[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 17/18] xenstored: add --priv-domid parameter
On Wed, 2012-01-18 at 14:41 +0000, Daniel De Graaf wrote: > On 01/18/2012 06:48 AM, Ian Campbell wrote: > > On Thu, 2012-01-12 at 23:35 +0000, Daniel De Graaf wrote: > >> This parameter identifies an alternative service domain which has > >> superuser access to the xenstore database, which is currently required > >> to set up a new domain's xenstore entries. > > > > Is this equivalent to dom0 adding write permissions to various paths for > > that domain as it builds it or is there more to it than that. > > > > I know that the determination of "various paths" is non-trivial, so I'm > > not actually suggesting that is a better approach. > > > > It's more: the domain builder needs to create entries owned by the new > domain, and similar to UNIX chown() can only be called by the superuser. > The domain builder also currently relies on the fact that new keys it > creates inherit the parent's ownership instead of being owned by dom0. > The introduce operation is also privileged. Thanks for explaining. I wonder if there is somewhere this can be usefully written down so that "privileged" is well defined? docs/misc/xenstore.txt seems to be more about the wire protocol than the underlying semantics. Perhaps someone on list can suggest a suitable place? > > >> > >> Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> > >> --- > >> tools/xenstore/xenstored_core.c | 5 +++++ > >> tools/xenstore/xenstored_core.h | 1 + > >> tools/xenstore/xenstored_domain.c | 2 +- > >> 3 files changed, 7 insertions(+), 1 deletions(-) > >> > >> diff --git a/tools/xenstore/xenstored_core.c > >> b/tools/xenstore/xenstored_core.c > >> index eea5fd6..9d087de 100644 > >> --- a/tools/xenstore/xenstored_core.c > >> +++ b/tools/xenstore/xenstored_core.c > >> @@ -1774,6 +1774,7 @@ static struct option options[] = { > >> { "event", 1, NULL, 'e' }, > >> { "help", 0, NULL, 'H' }, > >> { "no-fork", 0, NULL, 'N' }, > >> + { "priv-domid", 1, NULL, 'p' }, > >> { "output-pid", 0, NULL, 'P' }, > >> { "entry-size", 1, NULL, 'S' }, > >> { "trace-file", 1, NULL, 'T' }, > >> @@ -1786,6 +1787,7 @@ static struct option options[] = { > >> > >> extern void dump_conn(struct connection *conn); > >> int dom0_event = 0; > >> +int priv_domid = 0; > >> > >> int main(int argc, char *argv[]) > >> { > >> @@ -1852,6 +1854,9 @@ int main(int argc, char *argv[]) > >> case 'e': > >> dom0_event = strtol(optarg, NULL, 10); > >> break; > >> + case 'p': > >> + priv_domid = strtol(optarg, NULL, 10); > >> + break; > >> } > >> } > >> if (optind != argc) > >> diff --git a/tools/xenstore/xenstored_core.h > >> b/tools/xenstore/xenstored_core.h > >> index d3040ba..03e2e48 100644 > >> --- a/tools/xenstore/xenstored_core.h > >> +++ b/tools/xenstore/xenstored_core.h > >> @@ -169,6 +169,7 @@ void dtrace_io(const struct connection *conn, const > >> struct buffered_data *data, > >> > >> extern int event_fd; > >> extern int dom0_event; > >> +extern int priv_domid; > >> > >> /* Map the kernel's xenstore page. */ > >> void *xenbus_map(void); > >> diff --git a/tools/xenstore/xenstored_domain.c > >> b/tools/xenstore/xenstored_domain.c > >> index 5f4a09e..46bcf3e 100644 > >> --- a/tools/xenstore/xenstored_domain.c > >> +++ b/tools/xenstore/xenstored_domain.c > >> @@ -241,7 +241,7 @@ bool domain_can_read(struct connection *conn) > >> > >> bool domain_is_unprivileged(struct connection *conn) > >> { > >> - return (conn && conn->domain && conn->domain->domid != 0); > >> + return (conn && conn->domain && conn->domain->domid != 0 && > >> conn->domain->domid != priv_domid); > >> } > >> > >> bool domain_can_write(struct connection *conn) > > > > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |