xen/evtchn: add IOCTL_EVTCHN_RESTRICT
IOCTL_EVTCHN_RESTRICT limits the file descriptor to being able to bind to interdomain event channels from a specific domain. Event channels that are already bound continue to work for sending and receiving notifications. This is useful as part of deprivileging a user space PV backend or device model (QEMU). e.g., Once the device model as bound to the ioreq server event channels it can restrict the file handle so an exploited DM cannot use it to create or bind to arbitrary event channels. Signed-off-by: David Vrabel <david.vrabel@citrix.com> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
This commit is contained in:
@@ -85,4 +85,19 @@ struct ioctl_evtchn_notify {
|
||||
#define IOCTL_EVTCHN_RESET \
|
||||
_IOC(_IOC_NONE, 'E', 5, 0)
|
||||
|
||||
/*
|
||||
* Restrict this file descriptor so that it can only be used to bind
|
||||
* new interdomain events from one domain.
|
||||
*
|
||||
* Once a file descriptor has been restricted it cannot be
|
||||
* de-restricted, and must be closed and re-opened. Event channels
|
||||
* which were bound before restricting remain bound afterwards, and
|
||||
* can be notified as usual.
|
||||
*/
|
||||
#define IOCTL_EVTCHN_RESTRICT_DOMID \
|
||||
_IOC(_IOC_NONE, 'E', 6, sizeof(struct ioctl_evtchn_restrict_domid))
|
||||
struct ioctl_evtchn_restrict_domid {
|
||||
domid_t domid;
|
||||
};
|
||||
|
||||
#endif /* __LINUX_PUBLIC_EVTCHN_H__ */
|
||||
|
Reference in New Issue
Block a user