[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v6 09/10] kconfig: update xsm config to reflect reality
On 10.09.2021 22:13, Daniel P. Smith wrote: > --- a/xen/common/Kconfig > +++ b/xen/common/Kconfig > @@ -200,23 +200,20 @@ config XENOPROF > > If unsure, say Y. > > -config XSM > - bool "Xen Security Modules support" > +config XSM_CONFIGURABLE > + bool "Configure Xen Security Modules" > default ARM > - ---help--- > - Enables the security framework known as Xen Security Modules which > - allows administrators fine-grained control over a Xen domain and > - its capabilities by defining permissible interactions between domains, > - the hypervisor itself, and related resources such as memory and > - devices. > + help > + Allows for configuring the Xen Security Modules (XSM) policy or > policies > + modules that will be availble and which will be the default. > > If unsure, say N. > > config XSM_FLASK > - def_bool y > - prompt "FLux Advanced Security Kernel support" > - depends on XSM > - ---help--- > + bool "FLux Advanced Security Kernel support" > + depends on XSM_CONFIGURABLE > + select XSM_EVTCHN_LABELING > + help > Enables FLASK (FLux Advanced Security Kernel) as the access control > mechanism used by the XSM framework. This provides a mandatory access > control framework by which security enforcement, isolation, and I continue to think that the default here and ... > @@ -253,10 +250,10 @@ config XSM_FLASK_POLICY > If unsure, say Y. > > config XSM_SILO > - def_bool y > - prompt "SILO support" > - depends on XSM > - ---help--- > + bool "SILO support" > + default y if ARM > + depends on XSM_CONFIGURABLE > + help > Enables SILO as the access control mechanism used by the XSM > framework. > This is not the default module, add boot parameter xsm=silo to choose > it. This will deny any unmediated communication channels (grant tables ... here should not change. If it changes, the change needs justifying in the description. > @@ -282,15 +279,15 @@ endchoice > config LATE_HWDOM > bool "Dedicated hardware domain" > default n > - depends on XSM && X86 > - ---help--- > + depends on XSM_FLASK && X86 > + help > Allows the creation of a dedicated hardware domain distinct from > domain 0 that manages devices without needing access to other > privileged functionality such as the ability to manage domains. > This requires that the actual domain 0 be a stub domain that > constructs the actual hardware domain instead of initializing the > hardware itself. Because the hardware domain needs access to > - hypercalls not available to unprivileged guests, an XSM policy > + hypercalls not available to unprivileged guests, an XSM Flask policy > is required to properly define the privilege of these domains. I also continue to think that this would better be a separate change. Or if not, the seemingly unrelated change needs mentioning in the description (to make clear it's not a stray change). Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |