|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 3/6] xsm: enabling xsm to always be included
On 18/06/2021 00:39, Daniel P. Smith wrote:
> The only difference between !CONFIG_XSM and CONFIG_XSM with !CONFIG_XSM_SILO
> and !CONFIG_XSM_FLASK
> is whether the XSM hooks in dummy.h are called as static inline functions or
> as function
> pointers to static functions. As such this commit,
> * eliminates CONFIG_XSM
> * introduces CONFIG_XSM_EVTCHN_LABELING as replacement for enabling event
> channel labels
> * makes CONFIG_XSM_SILO AND CONFIG_XSM_FLASK default to no
>
> Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
> ---
> xen/common/Kconfig | 55 ++++-----
> xen/include/xen/sched.h | 2 +-
> xen/include/xsm/xsm-core.h | 26 ----
> xen/include/xsm/xsm.h | 8 --
> xen/xsm/Makefile | 4 +-
> xen/xsm/dummy.c | 4 +-
> xen/{include => }/xsm/dummy.h | 220 ++++++++++++++++------------------
> xen/xsm/silo.c | 17 +--
> xen/xsm/xsm_core.c | 4 -
> 9 files changed, 142 insertions(+), 198 deletions(-)
> rename xen/{include => }/xsm/dummy.h (63%)
>
> diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> index 0ddd18e11a..203ad7ea23 100644
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -197,22 +197,33 @@ config XENOPROF
>
> If unsure, say Y.
>
> -config XSM
> - bool "Xen Security Modules support"
> - default ARM
> - ---help---
> - Enables the security framework known as Xen Security Modules which
> - allows administrators fine-grained control over a Xen domain and
> - its capabilities by defining permissible interactions between domains,
> - the hypervisor itself, and related resources such as memory and
> - devices.
> +menu "Xen Security Modules"
>
> - If unsure, say N.
> +choice
> + prompt "Default XSM module"
> + default XSM_SILO_DEFAULT if XSM_SILO && ARM
> + default XSM_FLASK_DEFAULT if XSM_FLASK
> + default XSM_SILO_DEFAULT if XSM_SILO
> + default XSM_DUMMY_DEFAULT
> + config XSM_DUMMY_DEFAULT
> + bool "Match non-XSM behavior"
There is no non-XSM behaviour any more.
Is it time to rename Dummy to "traditional dom0-all-powerful" or
something suitable?
> + config XSM_FLASK_DEFAULT
> + bool "FLux Advanced Security Kernel" if XSM_FLASK
> + config XSM_SILO_DEFAULT
> + bool "SILO" if XSM_SILO
> +endchoice
> +
> +config XSM_EVTCHN_LABELING
> + bool "Enables security labeling of event channels"
> + default n
> + ---help---
> + This enables an XSM module to label and enforce access control over
> + event channels.
Please use help rather than ---help--- for new options (its changed in
upstream Kconfig). The indentation of the help message wants to be one
tab, then two spaces. (Yes, sadly...)
> config XSM_FLASK
> - def_bool y
> + def_bool n
> prompt "FLux Advanced Security Kernel support"
> - depends on XSM
> + select XSM_EVTCHN_LABELING
> ---help---
> Enables FLASK (FLux Advanced Security Kernel) as the access control
> mechanism used by the XSM framework. This provides a mandatory access
> @@ -250,9 +261,8 @@ config XSM_FLASK_POLICY
> If unsure, say Y.
>
> config XSM_SILO
> - def_bool y
> + def_bool n
I'm not sure we want to alter the FLASK/SILO defaults. SILO in
particular is mandatory on ARM, and without it, you're in a security
unsupported configuration.
~Andrew
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |