Commit 839e692f authored by Yi Liu's avatar Yi Liu Committed by Alex Williamson

vfio: Make vfio_df_open() single open for device cdev path

VFIO group has historically allowed multi-open of the device FD. This
was made secure because the "open" was executed via an ioctl to the
group FD which is itself only single open.

However, no known use of multiple device FDs today. It is kind of a
strange thing to do because new device FDs can naturally be created
via dup().

When we implement the new device uAPI (only used in cdev path) there is
no natural way to allow the device itself from being multi-opened in a
secure manner. Without the group FD we cannot prove the security context
of the opener.

Thus, when moving to the new uAPI we block the ability of opening
a device multiple times. Given old group path still allows it we store
a vfio_group pointer in struct vfio_device_file to differentiate.
Reviewed-by: default avatarKevin Tian <kevin.tian@intel.com>
Reviewed-by: default avatarJason Gunthorpe <jgg@nvidia.com>
Reviewed-by: default avatarEric Auger <eric.auger@redhat.com>
Tested-by: default avatarTerrence Xu <terrence.xu@intel.com>
Tested-by: default avatarNicolin Chen <nicolinc@nvidia.com>
Tested-by: default avatarMatthew Rosato <mjrosato@linux.ibm.com>
Tested-by: default avatarYanting Jiang <yanting.jiang@intel.com>
Tested-by: default avatarShameer Kolothum <shameerali.kolothum.thodi@huawei.com>
Tested-by: default avatarZhenzhong Duan <zhenzhong.duan@intel.com>
Signed-off-by: default avatarYi Liu <yi.l.liu@intel.com>
Link: https://lore.kernel.org/r/20230718135551.6592-10-yi.l.liu@intel.comSigned-off-by: default avatarAlex Williamson <alex.williamson@redhat.com>
parent 270bf4c0
...@@ -245,6 +245,8 @@ static struct file *vfio_device_open_file(struct vfio_device *device) ...@@ -245,6 +245,8 @@ static struct file *vfio_device_open_file(struct vfio_device *device)
goto err_out; goto err_out;
} }
df->group = device->group;
ret = vfio_df_group_open(df); ret = vfio_df_group_open(df);
if (ret) if (ret)
goto err_free; goto err_free;
......
...@@ -18,6 +18,7 @@ struct vfio_container; ...@@ -18,6 +18,7 @@ struct vfio_container;
struct vfio_device_file { struct vfio_device_file {
struct vfio_device *device; struct vfio_device *device;
struct vfio_group *group;
u8 access_granted; u8 access_granted;
spinlock_t kvm_ref_lock; /* protect kvm field */ spinlock_t kvm_ref_lock; /* protect kvm field */
......
...@@ -492,6 +492,13 @@ int vfio_df_open(struct vfio_device_file *df) ...@@ -492,6 +492,13 @@ int vfio_df_open(struct vfio_device_file *df)
lockdep_assert_held(&device->dev_set->lock); lockdep_assert_held(&device->dev_set->lock);
/*
* Only the group path allows the device to be opened multiple
* times. The device cdev path doesn't have a secure way for it.
*/
if (device->open_count != 0 && !df->group)
return -EINVAL;
device->open_count++; device->open_count++;
if (device->open_count == 1) { if (device->open_count == 1) {
ret = vfio_df_device_first_open(df); ret = vfio_df_device_first_open(df);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment