[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 05/15] flask/policy: xenstore stubdom policy
On Thu, Jun 09, 2016 at 10:47:08AM -0400, Daniel De Graaf wrote: > This adds the xenstore_t type to the example policy for use by a > xenstore stub domain. > > Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> > --- > tools/flask/policy/modules/modules.conf | 3 +++ > tools/flask/policy/modules/xenstore.te | 24 ++++++++++++++++++++++++ > 2 files changed, 27 insertions(+) > create mode 100644 tools/flask/policy/modules/xenstore.te > > diff --git a/tools/flask/policy/modules/modules.conf > b/tools/flask/policy/modules/modules.conf > index 9aac6a0..dd10884 100644 > --- a/tools/flask/policy/modules/modules.conf > +++ b/tools/flask/policy/modules/modules.conf > @@ -33,6 +33,9 @@ nomigrate = on > # Example device policy. Also see policy/device_contexts. > nic_dev = on > > +# Xenstore stub domain. I would also add "(see init-xenstore-domain)." And with that Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> (albeit take it with a grain of salt. I am just barely touching the SELinux policy language). > +xenstore = on > + > # This allows any domain type to be created using the system_r role. When > it is > # disabled, domains not using the default types (dom0_t, domU_t, dm_dom_t) > must > # use another role (such as vm_r from the vm_role module below). > diff --git a/tools/flask/policy/modules/xenstore.te > b/tools/flask/policy/modules/xenstore.te > new file mode 100644 > index 0000000..519566a > --- /dev/null > +++ b/tools/flask/policy/modules/xenstore.te > @@ -0,0 +1,24 @@ > +################################################################################ > +# > +# Xenstore stubdomain > +# > +################################################################################ > +declare_singleton_domain(xenstore_t) > +create_domain(dom0_t, xenstore_t) > +manage_domain(dom0_t, xenstore_t) > + > +# Xenstore requires the global VIRQ for domain destroy operations > +allow dom0_t xenstore_t:domain set_virq_handler; > +# Current xenstore stubdom uses the hypervisor console, not "xl console" > +allow xenstore_t xen_t:xen writeconsole; > +# Xenstore queries domaininfo on all domains > +allow xenstore_t domain_type:domain getdomaininfo; > + > +# As a shortcut, the following 3 rules are used instead of adding a > domain_comms > +# rule between xenstore_t and every domain type that talks to xenstore > +create_channel(xenstore_t, domain_type, xenstore_t_channel) > +allow event_type xenstore_t: event bind; > +allow xenstore_t domain_type:grant { map_read map_write unmap }; > + > +# Xenstore is a utility domain, so it should use the system role > +role system_r types xenstore_t; > -- > 2.5.5 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > http://lists.xen.org/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |