[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] xen: use XSM instead of IS_PRIV for getdomaininfo
# HG changeset patch # User Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> # Date 1327758545 0 # Node ID 926e0820d615d7224f22a44deb8bbf4ebf078cf0 # Parent 1025acf332ded1a14ef44a813d13bc0595ac5386 xen: use XSM instead of IS_PRIV for getdomaininfo The XEN_DOMCTL_getdomaininfo domctl does not allow manipulation of domains, only basic information such as size and state, so its use does not fully justify making a domain privileged. XSM modules can also provide fine-grained control over what domains are visible to domains that call getdomaininfo. If XSM is disabled (either at compile time or by using the dummy XSM module) then there is no change in behavior: only IS_PRIV domains can use this domctl. If enabled, the XSM module controls access. Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> Committed-by: Keir Fraser <keir@xxxxxxx> --- diff -r 1025acf332de -r 926e0820d615 xen/common/domctl.c --- a/xen/common/domctl.c Sat Jan 28 13:48:34 2012 +0000 +++ b/xen/common/domctl.c Sat Jan 28 13:49:05 2012 +0000 @@ -264,6 +264,10 @@ return -EPERM; break; } +#ifdef XSM_ENABLE + case XEN_DOMCTL_getdomaininfo: + break; +#endif default: if ( !IS_PRIV(current->domain) ) return -EPERM; diff -r 1025acf332de -r 926e0820d615 xen/xsm/dummy.c --- a/xen/xsm/dummy.c Sat Jan 28 13:48:34 2012 +0000 +++ b/xen/xsm/dummy.c Sat Jan 28 13:49:05 2012 +0000 @@ -66,6 +66,8 @@ static int dummy_getdomaininfo (struct domain *d) { + if ( !IS_PRIV(current->domain) ) + return -EPERM; return 0; } _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |