[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 03/21] xen: allow console_io hypercalls from certain DomUs
On Tue, 17 Jul 2018, Julien Grall wrote: > Hi Stefano, > > On 17/07/2018 21:05, Stefano Stabellini wrote: > > On Mon, 9 Jul 2018, Julien Grall wrote: > > > Hi, > > > > > > On 07/07/18 00:11, Stefano Stabellini wrote: > > > > Introduce an is_console option to allow certain classes of domUs to use > > > > the Xen console. Specifically, it will be used to give console access to > > > > all domUs started from Xen from information on device tree. > > > > > > > > Signed-off-by: Stefano Stabellini <stefanos@xxxxxxxxxx> > > > > CC: andrew.cooper3@xxxxxxxxxx > > > > CC: George.Dunlap@xxxxxxxxxxxxx > > > > CC: ian.jackson@xxxxxxxxxxxxx > > > > CC: jbeulich@xxxxxxxx > > > > CC: konrad.wilk@xxxxxxxxxx > > > > CC: tim@xxxxxxx > > > > CC: wei.liu2@xxxxxxxxxx > > > > CC: dgdegra@xxxxxxxxxxxxx > > > > --- > > > > Changes in v2: > > > > - introduce is_console > > > > - remove #ifdefs > > > > --- > > > > xen/include/xen/sched.h | 2 ++ > > > > xen/include/xsm/dummy.h | 2 ++ > > > > xen/xsm/flask/hooks.c | 5 ++++- > > > > 3 files changed, 8 insertions(+), 1 deletion(-) > > > > > > > > diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h > > > > index 99d2af2..d66cec0 100644 > > > > --- a/xen/include/xen/sched.h > > > > +++ b/xen/include/xen/sched.h > > > > @@ -379,6 +379,8 @@ struct domain > > > > bool auto_node_affinity; > > > > /* Is this guest fully privileged (aka dom0)? */ > > > > bool is_privileged; > > > > + /* Can this guest access the Xen console? */ > > > > + bool is_console; > > > > /* Is this a xenstore domain (not dom0)? */ > > > > bool is_xenstore; > > > > /* Domain's VCPUs are pinned 1:1 to physical CPUs? */ > > > > diff --git a/xen/include/xsm/dummy.h b/xen/include/xsm/dummy.h > > > > index ff6b2db..3888817 100644 > > > > --- a/xen/include/xsm/dummy.h > > > > +++ b/xen/include/xsm/dummy.h > > > > @@ -230,6 +230,8 @@ static XSM_INLINE int > > > > xsm_memory_stat_reservation(XSM_DEFAULT_ARG struct domain > > > > static XSM_INLINE int xsm_console_io(XSM_DEFAULT_ARG struct domain > > > > *d, int > > > > cmd) > > > > { > > > > XSM_ASSERT_ACTION(XSM_OTHER); > > > > + if ( d->is_console ) > > > > + return xsm_default_action(XSM_HOOK, d, NULL); > > > > > > I will let Daniel commenting on this change. However ... > > > > > > > #ifdef CONFIG_VERBOSE_DEBUG > > > > if ( cmd == CONSOLEIO_write ) > > > > return xsm_default_action(XSM_HOOK, d, NULL); > > > > diff --git a/xen/xsm/flask/hooks.c b/xen/xsm/flask/hooks.c > > > > index 78bc326..2551e4e 100644 > > > > --- a/xen/xsm/flask/hooks.c > > > > +++ b/xen/xsm/flask/hooks.c > > > > @@ -443,7 +443,10 @@ static int flask_console_io(struct domain *d, int > > > > cmd) > > > > return avc_unknown_permission("console_io", cmd); > > > > } > > > > - return domain_has_xen(d, perm); > > > > + if ( !d->is_console ) > > > > + return domain_has_xen(d, perm); > > > > + else > > > > + return 0; > > > > > > ... I don't think this change is correct. When a policy is used, the user > > > is > > > free to define what is the behavior. With your solution, you impose the > > > console access even if the user didn't to not give the permission. > > > > I was hoping Daniel would advise on the best way to do things here. > > > > I thought that the idea was that granting a domain "is_console" is > > equivalent to granting a domain XEN__READCONSOLE and XEN__WRITECONSOLE > > permissions. Thus, if is_console is set, we return 0 from > > flask_console_io because the permissions check succeeds. > > Well, yes and no. That's equivalent when you use the dummy policy. When you > have a flask policy you want to give the control to the user. > > If you look at the code there are no such as d->is_privilege in that function. > This means that the user define the policy for the hardware domain. Why would > be d->is_console different here? You are saying that in hooks.c the check should remain exactly as is: return domain_has_xen(d, perm); and d->is_console should not be tested? In that case, do you know if I need to do anything special with XEN__READCONSOLE and XEN__WRITECONSOLE permissions for the initial boot domains (such as adding those permissions as the same time d->is_console is set)? _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |