|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-devel
Re: [Xen-devel][Xense-devel][PATCH][1/4] Xen Security Modules: XSM
 
I'm interested in whether this code could be used to supersede IS_PRIV 
(dom), particularly when doing an mmu_update operation.
 As far as I can see, the xsm_mmu_normal_update() hook is called after  
set_foreigndom(). set_foreigndom() will fail if the calling domain is  
not privileged (!IS_PRIV(current->domain)) and the operation  
specifies a different domain as the foreigndom.
 For disaggregation of the domain builder, we would like to be able to  
delegate this privilege to a small, trusted domain (domB): it seems  
to me that XSM would be the cleanest way to do this. Would it  
therefore be possible to add a hook in set_foreigndom() on the ! 
IS_PRIV(d) branch, or is there some security consequence that I am  
overlooking?
Regards,
Derek Murray.
On 7 May 2007, at 22:41, George S. Coker, II wrote:
 
Updates in this patch set include:
    - adaptation to new create secure interface for domain_create
    - cleanup of xsm enable/disable framework through xsm_call macro
    - ifdef architecture/config specific hooks
Signed-off-by: George Coker <gscoker@xxxxxxxxxxxxxx>
<xsm-050707-xen-15011.diff>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 
 |   
 
 | 
    | 
  
  
    |   | 
    |