm_fixup_ops (struct xsm_operations *ops) set_to_dummy_if_null(ops, kexec); set_to_dummy_if_null(ops, schedop_shutdown); + set_to_dummy_if_null(ops, show_irq_sid); set_to_dummy_if_null(ops, irq_permission); set_to_dummy_if_null(ops, iomem_permission); set_to_dummy_if_null(ops, pci_config_permission); diff --git a/xen/xsm/flask/hooks.c b/xen/xsm/flask/hooks.c index d207b1d..d79405b 100644 --- a/xen/xsm/flask/hooks.c +++ b/xen/xsm/flask/hooks.c @@ -712,6 +712,20 @@ static inline u32 resource_to_perm(uint8_t access) return RESOURCE__REMOVE; } +static char *flask_show_irq_sid (int irq) +{ + u32 sid, ctx_len; + char *ctx; + int rc = security_irq_sid(irq, &sid); + if ( rc ) + return NULL; + + if (security_sid_to_context(sid, &ctx, &ctx_len)) + return NULL; + + return ctx; +} + static int flask_irq_permission (struct domain *d, int pirq, uint8_t access) { u32 perm; @@ -1543,6 +1557,8 @@ static struct xsm_operations flask_ops = { .kexec = flask_kexec, .schedop_shutdown = flask_schedop_shutdown, + .show_irq_sid = flask_show_irq_sid, + .irq_permission = flask_irq_permission, .iomem_permission = flask_iomem_permission, .pci_config_permission = flask_pci_config_permission, -- 1.7.7.6 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |