[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [Xense-devel] [PATCH] [1/4] XSM Framework



It should just be a fault, but I see that EPERM might not be blindly
interpreted as EFAULT.
 
On Wed, 2006-12-20 at 10:11 -0500, Stefan Berger wrote:
> 
> Hello George, 
> 
> what's the to-be-expected side-effect if a hook like this is enforced
> (rc != 0)? 
> 
> @@ -2217,6 +2222,10 @@ int do_mmu_update( 
>               */ 
>          case MMU_NORMAL_PT_UPDATE: 
>   
> +            rc = xsm_mmu_normal_update(current->domain, req.val); 
> +            if (rc) 
> +                goto out; 
> +              
>              gmfn = req.ptr >> PAGE_SHIFT; 
>              mfn = gmfn_to_mfn(d, gmfn); 
> 
> 
>   Stefan 
> 
> xense-devel-bounces@xxxxxxxxxxxxxxxxxxx wrote on 12/20/2006 09:08:40
> AM:
> 
> > This patch provides the basic XSM framework for x86_32/x86/64.  It
> > includes a dummy module that implements call/return for each
> security
> > function. 
> > 
> > The hooks implemented by this patch provide a framework for security
> > modules to interpose and complement the existing privileged
> operations
> > in xen as well as interpose on the discretionary operations between
> > domains.
> > 
> > I have done very casual performance testing of the XSM in comparison
> to
> > native xen.  The XSM (with or without the dummy module) has
> negligible
> > impact as measured by lmbench and kbench from either dom0 or domU.
>  The
> > tests were conducted on xen running idle dom0's and idle domU's.
>  The
> > micro-benchmarks can/do especially vary when a security module
> (other
> > than the dummy module) is in place.  This is to be expected.  The
> macro-
> > benchmarks for a specific security module tend to average out the
> micro-
> > benchmark variations but may not be representative of a real
> platform
> > workload.
> > 
> > The framework is configured as default-enable in this patch set.
> > Configuration of XSM is made in Config.mk.  The only configuration
> > option is XSM_ENABLE = y/n.  XSM_ENABLE must be y to compile an XSM
> > module.  
> > 
> > XSM provides a generalized hook infrastructure allowing third-party
> > security modules to interpose on the Xen code path.  A default or
> dummy
> > module provides basic call/return functionality for hooks not
> > implemented by a given module.  During module initialization, a
> module
> > registers its security hooks and the equivalent dummy hooks are
> > unregistered.  If a module does not implement a hook, the equivalent
> > dummy hook remains in place.  Modules also may define and register
> at
> > boot time a module specific hypercall through the XSM hook
> > infrastructure.
> > 
> > Modules may also define at Xen compile time a magic number XSM_MAGIC
> to
> > indicate that a policy should be discovered from the images loaded
> at
> > boot.  The policy file should then be listed in grub as one of the
> > multi-boot modules after the dom0 kernel.
> > 
> > Signed-off-by: George Coker <gscoker@xxxxxxxxxxxxxx>
> > [attachment "xsm-121906-xen-unstable.diff" deleted by Stefan 
> > Berger/Watson/IBM] _______________________________________________
> > Xense-devel mailing list
> > Xense-devel@xxxxxxxxxxxxxxxxxxx
> > http://lists.xensource.com/xense-devel
-- 
George S. Coker, II <gscoker@xxxxxxxxxxxxxx> 443-479-6944


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.