[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] XSM denials with 4.7.0 RC1
On Wed, May 04, 2016 at 03:05:38PM +0100, Wei Liu wrote: > CC Konrad and Ross > > On Wed, May 04, 2016 at 08:52:24AM -0500, Doug Goldstein wrote: > > Hi all, > > > > Sometime after d4cd5a205973171475b8c63bc250c2803e0f51fa, I get the > > following denials for any domU that attempts to run "xl". In my > > situation my domU needs to run "xl devd" because its a driver domain. > > > > (XEN) avc: denied { xen_extraversion } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_extraversion } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_compile_info } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_capabilities } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_changeset } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_pagesize } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_commandline } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > (XEN) avc: denied { xen_build_id } for domid=1 > > scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t > > tclass=version > > > > I'm guessing a changed happened to xl so that it queries the version > > info everytime it is run. > > > > I think the root cause is that we have now altered xen_version hypercall > for xsplice. > > We might need to update the hook, the default policy (assuming that's > what you use) or both. The policy: # For normal guests all possible except XENVER_commandline. allow domain_type xen_t:version { xen_extraversion xen_compile_info xen_capabilities xen_changeset xen_pagesize xen_guest_handle }; So not sure why you are seeing those. Did you rebuild your policy against 4.7.0-1rc? The xen_build_id and xen_commandline should definitly error out per: a2fc8d514df2b38c310d4f4432fe06520b0769ed Author: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Date: Fri Mar 11 21:40:43 2016 -0500 xsm/xen_version: Add XSM for most of xen_version hypercall The subop for XENVER_commandline is now a priviliged operation. To not break guests we still return an string - but it is just '<denied>\0'. And the XSM checks would trigger for XENVER_commandline - it just that instead of -EPERM being returned we return '<denied>\0'. Is that not the case? _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |