[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel][Xense-devel][PATCH][1/4] Xen Security Modules: XSM



On Wed, 2007-05-09 at 15:23 +0100, Keir Fraser wrote:
> On 9/5/07 15:04, "Derek Murray" <Derek.Murray@xxxxxxxxxxxx> wrote:
> 
> > For disaggregation of the domain builder, we would like to be able to
> > delegate this privilege to a small, trusted domain (domB): it seems
> > to me that XSM would be the cleanest way to do this. Would it
> > therefore be possible to add a hook in set_foreigndom() on the !
> > IS_PRIV(d) branch, or is there some security consequence that I am
> > overlooking?
> 
> Better to get rid of the IS_PRIV() altogether? If we're adding these hooks
> all over the place we may as well get some benefit from them, even if it
> means adding extra ones. Only question then is whether conflating security
> constraints required for correct operation of the Xen platform (i.e.,
> capabilities of the disaggregated dom0 domains) with the constraints
> required for domU's, and trying to express these in the same security policy
> module actually makes sense. It might make sense to 'shim in' a static
> built-in policy at those hook points as a pre-filter on the
> dynamically-loaded policy for ordinary domUs.
> 

We could easily move the IS_PRIV() checks to the default/dummy modules.
This would ensure that a static security policy is enforced either in
the XSM enabled/disabled cases or in the case of a security module
neglecting not to implement a specific hook.  In all cases, Xen would be
protected by some security policy.  This is how XSM is setup to behave
today, but it is up to the community to commit to making IS_PRIV() the
default XSM module.

Some review of the current hooks is needed to ensure that existing uses
of IS_PRIV() are completely covered.  I believe this is the case for
almost all of the XSM hooks.  In most code paths where there is an
IS_PRIV() call there is an XSM hook immediately following.  mmu_update
is perhaps an exception.  I believe the hook is in the right place to
control the use of mmu_update and probably does not require an extra
hook in set_foreigndom() but there is a side effect from
set_foreigndom() (FOREIGNDOM is set to some value in the absense of
IS_PRIV()) that must be dealt with in the mmu_update hook.



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.