WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] question about XSM hooks

To: "xen-devel" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] question about XSM hooks
From: "tianshuo06" <tianshuo06@xxxxxxxxxxxxxxxxx>
Date: Wed, 22 Jul 2009 14:36:49 +0800
Delivery-date: Tue, 21 Jul 2009 23:37:13 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
1. did XSM hooks are placed in the source code of xen manually?
As we all know, the hooks are used to insert authorization checks on the security-critical operation, now my question is, 
2. how to identify security-critical operation?
security-critical operations are inter-VM communication and cooperation implementing on top of shared virtual resources,
3. does the XSM hooks cover all the operations completely?
thanks.

tianshuo06
2009-07-22
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>