aboutsummaryrefslogtreecommitdiffstats
path: root/docs/man/xl.pod.1
diff options
context:
space:
mode:
authorStefano Stabellini <stefano.stabellini@eu.citrix.com>2012-01-10 16:13:06 +0000
committerStefano Stabellini <stefano.stabellini@eu.citrix.com>2012-01-10 16:13:06 +0000
commit004d103be6131eba8596fed489dc3d64a87ad0ef (patch)
tree868a2a09668a99ebc20cd767f6cda7c61e2757cb /docs/man/xl.pod.1
parent17c9cd6d20735ce4be4cb7f1590b3d6d64c627c7 (diff)
downloadxen-004d103be6131eba8596fed489dc3d64a87ad0ef.tar.gz
xen-004d103be6131eba8596fed489dc3d64a87ad0ef.tar.bz2
xen-004d103be6131eba8596fed489dc3d64a87ad0ef.zip
docs: xl.pod.1: introduction to FLASK
Add a simple introduction to FLASK to the xl man page, at the beginning of the FLASK chapter. Link to the xsm-flask.txt document. Currently FLASK, TMEM and PCI PASS-THROUGH are defined as =head2 so they look like sub-chapters of VIRTUAL DEVICE COMMANDS. Make them =head1. Based on a text written by Daniel De Graaf. Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
Diffstat (limited to 'docs/man/xl.pod.1')
-rw-r--r--docs/man/xl.pod.120
1 files changed, 17 insertions, 3 deletions
diff --git a/docs/man/xl.pod.1 b/docs/man/xl.pod.1
index 17789b4766..18fd411e82 100644
--- a/docs/man/xl.pod.1
+++ b/docs/man/xl.pod.1
@@ -906,7 +906,7 @@ List virtual network interfaces for a domain.
=back
-=head2 PCI PASS-THROUGH
+=head1 PCI PASS-THROUGH
=over 4
@@ -929,7 +929,7 @@ List pass-through pci devices for a domain.
=back
-=head2 TMEM
+=head1 TMEM
=over 4
@@ -995,7 +995,20 @@ Get information about how much freeable memory (MB) is in-use by tmem.
=back
-=head2 FLASK
+=head1 FLASK
+
+B<FLASK> is a security framework that defines a mandatory access control policy
+providing fine-grained controls over Xen domains, allowing the policy writer
+to define what interactions between domains, devices, and the hypervisor are
+permitted. Some example of what you can do using XSM/FLASK:
+ - Prevent two domains from communicating via event channels or grants
+ - Control which domains can use device passthrough (and which devices)
+ - Restrict or audit operations performed by privileged domains
+ - Prevent a privileged domain from arbitrarily mapping pages from other
+ domains.
+
+You can find more details on how to use FLASK and an example security
+policy here: L<http://xenbits.xen.org/docs/unstable/misc/xsm-flask.txt>
=over 4
@@ -1039,6 +1052,7 @@ And the following documents on the xen.org website:
L<http://xenbits.xen.org/docs/unstable/misc/xl-network-configuration.html>
L<http://xenbits.xen.org/docs/unstable/misc/xl-disk-configuration.txt>
+L<http://xenbits.xen.org/docs/unstable/misc/xsm-flask.txt>
=head1 BUGS