|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkb
On 25 Jul 2006, at 01:21, Reiner Sailer wrote:
Bryan's differentiation makes sense to me. The hooks serve different
purposes:
The xm tools hook is the "usability hook" that ensures users that
domains that get started actually can access their resources.
The block-backend hook is the "enforcement hook" that independently
enforces access control at the time when a resource is mounted.
Right now, both hooks are in the 'large' Domain0. I can imagine that
the xm create resource validation hook eventually moves into a Xen
management GUI that verifies at management time if a domain
configuration is "policy-conform". The block-backend hook could
eventually move together with the block-backend device into a block
device domain for run-time policy enforcement.
The tools hook is not just a usability/conformity check. The check
ensures that the tools will not set up entries in xenstore that would
allow blkback to create a non-conformant vbd. So there is no way for a
guest to trick blkback into creating a non-conformant vbd: it can only
connect to vbds specified in its config file or added later via the
vbd-add xm hotplug command. The tools stack should perform its
compiance checks on both 'xm create' and 'xm vbd-add', and that should
be sufficient.
You have a point about it being nice to check things at the lowest
possible level, but I'm not inclined to add extra crud into the device
drivers for this unless more people scream for it. :-)
-- Keir
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|