[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 3/6] xsm: enabling xsm to always be included
On 6/18/21 7:53 AM, Andrew Cooper wrote: > On 18/06/2021 00:39, Daniel P. Smith wrote: >> The only difference between !CONFIG_XSM and CONFIG_XSM with !CONFIG_XSM_SILO >> and !CONFIG_XSM_FLASK >> is whether the XSM hooks in dummy.h are called as static inline functions or >> as function >> pointers to static functions. As such this commit, >> * eliminates CONFIG_XSM >> * introduces CONFIG_XSM_EVTCHN_LABELING as replacement for enabling event >> channel labels >> * makes CONFIG_XSM_SILO AND CONFIG_XSM_FLASK default to no >> >> Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx> >> --- >> xen/common/Kconfig | 55 ++++----- >> xen/include/xen/sched.h | 2 +- >> xen/include/xsm/xsm-core.h | 26 ---- >> xen/include/xsm/xsm.h | 8 -- >> xen/xsm/Makefile | 4 +- >> xen/xsm/dummy.c | 4 +- >> xen/{include => }/xsm/dummy.h | 220 ++++++++++++++++------------------ >> xen/xsm/silo.c | 17 +-- >> xen/xsm/xsm_core.c | 4 - >> 9 files changed, 142 insertions(+), 198 deletions(-) >> rename xen/{include => }/xsm/dummy.h (63%) >> >> diff --git a/xen/common/Kconfig b/xen/common/Kconfig >> index 0ddd18e11a..203ad7ea23 100644 >> --- a/xen/common/Kconfig >> +++ b/xen/common/Kconfig >> @@ -197,22 +197,33 @@ config XENOPROF >> >> If unsure, say Y. >> >> -config XSM >> - bool "Xen Security Modules support" >> - default ARM >> - ---help--- >> - Enables the security framework known as Xen Security Modules which >> - allows administrators fine-grained control over a Xen domain and >> - its capabilities by defining permissible interactions between domains, >> - the hypervisor itself, and related resources such as memory and >> - devices. >> +menu "Xen Security Modules" >> >> - If unsure, say N. >> +choice >> + prompt "Default XSM module" >> + default XSM_SILO_DEFAULT if XSM_SILO && ARM >> + default XSM_FLASK_DEFAULT if XSM_FLASK >> + default XSM_SILO_DEFAULT if XSM_SILO >> + default XSM_DUMMY_DEFAULT >> + config XSM_DUMMY_DEFAULT >> + bool "Match non-XSM behavior" > > There is no non-XSM behaviour any more. > > Is it time to rename Dummy to "traditional dom0-all-powerful" or Well, I left as dummy since that is what it has been known by thus far and additionally the subsequent patch set was going to rename this to XSM_ROLES/"XSM Role-based Access Control" For the intermediate time, I can change the wording to reflect the correct state. >> + config XSM_FLASK_DEFAULT >> + bool "FLux Advanced Security Kernel" if XSM_FLASK >> + config XSM_SILO_DEFAULT >> + bool "SILO" if XSM_SILO >> +endchoice >> + >> +config XSM_EVTCHN_LABELING >> + bool "Enables security labeling of event channels" >> + default n >> + ---help--- >> + This enables an XSM module to label and enforce access control over >> + event channels. > > Please use help rather than ---help--- for new options (its changed in > upstream Kconfig). The indentation of the help message wants to be one > tab, then two spaces. (Yes, sadly...) ack >> config XSM_FLASK >> - def_bool y >> + def_bool n >> prompt "FLux Advanced Security Kernel support" >> - depends on XSM >> + select XSM_EVTCHN_LABELING >> ---help--- >> Enables FLASK (FLux Advanced Security Kernel) as the access control >> mechanism used by the XSM framework. This provides a mandatory access >> @@ -250,9 +261,8 @@ config XSM_FLASK_POLICY >> If unsure, say Y. >> >> config XSM_SILO >> - def_bool y >> + def_bool n > > I'm not sure we want to alter the FLASK/SILO defaults. SILO in > particular is mandatory on ARM, and without it, you're in a security > unsupported configuration. The intent here is the default is the classic dom0 configuration. What if I did, def bool n def bool y if ARM v/r dps
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |