> From: Christopher Clark <christopher.w.cl...@gmail.com>
> Subject: [PATCH v3 11/15] xsm, argo: XSM control for argo register
> 
> XSM controls for argo ring registration with two distinct cases, where
> the ring being registered is:
> 
> 1) Single source:  registering a ring for communication to receive messages
>                    from a specified single other domain.
>    Default policy: allow.
> 
> 2) Any source:     registering a ring for communication to receive messages
>                    from any, or all, other domains (ie. wildcard).
>    Default policy: deny, with runtime policy configuration via bootparam.
> 
> The existing argo-mac boot parameter indicates administrator preference for
> either permissive or strict access control, which will allow or deny
> registration of any-sender rings.
> 
> This commit modifies the signature of core XSM hook functions in order to
> apply 'const' to arguments, needed in order for 'const' to be accepted in
> signature of functions that invoke them.
> 
> Signed-off-by: Christopher Clark <christopher.cla...@baesystems.com>

Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov>

While it does not need to be a part of this patch, somewhere in the series you 
should add a rule allowing these features to be used by guests in the default 
XSM policy; tools/flask/policy/modules/guest_features.te is where features like 
this have previously been handled.  Since you're adding permissions one at a 
time, you could add the rules all at once or as a part of the patch adding the 
vector.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to