[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 3/6] xsm: enabling xsm to always be included
On 18/06/2021 00:39, Daniel P. Smith wrote: > The only difference between !CONFIG_XSM and CONFIG_XSM with !CONFIG_XSM_SILO > and !CONFIG_XSM_FLASK > is whether the XSM hooks in dummy.h are called as static inline functions or > as function > pointers to static functions. As such this commit, > * eliminates CONFIG_XSM > * introduces CONFIG_XSM_EVTCHN_LABELING as replacement for enabling event > channel labels > * makes CONFIG_XSM_SILO AND CONFIG_XSM_FLASK default to no > > Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx> > --- > xen/common/Kconfig | 55 ++++----- > xen/include/xen/sched.h | 2 +- > xen/include/xsm/xsm-core.h | 26 ---- > xen/include/xsm/xsm.h | 8 -- > xen/xsm/Makefile | 4 +- > xen/xsm/dummy.c | 4 +- > xen/{include => }/xsm/dummy.h | 220 ++++++++++++++++------------------ > xen/xsm/silo.c | 17 +-- > xen/xsm/xsm_core.c | 4 - > 9 files changed, 142 insertions(+), 198 deletions(-) > rename xen/{include => }/xsm/dummy.h (63%) > > diff --git a/xen/common/Kconfig b/xen/common/Kconfig > index 0ddd18e11a..203ad7ea23 100644 > --- a/xen/common/Kconfig > +++ b/xen/common/Kconfig > @@ -197,22 +197,33 @@ config XENOPROF > > If unsure, say Y. > > -config XSM > - bool "Xen Security Modules support" > - default ARM > - ---help--- > - Enables the security framework known as Xen Security Modules which > - allows administrators fine-grained control over a Xen domain and > - its capabilities by defining permissible interactions between domains, > - the hypervisor itself, and related resources such as memory and > - devices. > +menu "Xen Security Modules" > > - If unsure, say N. > +choice > + prompt "Default XSM module" > + default XSM_SILO_DEFAULT if XSM_SILO && ARM > + default XSM_FLASK_DEFAULT if XSM_FLASK > + default XSM_SILO_DEFAULT if XSM_SILO > + default XSM_DUMMY_DEFAULT > + config XSM_DUMMY_DEFAULT > + bool "Match non-XSM behavior" There is no non-XSM behaviour any more. Is it time to rename Dummy to "traditional dom0-all-powerful" or something suitable? > + config XSM_FLASK_DEFAULT > + bool "FLux Advanced Security Kernel" if XSM_FLASK > + config XSM_SILO_DEFAULT > + bool "SILO" if XSM_SILO > +endchoice > + > +config XSM_EVTCHN_LABELING > + bool "Enables security labeling of event channels" > + default n > + ---help--- > + This enables an XSM module to label and enforce access control over > + event channels. Please use help rather than ---help--- for new options (its changed in upstream Kconfig). The indentation of the help message wants to be one tab, then two spaces. (Yes, sadly...) > config XSM_FLASK > - def_bool y > + def_bool n > prompt "FLux Advanced Security Kernel support" > - depends on XSM > + select XSM_EVTCHN_LABELING > ---help--- > Enables FLASK (FLux Advanced Security Kernel) as the access control > mechanism used by the XSM framework. This provides a mandatory access > @@ -250,9 +261,8 @@ config XSM_FLASK_POLICY > If unsure, say Y. > > config XSM_SILO > - def_bool y > + def_bool n I'm not sure we want to alter the FLASK/SILO defaults. SILO in particular is mandatory on ARM, and without it, you're in a security unsupported configuration. ~Andrew
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |