summaryrefslogtreecommitdiff
path: root/tools/flask
diff options
context:
space:
mode:
authorChristopher Clark <christopher.w.clark@gmail.com>2019-02-06 09:55:00 +0100
committerJan Beulich <jbeulich@suse.com>2019-02-07 14:25:39 +0100
commit23d160faeb708092895e43fd6e5c8701f42e0670 (patch)
tree8ec506e0d15d690fd85da4e38159dfee526b056a /tools/flask
parent64b9c3422b81752036b4222e1f7229632f77315c (diff)
downloadxen-23d160faeb708092895e43fd6e5c8701f42e0670.tar.gz
xsm, argo: XSM control for argo register
XSM controls for argo ring registration with two distinct cases, where the ring being registered is: 1) Single source: registering a ring for communication to receive messages from a specified single other domain. Default policy: allow. 2) Any source: registering a ring for communication to receive messages from any, or all, other domains (ie. wildcard). Default policy: deny, with runtime policy configuration via bootparam. This commit modifies the signature of core XSM hook functions in order to apply 'const' to arguments, needed in order for 'const' to be accepted in signature of functions that invoke them. Signed-off-by: Christopher Clark <christopher.clark6@baesystems.com> Acked-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Tested-by: Chris Patterson <pattersonc@ainfosec.com> Release-acked-by: Juergen Gross <jgross@suse.com>
Diffstat (limited to 'tools/flask')
-rw-r--r--tools/flask/policy/modules/guest_features.te6
1 files changed, 6 insertions, 0 deletions
diff --git a/tools/flask/policy/modules/guest_features.te b/tools/flask/policy/modules/guest_features.te
index 9ac9780ded..d00769e1d2 100644
--- a/tools/flask/policy/modules/guest_features.te
+++ b/tools/flask/policy/modules/guest_features.te
@@ -5,6 +5,12 @@ allow domain_type xen_t:xen tmem_op;
# pmu_ctrl is for)
allow domain_type xen_t:xen2 pmu_use;
+# Allow all domains:
+# to register single-sender (unicast) rings to partner with any domain; and
+# to register any-sender (wildcard) rings that can be sent to by any domain.
+allow domain_type xen_t:argo { register_any_source };
+allow domain_type domain_type:argo { register_single_source };
+
# Allow guest console output to the serial console. This is used by PV Linux
# and stub domains for early boot output, so don't audit even when we deny it.
# Without XSM, this is enabled only if the Xen was compiled in debug mode.